Innovation 2026 · Patented French-origin technology

End-to-End Encrypted
Private Communications

E2E encrypted private communication suite, works on all devices worldwide — nothing to install: computer, phone, tablet, smart TV, media. Ultra mobile.

Built on an autonomous self-hosted low-power relay server. Designed to start from a microcomputer and scale to your largest platforms — from Raspberry Pi 5 to enterprise server, NAS and VPS. Andorran R&D, sovereign architecture.

All Devices (60+ browsers) Zero Installation Ultra Mobile E2E Encryption Self-Hosted RAM-Only
CryptPeer is already operational

Try CryptPeer now

Access the locally self-hosted version of the CryptPeer team. Operational version accessible online to test end-to-end encrypted private messaging.

Access CryptPeer

URL : https://test.cryptpeer.com/login

New test server: CryptPeer is now accessible worldwide via a dedicated server installed on a KUBB Mini Fanless by Bleu Jour (French manufacturer and partner of FullSecure, distributor of Freemindtronic solutions). Beta version v1.2 — now works without external VPN.

View all updates and changes

Enable video calls (WebRTC)

To enable the video calls via WebRTC feature (without WireGuard, only messaging is available):

  1. Download WireGuard on your device:
  2. Send a message to "admin" via CryptPeer messaging requesting the CryptPeer WireGuard tunnel code
  3. The administrator will send you a configuration file and a QR code
  4. Add the configuration to your WireGuard
  5. Video calls will then be enabled via WebRTC

Note: Without WireGuard, you can use CryptPeer for messaging, but video calls will not be available.

Innovation 2026

Andorran Patented Technology of French Origin

Andorran R&D · Sovereign architecture · Zero intermediary · Zero delegation · Zero collection

Patented

Patented segmented key authentication system. French-origin technology developed in Andorra.

Sovereignty

Sovereign architecture: zero intermediary, zero delegation, zero collection. Compatible with French sovereign hardware (Kubb Mini, DataShielder).

EviEngine: License system based on motherboard serial number (not on identity), without server or database. Enables operation in offline local network.

HSM NFC & PGP Compatibility

CryptPeer is compatible with PassCypher HSM PGP, NFC HSM, DataShielder HSM PGP and NFC HSM to over-encrypt data, messages and files upstream before sending from these hardware security modules (HSM).

Made in Europe

Designed and developed in Andorra in Europe, based on French-origin patents. Sovereign technology, independent of tech giants. Respects international data protection standards.

Server Platforms

Raspberry Pi 5 (minimum configuration) to Intel/AMD mini-PCs, desktop PCs, NAS and Linux VPS

Immediate Deployment

Fully autonomous solution, integrates into any existing infrastructure, works in local closed network

Remote Access

Firewall/router configuration (NAT / reverse proxy) + domain name/subdomain for Let's Encrypt

Communication Features

Messaging, audio/video calls, file transfers — all E2E encrypted

1:1 & Group Messaging

Individual messaging and groups (channels, access policies). Multiple groups per user with simultaneous presence in various groups.

Audio / Video Calls

Individual A/V calls and conferences in private self-hosted environment. Remote access possible depending on network configuration.

Files & Memos

Large capacity file transfers (E2E). Sovereign choice: download your files encrypted or decrypted according to your security level and storage medium. File signing. In the message window, choose to download images and videos encrypted or decrypted.

Front/Rear Camera Management

Full control of your phone's front and rear cameras for video calls, photo capture and video recording encrypted. Switch freely between cameras during calls. All multimedia content is end-to-end encrypted before sending.

A/V Recordings

Audio/video recordings: captured locally then sent encrypted. Decryption space at user's free choice.

Multilingual Interface

14+ offline languages (interface language). Display obfuscation with selective decryption (temporary view in RAM).

All Devices — Zero Installation

Works on all devices worldwide — nothing to install: computer, phone, tablet, smart TV, media. Ultra mobile. "App-like" UX: auto-configuration on display side, feeling of installed application without real installation.

Server List Management v1.2

Create your favorite server list to quickly and freely switch between different CryptPeer instances. Change servers with one click: organization server, client server, remote instance. Maximum resilience and total flexibility.

Cybersecurity & Data Protection Features

Collaborative platform with advanced protection and secure backup functions

Encrypted Backup 3.2.1

Redundant encrypted backup system: backup your data redundantly on multiple media (USB, SSD, cloud, NAS, external drive). Automatic timestamping to prevent overwriting. Large file support. Planned evolution: integrated malicious file analysis.

Ransomware Protection

Thanks to Encrypted Backup 3.2.1, each backup is timestamped and distributed across multiple media, including the cloud. Thus, when a ransomware attempts to re-encrypt everything, at least one copy remains intact. The user can then restore their data from this preserved medium, ensuring continuity despite the attack.

Infostealer Protection

Data encrypted with CryptPeer is unexploitable even if stolen by infostealers. End-to-end encryption prevents extraction of sensitive data even if malware accesses the files.

Espionage Protection

CryptPeer offers complete defense against espionage, whether remote (cyberattacks, unauthorized access) or proximity (prying eyes, screenshots). Data remains unreadable without your key, even if the medium is compromised. To strengthen this confidentiality, a masked mode allows displaying information directly in encrypted form by default, thus reducing any risk of involuntary exposure.

Data Theft Protection

Without your user key, stolen data is unusable. Encryption based on your unique user ID. Even in case of physical theft of the storage medium, data remains protected and unreadable.

CryptPeer Masked

Autonomous masked mode: all data remains encrypted on screen by default. Selectively decrypt a conversation by clicking the lock button, which automatically re-encrypts. Significantly reduces the risk of screenshot or unauthorized viewing.

File Encryption & Decryption

With CryptPeer, your sensitive files remain under your exclusive control. Each encryption or decryption operation relies on your unique user ID, ensuring that only you can access data protected by your account. Whether encrypting a document to secure it or decrypting it to view it, you maintain total control over your information, safe from any intrusion.

Conversation Thread Export & Import

With CryptPeer, your conversations never truly disappear. Three export and import modes give you total control: raw JSON code for technical use, discussion mode to retrieve your exchanges as they were, or complete restoration with the ability to activate or deactivate certain contacts. Thus, even a thread deleted voluntarily or by mistake can be brought back to life, restoring the continuity of your exchanges at your convenience.

Architecture & Operation

From Raspberry Pi 5 to enterprise server — natural scalability

1

Autonomous Relay Server

Blind transit role (never sees plaintext), database & metadata encrypted upstream. Compatible Raspberry Pi 5, mini-PC, NAS, Linux VPS.

Raspberry Pi 5 Power Consumption:
  • Idle: 2.4 to 3.3 W
  • Maximum load: 9 W
  • Average usage: ~4 W
  • Estimated annual cost: ~€8.10

Examples of Mini Hardware Configurations

CryptPeer has been successfully installed on various mini-computer configurations, demonstrating its versatility and self-portability capabilities:

KUBB Mini Fanless

French fanless mini-PC, ultra-compact and silent. Ideal for discrete and mobile deployments.

Raspberry Pi 5

Economical micro-computer, minimal consumption. Perfect for testing and light deployments.

Solar Mini-PC

Total energy autonomy. Ideal solution for isolated terrains and outdoor operations.

These examples illustrate the plurality of CryptPeer installation possibilities, even on mini-computers, highlighting the self-portable aspect and deployment flexibility.

2

Multi-Platform Clients

Computer, smartphone, tablet, TV/media — zero installation, immediate use. Offline multilingual interface (14+ languages).

Maximum interoperability: Compatible with 60+ web browsers (Chrome, Firefox, Safari, Edge, Opera, Brave, Vivaldi, and all their Chromium/Gecko/WebKit forks). Works on smart TVs (Samsung, LG, Android TV), consoles (PlayStation, Xbox, Switch), and embedded systems. CryptPeer® eliminates the hardware constraint of civil/military/regalian solutions: secure E2E communication between any devices (including hardened phones) via WiFi, without requiring a SIM card, between heterogeneous devices with total interoperability and an encryption level adapted to the most demanding needs. See full list →

3

Access Modes

Local-only: closed network (private Wi-Fi AP), without SIM/Internet.
Remote: firewall/router configuration (NAT / reverse proxy) + domain name/subdomain for Let's Encrypt.

4

HSM for Master Passphrase

PassCypher NFC HSM (Android NFC) & PassCypher HSM PGP (PC) for master passphrase > 256 bits. Secure secret storage.

Security & Encryption

Patented segmented key authentication system — security by design

E2E Encryption on User Side

The server never gets plaintext; it only relays. Database and metadata encrypted upstream, zero exploitable metadata.

Segmented Key (Patented)

One derived key per conversation/group. Ephemeral key per message: one unique key per message. Compromising one message provides no information about others.

Data-in-Use (RAM)

Decryption in volatile memory only, without persistent plaintext. Brief & controlled display window. Immediate zeroization of buffers after reading.

Instant Obsolescence

The message key becomes invalid on any interface/system event (tab change, window, scroll, etc.).

Blind Relay

The relay server processes only encrypted data. Auto-purge of unrecovered files in case of saturated SSD/SD.

Regalian & Sensitive Uses

Designed for the most demanding security and sovereignty needs

Diplomatic communications

Protection of sensitive exchanges between diplomatic missions, embassies and consulates. Guaranteed sovereign architecture.

Military operations

Secure communications for tactical operations. Local-only mode, network undetectability, maximum resilience.

Air-gap networks

Operation in isolated closed network (air-gap). No Internet connection required. Compatible with French sovereign hardware.

Sensitive organizations

Protection of critical data for strategic companies, public institutions, sensitive research centers.

Pseudonym anonymity

Anonymous communications with pseudonyms. No collection of exploitable metadata. Network undetectability.

Sovereign self-hosting

Total control of infrastructure. Zero cloud dependency. Compatible with French sovereign hardware (Kubb Mini, DataShielder).

Learn more about regalian uses

CryptPeer Defense

Autonomous service dedicated to regalian uses

In addition to Masked Mode, which encrypts the display by default and allows selective decryption of a conversation before it automatically re-encrypts, CryptPeer integrates a third mode reserved for regalian uses: CryptPeer Defense.

This fully stealth version relies on segmented and ephemeral key encryption, operating in tunnel mode and volatile memory end-to-end between terminals and relay server. It operates without logs, with RAM-only encryption and volatile key management, guaranteeing the total absence of exploitable metadata and persistent digital traces. This system ensures an unparalleled level of confidentiality and resilience, designed for the most sensitive and strategic environments.

Autonomous service based on the same engine as CryptPeer, with its own engine and relay server optimized for regalian uses.

Why choose CryptPeer®?

The unique advantages that make CryptPeer® the reference solution

Zero Installation

Works on all devices worldwide — nothing to install. CryptPeer® is instantly accessible via web browser, without requiring a mobile or desktop application.

Works Without Internet

Local-only mode: full operation in closed network (air-gap), without Internet connection. Ideal for sensitive environments where network isolation is required.

100% Self-Hosted

Total control of your infrastructure. No dependency on third-party cloud or external provider. Deploy on your own server, from Raspberry Pi 5 to enterprise server.

Patented Technology

Patented segmented key authentication system. French-origin technology developed in Andorra. Recognized Innovation 2026.

French Sovereign Hardware

Compatible with Kubb Mini, DataShielder and other French sovereign hardware. 100% sovereign architecture, end-to-end.

Maximum Interoperability

Compatible with 60+ web browsers (Chrome, Firefox, Safari, Edge, Opera, Brave, Vivaldi, and all their forks). Works on smart TVs, consoles, embedded systems. CryptPeer® eliminates the hardware constraint of civil/military/regalian solutions: secure E2E communication between any devices (including hardened phones) via WiFi, without requiring a SIM card, between heterogeneous devices with total interoperability and an encryption level adapted to the most demanding needs. Full list →

Low Power Consumption

Runs on Raspberry Pi 5 with only 2.4 to 9 W consumption. Estimated annual cost: ~€8.10. The most economical and ecological solution on the market.

Network Undetectability

Thanks to local-only mode, compartmentalization and systematic encryption, CryptPeer® reduces the attack surface and makes detection complex.

RAM-Only Decryption

Decryption only in volatile memory. No persistent plaintext. Instant key obsolescence. Maximum security against physical attacks.

Ultra Portable & Autonomous

Deploy CryptPeer on ultra-compact mini-computers (KUBB Mini, Raspberry Pi 5). Fully autonomous and portable solution, ideal for mobile deployments, isolated terrains or sensitive environments. Works in nomadic mode without complex infrastructure.

Added Values

Total autonomy, real privacy, security by design

Total Autonomy & Sovereignty

No third-party cloud, no VPN, no external service. Local-only possible. You control your infrastructure.

Real Privacy

E2E on client side, blind relay, database/metadata encrypted upstream, zero exploitable metadata. The server never sees plaintext.

Security by Design

Segmented key authentication (patented), ephemeral key per message, RAM-only decryption, instant key obsolescence.

Natural Scalability

Starts from a microcomputer and scales to your largest platforms (enterprise server, NAS, VPS), without changing the model.

Simple & Granular Administration

Directory by categories (form → validation → restricted visibility), 1-click revocation, controlled repudiation, Server Manager.

High Resilience

Server-hopping, local-only mode, multi-instances, difficult to detect/stop. Manual switch to another relay (via Server Manager) — automation planned.

Partners

Our partners in France

AMG PRO

Official partner for distribution and support of CryptPeer® in France.

Discover on AMG PRO

Bleu Jour

Strategic partner for the development and promotion of sovereign solutions in France.

Discover Bleu Jour

Contact Us

A question? A project? Don't hesitate to contact us

CryptPeer® powered by Freemindtronic

R&D and development

Address

Andorra

Phone / Fax

+33 9 72 21 26 20
(Answering machine and fax only)

Opening Hours

Monday to Friday
8am - 1pm
2pm - 6pm

FullSecure

Distribution and commercial support

Address

Av. Coprincep de Gaulle, 13
Planta 1, Edifici Valira
AD700 Escaldes Engordany
Andorra

Information

For any commercial request,
technical support or information
about CryptPeer® solutions.

CryptPeer® Collaborative Platform

Exchange securely in a private end-to-end encrypted bubble from your terminals. Ideal for all types of relationships: enterprises, sovereign entities, partners. Secure messaging and video calls included.

New user? Request registration:

Click on "Sign up here"

FullSecure will activate your request and place you in the corresponding category for secure and collaborative exchange.

Alternative: Classic contact form

Access Fullsecure contact form

The form will open in a new tab