About
NYX empowers you to take control of your digital life through end-to-end encrypted collaboration and communication. Our zero-knowledge platform unifies document editing, storage, messaging, and scheduling into one private workspace that's truly yours.
We believe privacy and usability go hand in hand—offering powerful tools that protect your data while enabling seamless collaboration. Through decentralized technology and open-source development, we're building a future where privacy is the default, not a premium.
NYX Security Architecture
Client Layer (Trusted)
All sensitive operations occur in this trusted environment:
- Local Storage: Encrypted data cache and state management
- Key Encryption Keys (KEK): Client-side key management
- Local Processing Unit: Document processing and ML inference
- Encryption Layer: End-to-end encryption of all user data
Cloud Layer (Untrusted)
Zero-knowledge cloud infrastructure:
- Storage Services: Encrypted object storage, vector embeddings, and graph relationships
- Compute Services: Privacy-preserving ML pipeline, search indexing, and analytics
- Security Services: Key management, access control, and audit logging
Edge Network
Global distribution layer:
- Content Delivery: Encrypted asset distribution
- Edge Cache: Local caching of encrypted data
- Edge Computing: Request routing and optimization
What Does This Mean For You & Your Data?
Your data never leaves your device without being encrypted—like having a personal vault that only you have the key to.
Even if our servers were compromised, your information stays private because we never see or store your encryption keys.
Your searches, documents, and messages can't be read by anyone but you and those you choose to share with—not even by NYX employees.
Fast, global access to your data without compromising security through our encrypted edge network—like having a secure personal cloud that follows you everywhere.
How We Use the Cloud While Keeping Your Data Private
AI & Machine Learning
We run AI models directly on your device when possible. For more complex AI tasks, we use advanced encryption that lets our cloud process your data without ever seeing its actual content—like solving a puzzle through a blindfold.
Storage & Sync
Your files are split into encrypted pieces and stored across a decentralized network—like keeping different parts of a treasure in multiple secure locations. Only you have the map to put it back together.
Search & Analytics
We use special encryption that lets you search your encrypted data without decrypting it first—like finding a book in a library where all the titles are in code that only you can read.
By combining local processing, encryption, and decentralized storage, we give you the power of cloud computing without compromising your privacy.
Data flows only as encrypted payloads between layers. The client layer maintains sole access to encryption keys, ensuring true zero-knowledge architecture.
Privacy-First Features
Security & Privacy
Zero-Trust Security
End-to-end encryption with zero-knowledge architecture ensures your data remains private
Decentralized Storage
Distributed storage with cryptographic guarantees for enhanced security and availability
Identity Management
Decentralized identity and authentication system
Zero-Trust Security
End-to-end encryption with zero-knowledge architecture ensures your data remains private
Decentralized Storage
Distributed storage with cryptographic guarantees for enhanced security and availability
Identity Management
Decentralized identity and authentication system
Communication & Collaboration
Secure Messaging
End-to-end encrypted communication with advanced privacy features
Team Collaboration
Secure spaces for team communication and project management
Document Management
Collaborative document editing with real-time sync and version control
Secure Messaging
End-to-end encrypted communication with advanced privacy features
Team Collaboration
Secure spaces for team communication and project management
Document Management
Collaborative document editing with real-time sync and version control
Productivity Tools
Private Calendar
Encrypted calendar with scheduling and event management
Secure Search
Privacy-preserving semantic search across all your content
Cross-Platform Sync
Seamless synchronization across all your devices
Private Calendar
Encrypted calendar with scheduling and event management
Secure Search
Privacy-preserving semantic search across all your content
Cross-Platform Sync
Seamless synchronization across all your devices