All Features — CryptPeer®

This page is the complete functional reference for CryptPeer®: secure communication, sovereign collaboration, embedded administration, secure mail client, sovereign multilingual assistance and advanced security. It provides a structured reading of the platform’s full capabilities, organized by major feature families.

Created: 14/01/2025 Last update: 05/02/2026 Version: 2.1 Status: Published

Detailed reference by feature family

This page maps CryptPeer® core capabilities by feature family: 1:1 and group messaging, audio/video calling, secure file transfer, secure mail client with PGP, real-time collaborative notes, coordination polls, autonomous file encryption, administration, advanced security, multi-device interoperability and sovereign multilingual assistance. It is designed as a durable functional reference for evaluation, planning, deployment and operational alignment.

Created: 14/01/2025 Last update: 05/02/2026 Version: 2.1 Status: Published

Communication Features

CryptPeer® delivers a complete suite of secure communication and encrypted collaboration capabilities designed for self-hosted deployment, multi-device interoperability and licensee-controlled operations. The platform covers messaging, audio/video calls, secure file transfer, secure mail, sovereign translation, as well as collective coordination features such as flexible polls to organize a meeting, arbitrate choices or structure a decision.

To explore high-value operational use cases in more detail, also see: Secure File Transfer and Secure Mail Client.

No-account third-party transfer: encrypted file sharing to external recipients with controlled secret handling, configurable retention and automatic destruction, within a sovereignty-oriented operational model.

What others do — and what CryptPeer does beyond

Feature Cloud messengers Sovereign solutions CryptPeer®
60+ browser interoperability⚠️
P2P architecture without a single point of failure
Masked mode as an operational protection layer
Autonomous sovereign multi-bubbles⚠️
Local license without server-side database (EviEngine)
Sovereign Translator tool with 50+ languages
Secure mail client with per-account PGP and differentiated sender-side mailbox protection⚠️⚠️

Distinctive CryptPeer capabilities

Reference set of major functional differentiators: sovereign, self-hosted and operationally controlled capabilities that very few solutions combine in one secure communication, collaboration and embedded administration architecture.

  1. Self-hosting / Sovereignty
  2. Real self-hosting / zero vendor or third-party dependency
  3. 60+ browser interoperability
  4. P2P architecture without a single point of failure
  5. Masked mode (network undetectability)
  6. Autonomous sovereign multi-bubbles
  7. EviEngine license without server or database
  8. HSM integration (PassCypher/EviKey)
  9. Large file transfer with signature and integrity control
  10. Local-only mode (air-gap)
  11. Real-time collaborative notes with PDF export and document validation via the group
  12. Server-hopping / extreme resilience
  13. Zero installation (browser-based access)
  14. Sovereign Translator tool with 50+ languages
  15. Automatic storage management for operational continuity
  16. Secure mail client with per-account PGP
  17. Differentiated sender-side sent mailbox encryption
  18. Flexible polls for coordination, collective arbitration and meeting organization
  19. Connection between communication, group coordination and shared calendar workflows
  20. Interface available in 18 languages

Account and access

Complete user account lifecycle management.

  • Register: account creation through a form with administrator validation.
  • Log in: access restricted to active accounts.
  • Two-factor authentication (2FA): TOTP-based activation from the profile.
  • Change password: secure update from the profile.
  • Log out: secure session exit.

Differentiator: Zero installation — Maximum interoperability

CryptPeer® delivers broad compatibility across more than 60 web browsers, ensuring high interoperability and extended backward compatibility.

  • Chromium/Blink-based browsers: Chrome, Edge, Opera, Brave, Vivaldi, Arc, Yandex, Ungoogled Chromium, Iridium, Bromite and compatible forks.
  • Gecko-based browsers: Firefox, Tor Browser, Waterfox, LibreWolf, Pale Moon and related forks.
  • WebKit-based browsers: Safari, GNOME Web, Midori, Otter Browser and compatible forks.
  • Regional browsers: UC Browser, Baidu, QQ Browser, 360 Browser, Maxthon, Naver Whale.
  • Smart TVs and embedded systems: Samsung Smart TV, LG Smart TV, Android TV, Apple TV, PlayStation, Xbox, Nintendo Switch.

Strategic advantage: access to secure communication from virtually any modern browser-enabled device, without forcing local installation. See the full compatibility list →

Translator tool — Multilingual language assistance (messaging & email)

Beyond encryption, CryptPeer® includes a dedicated Translator tool and a layer of multilingual language assistance for instant messaging and the secure mail client, fully self-hosted and able to operate without Internet access.

  • More than 50 supported languages for translation.
  • Voice input compatibility through Android and Apple voice recognition.
  • File import and translation with embedded OCR.
  • Translation and drafting assistance within the CryptPeer® environment.
  • No leakage to connected AI services.
  • Cybersecurity and confidentiality gains through reduced exposure to external cloud services.
  • Per-contact language profile.
  • Sovereign travel use without cloud dependency.

1:1 & Group messaging

CryptPeer® enables individual messaging and group conversations with customizable channels and access policies in a self-hosted, end-to-end encrypted environment.

  • Individual messaging: private E2E communication.
  • Send text, photos, videos, audio and files from one interface.
  • Real-time delivery with configurable notifications.
  • Reply and edit messages.
  • Multiple groups and thematic channels.
  • Access policies with granular visibility and permissions.

Polls & Coordination

CryptPeer® includes a flexible polling feature directly inside the communication environment to support team coordination, collective decision-making, operational organization and meeting preparation. Connected to planning and shared calendar use cases, this capability goes beyond simple time-slot selection: it can also arbitrate choices, collect preferences, structure consultations and organize collective actions in a sovereign environment.

  • Create a poll with a title and multiple response options.
  • Add options dynamically depending on the business, organizational or operational context.
  • Allow multiple answers per participant depending on the selected logic.
  • Organize a meeting date, a time slot, shared availability or a collective preference.
  • Support arbitration workflows: action choices, priorities, team decisions, mission planning or project coordination.
  • Integrated coordination layer: used directly from the communication platform, without a third-party tool.
  • Connection with a shared calendar to prepare, arbitrate or confirm a meeting in continuity with group exchanges.

Private chat — Conversations and Masked groups

Dedicated area for masked conversations and groups, hidden from ordinary lists.

  • View masked conversations and groups only in the “Private” section.
  • Create a masked conversation from the creation flow.
  • Create a masked group with members and description.

Group participant management

Flexible participant management with governance, traceability and continuity of administration.

  • Create a group and invite members.
  • View members and roles, assign administrators or transfer ownership.
  • Add / remove participants under access policies.
  • Voluntary departure for each participant.
  • Administration transfer before the owner leaves.
  • Secure governance with logging of management actions.

Audio / Video calls

Individual audio and video calls, as well as group conferencing, in a private self-hosted environment with end-to-end protection.

  • Launch a call from a chat or a group.
  • One-to-one calls and group conferencing.
  • Accept or refuse a call from a dedicated prompt.
  • Private environment via self-hosted relay server.
  • Remote access depending on network configuration.

Files & Memos

Large file transfers with encryption and E2E protection, with encrypted or decrypted import choices.

  • Drag and drop or one-click selection.
  • Large-capacity transfers with E2E protection.
  • Configurable limits according to organizational policy.
  • Import choice: encrypted or decrypted.
  • File signature and integrity verification.
  • Decryption space chosen by the user.
  • Conversation and group export into protected files.

Timestamped large file transfer — Sensitive file backup

Distinctive capability: large file transfer with timestamping, signature and integrity verification for secure storage and sensitive file lifecycle handling.

Value add: many dedicated MFT solutions price secure large file transfer as a separate product layer. CryptPeer® integrates this capability natively into its broader E2E suite.
  • Integrated timestamping for traceability.
  • Signature / Integrity verification.
  • Sensitive file backup across multiple storage options.
  • Lifecycle tracking.
  • Compliance support for audit and governance scenarios.

Advanced file encryption/decryption

Complete lifecycle handling of encrypted files with native encryption and on-demand decryption.

  • Native encryption for files.
  • On-demand decryption.
  • Lifecycle control.
  • User transparency.

Autonomous data encryption outside exchanges

CryptPeer® also enables autonomous file encryption and decryption outside messaging or transfer workflows, directly from the interface. This extends the platform to local data protection, sensitive document preparation and secure handling of content before circulation, archival or transport.

  • Encrypt a file directly from the interface using the user identity.
  • Decrypt a file on the authorized user side.
  • Protect data outside conversations for documentary, operational or storage use cases.
  • Sovereignty continuity between secure exchanges and autonomous content protection.

Audio/Video recordings

Audio and video recordings captured locally and then sent in encrypted form.

  • Local capture on the terminal.
  • Encrypted transmission.
  • Secure storage in user-selected space.

Self-destructing messages

Messages that are automatically deleted after reading in order to reinforce confidentiality.

  • Configurable delays after reading.
  • Enhanced confidentiality through reduced long-term retention.

Notes, collaborative notes & PDF export

Protected notes can be created with real-time collaborative editing, making them suitable for coordination, content preparation, collective drafting and operational document formalization. In addition to the standard web editing functions available from the toolbar, including image insertion, CryptPeer® also enables PDF export of the note, followed by use in a validation workflow or group-based signature process.

  • Create a note with title and encrypted content.
  • Real-time collaborative editing so several participants can consult and modify the same note simultaneously.
  • Complete web editing toolbar with standard formatting, content structuring and visual insertion functions.
  • Image insertion directly inside the note to enrich a report, instruction, procedure or working document.
  • Export the note as PDF to produce a document that can be circulated, archived or formalized outside the active note.
  • Group-based signature workflow for the exported document, useful for approved reports, MOUs, preliminary agreements, contracts and other binding documents.
  • Extended operational use: meeting preparation, collaborative drafting, internal validation, document formalization and circulation of a ready-to-sign file.

Email

The CryptPeer mail client centralizes email handling within the platform, with support for multiple accounts, PGP integration, app-password guidance and built-in translation features. See the secure mail client feature sheet →

  • Standard and advanced IMAP/SMTP configuration.
  • Message reading and folder organization.
  • Compose, reply, forward and attach files from the webmail interface.
  • Per-account PGP with key import, export and creation.
  • PGP contacts for encrypting outbound email to registered recipients.
  • Automatic sender-side sent mailbox encryption on the CryptPeer user terminal depending on the active configuration, which is a strong differentiating value compared with many email clients.

Profile and categories

Manage your personal profile and organizational categories.

  • Profile: identity, visibility settings, photo, notifications and 2FA.
  • Categories: departments assigned by administrators.
  • Export and consult your data.

Search and creation

Search for users and create conversations or groups.

  • Search users by name.
  • Create a conversation, normal or masked.
  • Create a group with description and members.

Translator tool & language assistance

The interface is available in 18 languages offline. The dedicated Translator tool handles 50+ languages, voice recognition, file import with OCR and multilingual assistance for messaging and the mail client, without leaking content to cloud-based AI services.

  • Offline multilingual interface: 18 interface languages.
  • 50+ translation languages for messaging and email.
  • Display obfuscation with selective decryption.
  • Temporary RAM view for on-demand plaintext reading.

All devices — Zero installation — Ultra mobile

CryptPeer® runs on computers, phones, tablets, smart TVs and other compatible terminals without requiring local software installation.

  • All devices: multi-device access.
  • Nothing to install: instant browser-based operation.
  • Ultra mobile: use from almost anywhere.
  • App-like UX without native installation.
  • Auto-configuration on the display side.

Administration & IT integrations

Administration panel access

Only administrator-role users can access the administration panel.

  • Panel tabs: Users, Categories, Direct Contacts, Requests, Logs, Database, Storage.
  • Pending request badge updated in real time.

Directory / SSO (ultra-simple principle)

Integrated request flow, administrator validation and category-based compartmentalization.

  • Categories: teams, projects, clients, partners, crisis cells and inter-site structures.
  • Restricted visibility limited to relevant categories.
  • SSO alignment with enterprise policies.

Advanced category management — Anti-espionage protection

Advanced category administration with protection against contact-dictionary-driven intelligence gathering.

  • Category creation and custom administration.
  • Contact assignment with granular control.
  • Anti-espionage protection through invisible contact dictionaries.
  • Strict typological compartmentalization.
  • Browser-based admin.
  • Enhanced organizational security.

User management

  • View all users.
  • Assign categories.
  • Activate or deactivate an account.
  • Grant or remove administrator role.
  • View registration reason.
  • Delete a user.
  • Activity log.

Category management

  • View categories.
  • Create a category.
  • Assign users to a category.
  • Delete a category.

Direct contacts

Define directly reachable contacts without requiring a shared category.

  • View direct contacts.
  • Add or remove direct contacts.

Requests

  • Registration requests with validation or refusal.
  • Category change requests.

Logs (activity log)

Review administrative actions and decisions.

Database

Consult application data through tables with search and pagination, without direct database access.

Access governance

  • Administrator revocation (1 click).
  • Repudiation between contacts.

Operations & supervision

  • Server Manager: on-the-fly relay switching.
  • Admin gauges: latency, throughput, simultaneous capacity.
  • Server hardware status.
  • Encrypted backups.

Export/Import restorable discussions

Full conversation export and import for restoration.

  • Complete export.
  • Restoration import.
  • Total portability.
  • Operational continuity.

Export/Import group lists

Export and import of organizational group structure.

  • Group structure export.
  • Migration import.
  • Organizational portability.
  • Continuity.

Multi-Bubble Manager — Multi-autonomous relay server access

URL manager for accessing multiple private CryptPeer bubbles.

  • Autonomous relay servers.
  • URL manager.
  • Local or remote access.
  • Multi-bubbles.
  • Multiple tabs.
  • Authorized access.
  • Extreme portability.
  • Total isolation.
  • Multi-entity organizations.
CryptPeer® signature: an uncommon combination of autonomy, sovereignty and operational security in a single platform.

Automatic storage management — Operational continuity

Automatic and intelligent storage management designed to maintain relay server operability over time.

  • Automatic purge for messages.
  • Intelligent deletion.
  • Intelligent file purge.
  • Priority for already downloaded files.
  • Guaranteed operational continuity.
  • Proactive management.

Upload configuration

  • Disk usage visibility.
  • Global rules for file types and file sizes.

Storage capacity: on a 256 GB disk, CryptPeer® can preserve encrypted discussion backups for 25 to 35 years for 200 users without purge, and indefinitely with automatic purge. See the dedicated storage sizing page.

Sovereignty & Operator control

CryptPeer® is a sovereign system designed in line with Sovereignty by Design and Operator Exclusivity. No third party, cloud provider or external service controls encryption, storage or routing.

  • Total control of keys and servers by the operator.
  • RAM-only handling without durable plaintext persistence.
  • Zero Cloud and Zero Trust architecture.
  • Verified symmetric quantum resilience (SHA-3, AES-256).

Embedded administration & advanced security

Embedded administrator space

CryptPeer® natively includes an embedded administrator space allowing the platform to be used and administered from one unified web environment.

  • Intuitive interface.
  • Click-based management.
  • Minimal typing.
  • Reduced learning curve.

Always encrypted database

Even database access remains secured: it is always encrypted. Keys are generated on user terminals.

  • Permanent encryption.
  • Terminal-side key generation.
  • User-controlled key ownership.
  • Enhanced security posture.
Strength: administration and support do not automatically imply access to plaintext content.

PassCypher HSM PGP & NFC HSM compatibility

CryptPeer® is compatible with PassCypher HSM PGP and NFC HSM, enabling strong passphrase handling and multi-factor authentication without conventional keyboard entry. Learn more.

  • PassCypher HSM PGP.
  • NFC HSM.
  • Passphrases > 256 bits.
  • Keyboard-free authentication.
  • Multi-factor authentication.
  • Maximum protection.

Administration simplicity

CryptPeer® is designed to be administered without specialized skills, with a near-zero learning curve.

  • Intuitive interface.
  • Integrated documentation.
  • Guided setup.
  • Simplified maintenance.
  • Minimal training.

EviEngine — Sovereign license system

CryptPeer® integrates Freemindtronic’s EviEngine technology for license handling without servers or databases.

  • Hardware-based license.
  • No server or database.
  • Preserved anonymity.
  • Offline operation.

Advanced security features

Masked CryptPeer mode — Advanced visual protection

Distinctive capability: Masked mode adds a strong visual protection layer against observation-based threats.

  • Two CryptPeer environments in one: standard mode and masked mode as autonomous spaces.
  • Encrypted by default, plaintext on demand.
  • Protection against visual attacks and capture.
  • On-demand decryption.
  • Download choice.
  • Autonomous contacts and groups.
  • Need-to-know alignment.
Operational value: meaningful reduction of visual exposure in sensitive working environments.

P2P architecture — DDoS & denial-of-service resistance

Distinctive capability: P2P architecture with autonomous relay servers, avoiding centralized failure concentration.

  • No centralized server.
  • Autonomous relay servers.
  • DDoS resistance.
  • Denial-of-service resistance.
  • No single point of failure.
  • Enhanced resilience.
  • Continuity under pressure.

See also