Security Principles

Portex is built with security as a priority. We ensure that your local environment remains isolated while providing the connectivity you need.

End-to-End Encryption

All traffic passing through Portex tunnels is encrypted using TLS. Your data is protected from the moment it leaves your agent until it reaches the visitor's browser.

Privacy & Visibility

At Portex, we believe in radical privacy. We store your request logs and metadata using industry-standard encryption. Most importantly, our team has zero visibility into your tunneled traffic. The inspection data you see in your dashboard is restricted to your account alone.

Infrastructure & Compliance

We take trust seriously. We have officially applied for SOC-2 compliance to validate our security controls and processes. Our entire infrastructure is hosted on high-performance bare-metal servers located in Hetzner Falkenstein (Germany), providing excellent network performance and adhering to strict European privacy standards (GDPR).

PIN Protection

One of our unique features is the ability to lock a tunnel with a PIN. When you use the --pin flag, the Portex Gateway will intercept all requests and present a challenge page.

portex start --port 3000 --pin 1234

This is especially useful for:

  • Sharing sensitive work-in-progress with clients.
  • Protecting internal staging environments.
  • Preventing search engine crawlers from indexing your dev site.

IP Whitelisting

For even stricter security, you can restrict access to your tunnel to specific IP addresses. When IP whitelisting is active, any request from an unauthorized IP will receive a 403 Forbidden response.

portex start --port 3000 --allow-ip 85.99.254.169,1.2.3.4

This allows you to:

  • Limit access to your office or home network.
  • Ensure only your webhook provider (like Stripe) can hit your local endpoint.
  • Combine with PIN protection for maximum security.

Agent Authentication

While Portex works without an account, logging in allows you to:

  • Keep your custom subdomains reserved.
  • View historical request logs in the dashboard.
  • Manage multiple agents from a single interface.
Trust We do not store your local data. We only facilitate the passage of traffic through the encrypted tunnel.