CryptPeer transforms the autonomous server into a self-contained sovereign infrastructure: an autonomous relay server and a self-contained server ready to operate on local network (LAN), wide area network (WAN) or isolated intranet, with link failover, automatic purge and storage management to preserve continuity.
- A sovereign autonomous server aims for operational control in LAN, WAN or isolated intranet.
- An autonomous relay server strengthens continuity through link failover, automatic purge and storage management.
- The self-contained server accelerates deployment in critical and mobile environments.
- Deployment on mini-computer (ARM / Raspberry Pi 5) makes sovereignty portable and duplicable.
Autonomy as a promise
Imagine a sovereign autonomous server that doesn't depend on any single central point and remains operational when "usual" paths degrade. CryptPeer fits into this logic: a sovereign federated architecture deployable on a local network (LAN), a wide area network (WAN) or an isolated intranet.
The objective is clear: preserve communication continuity without delegating technical control to external infrastructure, while maintaining secure communication without an imposed central point.
The autonomous relay server: encrypted continuity, purge and storage
The autonomous relay server acts as a sovereign secure communication node. It promotes continuity by combining link management (manual switching to another relay via Server Manager — automation planned) and automatic purge, to limit data persistence according to defined policies.
It is designed for end-to-end encrypted communication, with automatic purge and storage management, including in a disconnected environment when the context requires it.
The self-contained server: sovereignty in motion
With the self-contained approach, the infrastructure becomes a ready-to-use physical unit, portable and immediately operational. Plug in, initialize, and the server can become the heart of a secure network — on an industrial site, a mission, an event, or a constrained terrain.
The resilient self-contained server accelerates the transition from intention to operational: rapid deployment, reduced dependency, and enhanced continuity, including for an isolated local network.
Mini-computers: maximum impact
CryptPeer enables deployment on all types of computers running Linux (ARM / x86) to obtain a sovereign autonomous server adapted to local network (LAN), wide area network (WAN) or an isolated intranet. This format also covers uses of compact home mini-server: discrete, silent and energy-efficient, while remaining operational in the field.
The same logic extends from the compact format to dimensioned servers: the approach remains consistent, only the power level evolves. CryptPeer works on:
- ARM mini-computers: Raspberry Pi 5, Orange Pi, NanoPi, and other ARM platforms
- x86 processors: Intel, AMD and compatible architectures
- Enterprise servers: From mini-computers to dimensioned servers
- All Linux systems: Maximum compatibility for portable and duplicable sovereignty
Raspberry Pi 5: sovereignty at your fingertips
The Raspberry Pi 5 represents the perfect incarnation of the self-contained server concept. With its reduced dimensions (88mm × 58mm), minimal energy consumption (less than 5W in normal operation) and sufficient performance to manage encrypted communications, it becomes a strategic tool for sovereign deployments.
The advantages of Raspberry Pi 5 for CryptPeer include:
- Extreme portability: can be carried in a pocket or small bag
- Energy autonomy: can operate on portable battery or solar panel
- Deployment speed: operational in less than 30 minutes
- Resilience: proven and reliable ARM architecture
ARM platforms: the future of sovereign computing
ARM mini-computers offer an optimal compromise between performance, consumption and investment. Beyond the Raspberry Pi, other platforms like NanoPi, Orange Pi, or low-power Intel NUC solutions allow deploying CryptPeer on infrastructures adapted to each usage context.
Compatibility and Browsers
CryptPeer® uses Tailwind CSS v4.0 for its interface, which should ensure optimal compatibility with modern browsers. In principle, autonomous relay servers and self-contained servers should be able to be administered and used from all devices with a compatible web browser. If you encounter a compatibility issue, please report it immediately to the CryptPeer technical team.
Compatible Web Browsers
In principle, CryptPeer® should be compatible with all modern web browsers based on Chromium/Blink, Gecko (Firefox), and WebKit, which should ensure maximum interoperability and extensive backward compatibility. This comprehensive compatibility is a major added value for CryptPeer®. If you encounter a compatibility issue, please report it immediately to the CryptPeer technical team.
Main supported browsers:
- Chromium-based browsers: Google Chrome 111+, Microsoft Edge 111+, Opera 97+, Brave 1.49+, Vivaldi 5.7+, Arc Browser, Yandex Browser, Chromium, Ungoogled Chromium, Iridium Browser, Bromite, Epic Privacy Browser, and all Chromium forks
- Gecko-based browsers: Mozilla Firefox 128+, Firefox ESR, Tor Browser, Waterfox, LibreWolf, Pale Moon, Basilisk, and all Firefox forks
- WebKit-based browsers: Apple Safari 16.4+, Safari iOS, GNOME Web, Midori, Otter Browser, QupZilla, Konqueror
- Regional browsers: UC Browser, Baidu Browser, QQ Browser, 360 Browser, Maxthon, Naver Whale, and other Chromium-based browsers
- Smart TV browsers: Samsung Smart TV (Tizen), LG Smart TV (webOS), Android TV, Apple TV, Roku, Fire TV, PlayStation, Xbox, Nintendo Switch
- Embedded system browsers: Android Auto, Apple CarPlay, e-readers, smartwatches, embedded Linux systems
For the complete and detailed list of all compatible browsers, see our FAQ - Compatibility and Browsers.
Compatible Client Devices
CryptPeer® works on all devices with a compatible web browser:
- Android smartphones: Compatible from Android 7 (Nougat) minimum
- iPhones (iOS): Compatible via Safari iOS (iOS 12 or later versions)
- Tablets: Android and iOS
- Computers: Windows, macOS, Linux
- Smart TVs: Samsung Smart TV, Android TV, LG webOS, Tizen
- Connected video projectors: Compatible with integrated web browser
Important note — Precautionary principle: Some modern Tailwind CSS features may have limited support on older browsers. For an optimal experience, we recommend using a recent and up-to-date browser. If you encounter a compatibility issue with a browser mentioned, please report it immediately to the CryptPeer technical team. For more details on compatibility, see our FAQ - Compatibility and Browsers.
Concrete use cases
Missions and mobility
For teams on the move, diplomatic missions or field operations, a self-contained server on ARM mini-computer allows maintaining an independent secure communication infrastructure. The server can be activated in minutes, creating an isolated local network for the team, with the possibility of relaying to other nodes via link failover.
Critical infrastructure
Organizations operating in critical sectors (energy, transport, health, defense) require absolute continuity of communications. CryptPeer autonomous relay servers ensure this continuity even in case of:
- Degradation of main network links
- Network segmentation imposed by security policies
- Internet connectivity failures
- Need for temporary network isolation
Automatic purge and storage management ensure that sensitive data does not persist beyond durations authorized by security policies.
Humanitarian and field
In areas with limited or non-existent connectivity, humanitarian organizations can quickly deploy a sovereign autonomous server to create an isolated intranet enabling:
- Coordination of teams in the field
- Secure sharing of critical information
- Encrypted communication between distant sites
- Local storage of essential data
Organizations and SMEs
For companies concerned about their digital sovereignty, CryptPeer offers the possibility to:
- Host their own communications without depending on external cloud services
- Fully control their data and metadata
- Create a federated network between multiple sites or subsidiaries
- Optimize infrastructure investment thanks to mini-computers
Comparisons and typologies
| Typology | Characteristics | Advantages |
|---|---|---|
| Sovereign autonomous server | Sovereign bubble operated by the organization, accessible locally (LAN) or remotely (WAN) depending on context. | Control, independence, reduction of external dependency. |
| Autonomous relay server | Encrypted communication node with link failover, automatic purge and storage management. | Continuity, resilience, limitation of data persistence. |
| Self-contained server | Portable ready-to-use unit, quickly deployable (mini-computer / ARM / Raspberry Pi 5). | Portability, speed of implementation, "on-site" sovereignty. |
Strategic benefits
- Real digital sovereignty: each entity controls its infrastructure and operational perimeter.
- Enhanced security: end-to-end encrypted communication and federated organization without a single central point.
- Resilience: communication continuity via autonomous relay servers and link failover.
- Hardware flexibility: from ARM mini-computer to dimensioned server, without changing the approach.
- Operational durability: automatic purge and intelligent storage management according to policy.
FAQ
What's the difference between a sovereign autonomous server and a self-contained server?
The sovereign autonomous server describes a model: a sovereign bubble operated by the organization, independent and controlled. The self-contained server describes a form: a portable ready-to-use physical unit, designed for rapid on-site deployment.
What is an autonomous relay server used for?
It serves to maintain continuity of encrypted communications by relying on link management (manual switching to another relay via Server Manager — automation planned) and automatic purge mechanisms, with storage management, to reduce data persistence.
Can CryptPeer operate on an isolated intranet (without Internet)?
Yes: the isolated intranet precisely aims to maintain a local, controlled exchange perimeter when external connectivity is absent, limited or voluntarily cut.
How to deploy an autonomous relay server on Raspberry Pi 5 or ARM mini-computer?
The principle consists of installing CryptPeer on the hardware support, then defining the link strategy (failover) and the purge/storage policy adapted to the operational context (field, critical site, mobility, etc.).
What are the benefits of a sovereign federated architecture?
A sovereign federated architecture connects multiple autonomous bubbles without a single central point. It promotes continuity, adaptation to the field and resilience, while respecting the sovereignty of each entity.
In perspective
When infrastructure becomes portable, controlled and federable again, digital sovereignty ceases to be an abstraction. It becomes an operational capability: deploy, connect, failover, purge — and continue to communicate even when conditions degrade.
Autonomous relay servers, self-contained servers and sovereign mini-computers don't just replace existing solutions: they change the way we think about communication continuity in demanding environments.