Why I Built the Privaseverse File-Sharing App, AnyKrypt
For years, file-sharing has been treated like a commodity — fast, convenient, and deeply insecure. Most platforms today quietly scan your files, fingerprint your identity, log your metadata, and build behavioral profiles you never consented to.
I wanted to build something different.
Something that doesn’t see you.
Something that can’t.
This is how AnyKrypt was born — a file-sharing app built on Cyber 2.0, my PII-breach-proof architecture inside Privaseverse.
The Core Idea
AnyKrypt follows a simple rule:
The server should never know what file you’re sharing, who you are, or who you’re sharing it with.
To achieve this, I removed three assumptions most apps depend on:
- The server doesn’t need to read the file.
- The server doesn’t need your identity.
- The server doesn’t need to maintain a link between sender and receiver.
Once I removed these assumptions, the technical design fell into place.
The Encryption Flow
Every file shared through AnyKrypt is encrypted locally using a 128-bit symmetric key generated on the user’s device.
A simplified version of our encryption logic looks like this:
from Crypto.Cipher import AES
import os
def encrypt_file(filepath):
key = os.urandom(16) # 128-bit key
cipher = AES.new(key, AES.MODE_GCM)
with open(filepath, "rb") as f:
data = f.read()
ciphertext, tag = cipher.encrypt_and_digest(data)
return {
"ciphertext": ciphertext,
"nonce": cipher.nonce,
"tag": tag,
"key": key # shared peer-to-peer only
}
thanks for reading