Communication Features — CryptPeer®

Discover all CryptPeer® features: 1:1 and group messaging, audio/video calls, file transfers, A/V recordings, multilingual interface. 11 unique features that no one else offers: zero installation, self-portable, masked mode, multi-server portability, DDoS resistance, automatic storage management, and much more. Works on all devices worldwide — nothing to install: computer, phone, tablet, smart TV, media. Maximum interoperability: compatible with 60+ web browsers (Chrome, Firefox, Safari, Edge, Opera, Brave, Vivaldi, and all their forks) — no competitor offers this exhaustive compatibility. Ultra mobile.

Created on : 01/14/2025 Last updated : 01/14/2025 Version : 1.0 Status : Published

Communication Features

CryptPeer® offers a complete suite of end-to-end encrypted private communications, without installation on terminals. Discover all available features.

Differentiator #1: Zero Installation — Maximum Interoperability

CryptPeer® is the only one to offer exhaustive compatibility with 60+ web browsers, ensuring maximum interoperability and extended retro-compatibility.

  • Chromium/Blink-based browsers: Chrome, Edge, Opera, Brave, Vivaldi, Arc, Yandex, Ungoogled Chromium, Iridium, Bromite, and all their forks (20+ browsers)
  • Gecko-based browsers: Firefox, Tor Browser, Waterfox, LibreWolf, Pale Moon, and all their forks (9 browsers)
  • WebKit-based browsers: Safari, GNOME Web, Midori, Otter Browser, and all their forks (7 browsers)
  • Regional browsers: UC Browser, Baidu, QQ Browser, 360 Browser, Maxthon, Naver Whale (8+ browsers)
  • Smart TVs and embedded systems: Samsung Smart TV, LG Smart TV, Android TV, Apple TV, PlayStation, Xbox, Nintendo Switch (9+ platforms)

Strategic advantage: CryptPeer® works on virtually all modern web browsers, ensuring universal access without technical constraints. CryptPeer® eliminates the hardware constraint of civil/military/regalian solutions: secure E2E communication between any devices (including hardened phones) via WiFi, without requiring a SIM card, between heterogeneous devices with total interoperability and an encryption level adapted to the most demanding needs. See full detailed list →

1:1 & Group Messaging

CryptPeer® enables individual messaging and groups with customizable channels and access policies. Each user can belong to multiple groups simultaneously, facilitating communication within teams, projects, clients, partners, crisis cells, or inter-site.

  • Individual messaging: E2E encrypted private communication between two users
  • Multiple groups: A user can be present in several groups at the same time
  • Channels: Organization of conversations by thematic channels
  • Access policies: Granular control of permissions and visibility

Group Participant Management

CryptPeer® offers complete and flexible participant management within groups, providing total control over group composition and administration.

  • Add participants: The group administrator can add new participants at any time, respecting defined access policies
  • Remove participants: The administrator can remove participants from the group according to organizational needs
  • Voluntary departure: Each participant can leave the group autonomously at any time
  • Administration transfer: If the creator/administrator wishes to leave the group, they must designate a new administrator among existing participants before leaving, ensuring group management continuity
  • Secure governance: All management operations are tracked and secured, preserving group integrity and confidentiality

Audio / Video Calls

Individual audio/video calls and conferences in a private self-hosted environment. All calls are end-to-end encrypted, ensuring the confidentiality of your communications.

  • Individual calls: Secure A/V communication one-on-one
  • Group conferences: Multi-participant calls with permission management
  • Private environment: All calls transit through your self-hosted relay server
  • Remote access: Possible depending on network configuration (NAT, reverse proxy, Let's Encrypt)

Files & Memos

Large-capacity file transfers with E2E encryption. The recipient can choose to import files encrypted or decrypted according to their needs.

  • Large-capacity transfers: Large files supported with E2E encryption
  • Import choice: Encrypted import or decrypted import according to preferences
  • File signature: Integrity and authenticity verification
  • Decryption space: Storage at user's free choice

Timestamped Large File Transfer — Sensitive File Backup

Unique CryptPeer® feature: Large file transfer with integrated timestamping, enabling secure backup of sensitive files on any media.

  • Integrated timestamping: Each transferred file is timestamped for complete traceability
  • Sensitive file backup: Secure storage on any media (external drive, private cloud, etc.)
  • Lifecycle management: Complete tracking of sensitive file lifecycle
  • Enhanced compliance: Timestamping for audits and regulatory compliance

Advanced File Encryption/Decryption

Complete lifecycle management of encrypted files: Native encryption and on-demand decryption with total user control.

  • Native encryption: Automatic encryption of all files
  • On-demand decryption: Decryption only when necessary
  • Complete management: Total control of encrypted file lifecycle
  • User transparency: Transparent process for end users

Audio/Video Recordings

Audio/video recordings captured locally then sent encrypted. Ideal for voice memos, video messages, or recorded conferences.

  • Local capture: Recordings made on the user's terminal
  • Encrypted sending: All recordings are encrypted before transmission
  • Secure storage: Decryption space at user's free choice

Multilingual Interface

Interface available in 14+ languages offline. The interface language is configurable, but messages are not automatically translated (respect for confidentiality).

  • 14+ languages: Offline multilingual support for the interface
  • Display obfuscation: Interface always encrypted with selective decryption
  • Temporary view in RAM: Decryption only for display, immediate erasure after reading

All Devices — Zero Installation — Ultra Mobile

CryptPeer® works on all devices worldwide — nothing to install: computer, phone, tablet, smart TV, media. Ultra mobile. The user experience is "app-like" with automatic display configuration.

  • All devices: Computer, phone, tablet, smart TV, media — works everywhere in the world
  • Nothing to install: No installation required, instant operation on all devices
  • Ultra mobile: Access from any device, anywhere, anytime
  • App-like UX: Feel of installed application without actual installation
  • Auto-configuration: Automatic display-side configuration, ready to use immediately

Administration & IT Integrations

Directory / SSO (Ultra-Simple Principle)

Request via integrated form: the user proposes one or more attachment categories. Administrator validation: assignment/refusal of categories. A validated contact only sees contacts from their assigned categories.

  • Categories: Teams, projects, clients, partners, crisis cells, inter-site
  • Restricted visibility: Each user only sees contacts from their categories
  • SSO alignment: Compatible with company N-factor policies

Advanced Category Management — Anti-Espionage Protection

Unique CryptPeer® feature: Advanced category administration with protection against espionage via contact dictionary.

  • Category creation: Admin can create and manage custom categories
  • Contact assignment: Contact assignment by category with granular control
  • Anti-espionage protection: No visible contact dictionary (protection against espionage)
  • Strict compartmentalization: Strict organizational separation by categories
  • Browser-based admin: Zero-installation administrative interface, hyper user-friendly
  • Enhanced security: Protection against contact leaks and organizational espionage

Access Governance

  • Administrator revocation (1 click): The contact immediately loses access to servers
  • Repudiation between contacts: Messages sent by the repudiated remain accessible; they lose access to the other's responses

Operations & Supervision

  • Server Manager: On-the-fly relay change (organization, client server, remote instance)
  • Admin gauges: A/V latency/jitter, throughput, simultaneous capacity (conferences), Pi 5 consumption
  • Server hardware status: Useful information feedback (health, load, occupancy)
  • Encrypted backups: Database backup and restoration of encrypted messages with user keys

Export/Import Restorable Discussions

Unique CryptPeer® feature: Complete conversation export and import for restoration, ensuring total data portability.

  • Complete export: Export of all conversations with complete structure
  • Restoration import: Complete restoration of conversations from an export
  • Total portability: Facilitated migration between servers or complete backup
  • Operational continuity: Facilitated recovery after incident or migration

Export/Import Group Lists

Unique CryptPeer® feature: Export and import of group organizational structure for continuity and migration.

  • Group structure export: Export of group composition and organization
  • Migration import: Restoration of complete organizational structure
  • Organizational portability: Complete organization migration between servers
  • Continuity: Recovery after incident with preserved organizational structure

Multi-Bubble Manager — Multi-Autonomous Relay Server Access

Unique CryptPeer® feature: URL link manager enabling access to multiple private bubbles (autonomous CryptPeer relay servers) to which you have authorized access. Each relay server is an independent private bubble belonging to a distinct entity.

  • Autonomous relay servers: Each relay server operates completely independently and belongs to a distinct entity
  • URL manager: Centralized address book of your accessible private bubbles (relay servers)
  • Local or remote access: Depending on network configuration, connection possible via LAN (local network) or from outside (Internet)
  • Multi-bubbles: Simultaneous access to multiple autonomous relay servers from the same browser
  • Multiple tabs: Multiple tabs or bookmarks to different CryptPeer servers
  • Authorized access: Each bubble = access authorized by the entity owning the relay server
  • Extreme portability: Access to your bubbles from any terminal, anywhere
  • Total isolation: Each bubble is completely isolated and independent
  • Multi-entity organizations: Access to multiple bubbles from different entities from a single terminal

Automatic Storage Management — Operational Maintenance

Unique CryptPeer® feature: Automatic and intelligent storage space management to ensure relay server operational maintenance.

  • Automatic message purge: Retention period configuration (1 to 10 years) by admin
  • Intelligent deletion: On overflow, automatic deletion of oldest messages
  • Intelligent file purge: Automatic at 80% capacity or manual
  • Downloaded file priority: Priority deletion of already retrieved files
  • Guaranteed operational maintenance: Server remains functional indefinitely (256 GB = 25-35 years for 200 users with purge)
  • Proactive management: Automatic and manual function for total control

Storage capacity: On a 256 GB disk, CryptPeer® can maintain encrypted discussion backups for 25-35 years for 200 users (without purge), and indefinitely with automatic purge. For more details on capacity calculations by number of users, see our dedicated storage sizing page.

Embedded Administration & Advanced Security

Embedded Administrator Space

CryptPeer® natively integrates an embedded administrator space allowing simultaneous use of CryptPeer services and server administration with clicks, without practically typing anything on the keyboard.

  • Intuitive interface: Complete administration via an integrated web interface
  • Click management: All administrative operations accessible in a few clicks
  • Input minimization: Interface designed to minimize keyboard input
  • Near-zero learning curve: Designed to be administered without special skills

Always Encrypted Database

Even database access remains secure: it is always encrypted. Keys are generated on the terminal side at users' discretion, ensuring maximum security.

  • Permanent encryption: The database is always encrypted, even during administrator access
  • Terminal-side key generation: Encryption keys are generated on the user's terminal
  • User control: Users maintain total control of their encryption keys
  • Enhanced security: No key is stored on the server in plaintext

PassCypher HSM PGP & NFC HSM Compatibility

CryptPeer® is compatible with PassCypher HSM PGP and NFC HSM, allowing the user to enter passphrases greater than 256 bits without typing anything on the keyboard in 1 click with multi-factor authentication.

  • PassCypher HSM PGP: Native integration with PGP HSM devices
  • NFC HSM: Support for NFC HSM devices for authentication
  • Passphrases > 256 bits: Generation and use of ultra-secure passphrases
  • Keyboard-free authentication: Entry in 1 click, without typing anything on the keyboard
  • Multi-factor authentication: Enhanced authentication in a single click
  • Maximum security: Combination of multiple authentication factors for optimal protection

Administration Simplicity

CryptPeer® is designed to be administered without special skills, with a near-zero learning curve.

  • Intuitive interface: All administrative functions easily accessible
  • Integrated documentation: Contextual help available at each step
  • Guided configuration: Simplified installation and configuration processes
  • Simplified maintenance: Maintenance operations accessible in a few clicks
  • Minimal training: Quick onboarding without in-depth technical training

EviEngine — Sovereign License System

CryptPeer® integrates Freemindtronic's EviEngine technology for license management without servers or databases.

  • Hardware-based license: The license system is based on the computer's motherboard serial number, not on a person's identity
  • No server or database: Operates locally, without dependency on external services
  • Preserved anonymity: Since the license is linked to hardware and not identity, anonymity is preserved
  • Offline operation: CryptPeer can thus operate in local network even offline, without Internet connection

Advanced Security Features

Masked CryptPeer Mode — Advanced Visual Protection

Unique CryptPeer® feature: Masked mode offering maximum protection against visual attacks and observation-based espionage.

  • CryptPeer within CryptPeer: Totally autonomous and isolated instance
  • Messages always encrypted: Display always in encrypted form for maximum visual protection
  • Protection against visual attacks:
    • Protection against shoulder surfing
    • Protection against screenshots
    • Protection against screen recording
  • On-demand decryption: One message at a time via padlock icon
  • Download choice: Encrypted or plaintext file according to user choice
  • Total isolation: Masked instance completely separated

P2P Architecture — DDoS & Denial of Service Resistance

Unique CryptPeer® feature: P2P architecture without centralized server, each relay server being autonomous and belonging to a distinct entity, offering natural resistance to DDoS attacks and denial of service.

  • No centralized server: P2P architecture with autonomous relay servers
  • Autonomous relay servers: Each relay server belongs to an entity and operates independently
  • DDoS resistance: No central attack point, impossible to saturate globally
  • Denial of service resistance: Each private bubble (relay server) is isolated = maximum resilience
  • No single point of failure: Each relay server is independent, one server's failure doesn't affect others
  • Enhanced resilience: Impossible to stop by centralized attack
  • Guaranteed continuity: Service operational even if one relay server is attacked