Security hub

Security architecture for IT and compliance buyers

InviziPoll is built so respondents stay anonymous and individual answers stay invisible to us—end-to-end encrypted poll responses are structural, not an add-on. Below is how we explain that story to your security team; for deeper dives, see our blog and the technical documentation.

Security documentation

Post-quantum cryptography

We use the X-Wing hybrid KEM (X25519 + ML-KEM-768) for key encapsulation and ML-DSA-65 for signatures—aligning with modern standards so encrypted data resists harvest-now, decrypt-later threats.

Magic link + blind signatures

For single-vote and high-integrity flows, eligibility can be established via magic links while ballot issuance uses blind signatures—so the server never links an individual recipient to a final anonymous vote in persisted state.

Enterprise identity

Workspace owners can connect SAML 2.0 / OIDC SSO (Microsoft Entra ID, Okta, AD FS, Google Workspace, and other standards-based IdPs), provision users with SCIM 2.0, enforce verified-domain sign-in, and stream compliance-focused admin activity to SIEM webhooks—without exposing respondent content or decryption keys to those channels.

No server decryption (poll content)

We never decrypt poll answers on the server. Responses are encrypted in the respondent browser before upload; respondents stay anonymous, and we only hold encrypted data.

This page summarizes product architecture for procurement discussions. For contractual terms and data handling, see our Terms of Service and Privacy Policy.