1:1 & Group Messaging
Individual messaging and groups (channels, access policies). Multiple groups per user with simultaneous presence in various groups.
E2E encrypted private communication suite, works on all devices worldwide — nothing to install: computer, phone, tablet, smart TV, media. Ultra mobile.
Built on an autonomous self-hosted low-power relay server. Designed to start from a microcomputer and scale to your largest platforms — from Raspberry Pi 5 to enterprise server, NAS and VPS. Andorran R&D, sovereign architecture.
Access the locally self-hosted version of the CryptPeer team. Operational version accessible online to test end-to-end encrypted private messaging.
https://test.cryptpeer.com/login
New test server: CryptPeer is now accessible worldwide via a dedicated server installed on a KUBB Mini Fanless by Bleu Jour (French manufacturer and partner of FullSecure, distributor of Freemindtronic solutions). Beta version v1.2 — now works without external VPN.
View all updates and changesTo enable the video calls via WebRTC feature (without WireGuard, only messaging is available):
Note: Without WireGuard, you can use CryptPeer for messaging, but video calls will not be available.
Andorran R&D · Sovereign architecture · Zero intermediary · Zero delegation · Zero collection
Patented segmented key authentication system. French-origin technology developed in Andorra.
Sovereign architecture: zero intermediary, zero delegation, zero collection. Compatible with French sovereign hardware (Kubb Mini, DataShielder).
EviEngine: License system based on motherboard serial number (not on identity), without server or database. Enables operation in offline local network.
CryptPeer is compatible with PassCypher HSM PGP, NFC HSM, DataShielder HSM PGP and NFC HSM to over-encrypt data, messages and files upstream before sending from these hardware security modules (HSM).
Designed and developed in Andorra in Europe, based on French-origin patents. Sovereign technology, independent of tech giants. Respects international data protection standards.
Raspberry Pi 5 (minimum configuration) to Intel/AMD mini-PCs, desktop PCs, NAS and Linux VPS
Fully autonomous solution, integrates into any existing infrastructure, works in local closed network
Firewall/router configuration (NAT / reverse proxy) + domain name/subdomain for Let's Encrypt
Messaging, audio/video calls, file transfers — all E2E encrypted
Individual messaging and groups (channels, access policies). Multiple groups per user with simultaneous presence in various groups.
Individual A/V calls and conferences in private self-hosted environment. Remote access possible depending on network configuration.
Large capacity file transfers (E2E). Sovereign choice: download your files encrypted or decrypted according to your security level and storage medium. File signing. In the message window, choose to download images and videos encrypted or decrypted.
Full control of your phone's front and rear cameras for video calls, photo capture and video recording encrypted. Switch freely between cameras during calls. All multimedia content is end-to-end encrypted before sending.
Audio/video recordings: captured locally then sent encrypted. Decryption space at user's free choice.
14+ offline languages (interface language). Display obfuscation with selective decryption (temporary view in RAM).
Works on all devices worldwide — nothing to install: computer, phone, tablet, smart TV, media. Ultra mobile. "App-like" UX: auto-configuration on display side, feeling of installed application without real installation.
Create your favorite server list to quickly and freely switch between different CryptPeer instances. Change servers with one click: organization server, client server, remote instance. Maximum resilience and total flexibility.
Collaborative platform with advanced protection and secure backup functions
Redundant encrypted backup system: backup your data redundantly on multiple media (USB, SSD, cloud, NAS, external drive). Automatic timestamping to prevent overwriting. Large file support. Planned evolution: integrated malicious file analysis.
Thanks to Encrypted Backup 3.2.1, each backup is timestamped and distributed across multiple media, including the cloud. Thus, when a ransomware attempts to re-encrypt everything, at least one copy remains intact. The user can then restore their data from this preserved medium, ensuring continuity despite the attack.
Data encrypted with CryptPeer is unexploitable even if stolen by infostealers. End-to-end encryption prevents extraction of sensitive data even if malware accesses the files.
CryptPeer offers complete defense against espionage, whether remote (cyberattacks, unauthorized access) or proximity (prying eyes, screenshots). Data remains unreadable without your key, even if the medium is compromised. To strengthen this confidentiality, a masked mode allows displaying information directly in encrypted form by default, thus reducing any risk of involuntary exposure.
Without your user key, stolen data is unusable. Encryption based on your unique user ID. Even in case of physical theft of the storage medium, data remains protected and unreadable.
Autonomous masked mode: all data remains encrypted on screen by default. Selectively decrypt a conversation by clicking the lock button, which automatically re-encrypts. Significantly reduces the risk of screenshot or unauthorized viewing.
With CryptPeer, your sensitive files remain under your exclusive control. Each encryption or decryption operation relies on your unique user ID, ensuring that only you can access data protected by your account. Whether encrypting a document to secure it or decrypting it to view it, you maintain total control over your information, safe from any intrusion.
With CryptPeer, your conversations never truly disappear. Three export and import modes give you total control: raw JSON code for technical use, discussion mode to retrieve your exchanges as they were, or complete restoration with the ability to activate or deactivate certain contacts. Thus, even a thread deleted voluntarily or by mistake can be brought back to life, restoring the continuity of your exchanges at your convenience.
From Raspberry Pi 5 to enterprise server — natural scalability
Blind transit role (never sees plaintext), database & metadata encrypted upstream. Compatible Raspberry Pi 5, mini-PC, NAS, Linux VPS.
CryptPeer has been successfully installed on various mini-computer configurations, demonstrating its versatility and self-portability capabilities:
French fanless mini-PC, ultra-compact and silent. Ideal for discrete and mobile deployments.
Economical micro-computer, minimal consumption. Perfect for testing and light deployments.
Total energy autonomy. Ideal solution for isolated terrains and outdoor operations.
These examples illustrate the plurality of CryptPeer installation possibilities, even on mini-computers, highlighting the self-portable aspect and deployment flexibility.
Computer, smartphone, tablet, TV/media — zero installation, immediate use. Offline multilingual interface (14+ languages).
Maximum interoperability: Compatible with 60+ web browsers (Chrome, Firefox, Safari, Edge, Opera, Brave, Vivaldi, and all their Chromium/Gecko/WebKit forks). Works on smart TVs (Samsung, LG, Android TV), consoles (PlayStation, Xbox, Switch), and embedded systems. CryptPeer® eliminates the hardware constraint of civil/military/regalian solutions: secure E2E communication between any devices (including hardened phones) via WiFi, without requiring a SIM card, between heterogeneous devices with total interoperability and an encryption level adapted to the most demanding needs. See full list →
Local-only: closed network (private Wi-Fi AP), without SIM/Internet.
Remote: firewall/router configuration (NAT / reverse proxy) + domain name/subdomain for Let's Encrypt.
PassCypher NFC HSM (Android NFC) & PassCypher HSM PGP (PC) for master passphrase > 256 bits. Secure secret storage.
Patented segmented key authentication system — security by design
The server never gets plaintext; it only relays. Database and metadata encrypted upstream, zero exploitable metadata.
One derived key per conversation/group. Ephemeral key per message: one unique key per message. Compromising one message provides no information about others.
Decryption in volatile memory only, without persistent plaintext. Brief & controlled display window. Immediate zeroization of buffers after reading.
The message key becomes invalid on any interface/system event (tab change, window, scroll, etc.).
The relay server processes only encrypted data. Auto-purge of unrecovered files in case of saturated SSD/SD.
Designed for the most demanding security and sovereignty needs
Protection of sensitive exchanges between diplomatic missions, embassies and consulates. Guaranteed sovereign architecture.
Secure communications for tactical operations. Local-only mode, network undetectability, maximum resilience.
Operation in isolated closed network (air-gap). No Internet connection required. Compatible with French sovereign hardware.
Protection of critical data for strategic companies, public institutions, sensitive research centers.
Anonymous communications with pseudonyms. No collection of exploitable metadata. Network undetectability.
Total control of infrastructure. Zero cloud dependency. Compatible with French sovereign hardware (Kubb Mini, DataShielder).
Autonomous service dedicated to regalian uses
In addition to Masked Mode, which encrypts the display by default and allows selective decryption of a conversation before it automatically re-encrypts, CryptPeer integrates a third mode reserved for regalian uses: CryptPeer Defense.
This fully stealth version relies on segmented and ephemeral key encryption, operating in tunnel mode and volatile memory end-to-end between terminals and relay server. It operates without logs, with RAM-only encryption and volatile key management, guaranteeing the total absence of exploitable metadata and persistent digital traces. This system ensures an unparalleled level of confidentiality and resilience, designed for the most sensitive and strategic environments.
Autonomous service based on the same engine as CryptPeer, with its own engine and relay server optimized for regalian uses.
The unique advantages that make CryptPeer® the reference solution
Works on all devices worldwide — nothing to install. CryptPeer® is instantly accessible via web browser, without requiring a mobile or desktop application.
Local-only mode: full operation in closed network (air-gap), without Internet connection. Ideal for sensitive environments where network isolation is required.
Total control of your infrastructure. No dependency on third-party cloud or external provider. Deploy on your own server, from Raspberry Pi 5 to enterprise server.
Patented segmented key authentication system. French-origin technology developed in Andorra. Recognized Innovation 2026.
Compatible with Kubb Mini, DataShielder and other French sovereign hardware. 100% sovereign architecture, end-to-end.
Compatible with 60+ web browsers (Chrome, Firefox, Safari, Edge, Opera, Brave, Vivaldi, and all their forks). Works on smart TVs, consoles, embedded systems. CryptPeer® eliminates the hardware constraint of civil/military/regalian solutions: secure E2E communication between any devices (including hardened phones) via WiFi, without requiring a SIM card, between heterogeneous devices with total interoperability and an encryption level adapted to the most demanding needs. Full list →
Runs on Raspberry Pi 5 with only 2.4 to 9 W consumption. Estimated annual cost: ~€8.10. The most economical and ecological solution on the market.
Thanks to local-only mode, compartmentalization and systematic encryption, CryptPeer® reduces the attack surface and makes detection complex.
Decryption only in volatile memory. No persistent plaintext. Instant key obsolescence. Maximum security against physical attacks.
Deploy CryptPeer on ultra-compact mini-computers (KUBB Mini, Raspberry Pi 5). Fully autonomous and portable solution, ideal for mobile deployments, isolated terrains or sensitive environments. Works in nomadic mode without complex infrastructure.
Total autonomy, real privacy, security by design
No third-party cloud, no VPN, no external service. Local-only possible. You control your infrastructure.
E2E on client side, blind relay, database/metadata encrypted upstream, zero exploitable metadata. The server never sees plaintext.
Segmented key authentication (patented), ephemeral key per message, RAM-only decryption, instant key obsolescence.
Starts from a microcomputer and scales to your largest platforms (enterprise server, NAS, VPS), without changing the model.
Directory by categories (form → validation → restricted visibility), 1-click revocation, controlled repudiation, Server Manager.
Server-hopping, local-only mode, multi-instances, difficult to detect/stop. Manual switch to another relay (via Server Manager) — automation planned.
Our partners in France
Strategic partner for the development and promotion of sovereign solutions in France.
Discover Bleu JourA question? A project? Don't hesitate to contact us
R&D and development
Andorra
+33 9 72 21 26 20
(Answering machine and fax only)
Monday to Friday
8am - 1pm
2pm - 6pm
Distribution and commercial support
Av. Coprincep de Gaulle, 13
Planta 1, Edifici Valira
AD700 Escaldes Engordany
Andorra
For any commercial request,
technical support or information
about CryptPeer® solutions.
Exchange securely in a private end-to-end encrypted bubble from your terminals. Ideal for all types of relationships: enterprises, sovereign entities, partners. Secure messaging and video calls included.
New user? Request registration:
Click on "Sign up here"FullSecure will activate your request and place you in the corresponding category for secure and collaborative exchange.