September 5, 2024

Why I Built the Privaseverse File-Sharing App, AnyKrypt

For years, file-sharing has been treated like a commodity — fast, convenient, and deeply insecure. Most platforms today quietly scan your files, fingerprint your identity, log your metadata, and build behavioral profiles you never consented to.


I wanted to build something different.

Something that doesn’t see you.

Something that can’t.


This is how AnyKrypt was born — a file-sharing app built on Cyber 2.0, my PII-breach-proof architecture inside Privaseverse.


The Core Idea


AnyKrypt follows a simple rule:


The server should never know what file you’re sharing, who you are, or who you’re sharing it with.


To achieve this, I removed three assumptions most apps depend on:


  1. The server doesn’t need to read the file.
  2. The server doesn’t need your identity.
  3. The server doesn’t need to maintain a link between sender and receiver.


Once I removed these assumptions, the technical design fell into place.



The Encryption Flow

Every file shared through AnyKrypt is encrypted locally using a 128-bit symmetric key generated on the user’s device.


A simplified version of our encryption logic looks like this:

from Crypto.Cipher import AES
import os

def encrypt_file(filepath):
    key = os.urandom(16)  # 128-bit key
    cipher = AES.new(key, AES.MODE_GCM)
    
    with open(filepath, "rb") as f:
        data = f.read()
    
    ciphertext, tag = cipher.encrypt_and_digest(data)
    
    return {
        "ciphertext": ciphertext,
        "nonce": cipher.nonce,
        "tag": tag,
        "key": key  # shared peer-to-peer only
    }
    



thanks for reading