FAQ - CRYPE Communication with privacy

Go to content
C-mails
     Can't See if the Recipient has Read the C-mail
     Can't Delete or Call Back a Sent C-mail from the Recipient's Device
     Can't Modify a C-mail Once It's Been Sent
     Can't Modify existing C-mail Which is Forwarded to Other Users
     Can't See if i was blocked by other user
     Handling C-mail Delivery When the Receiver is Offline
     Handling C-mail if the Exchange Server or Favorite Device is unavailable
     What do the status icons for C-Mails mean?
Conferences
     Conference Leader: roles and permissions
     Why Do I See My Own Live Video in the Same Caller Grid?
     What Do the Green and Yellow Protection Shields Mean During a Call in CRYPE?
     What subscription rights apply during a video conference with multiple participants?
     What is the ideal video resolution for conference?
Login / Logout
     What is the difference between Logout and Exit?
     How many CRYPE accounts can I log into simultaneously?
Storage and Encryption
     Where CRYPE Stores Data?
     How to Protect Your Data through Encryption?
      Does CRYPE offer a Cloud Backup?
Subcriptions
    Is CRYPE still usable after subscription cancellation?
Devices & Synchronization
    Why do I need to enable synchronization for each device
              I use with CRYPE?
    Why isn't chat history deletion synchronized with other devices?

    Why does the CRYPE app automatically close on mobile devices?
Privacy & Security - C-mails
CRYPE prioritizes privacy and integrity, intentionally omitting common features of other platforms to respect user privacy, adhere to legal and ethical norms, and preserve communication authenticity.
CRYPE operates solely as a "delivery service", ensuring that no external CRYPE device or service can access or retrieve information stored locally in the app.
Can't See if the Recipient has Read the C-mail
  • Privacy Protection: Revealing read receipts violates the recipient's privacy by tracking their activity without consent. CRYPE respects the right of users to engage with messages on their terms, without external pressure or monitoring.
Can't Delete or Call Back a Sent C-mail from the Recipient's Device
  • Respect for User Autonomy: Once a message is sent, it becomes the property of the recipient. Deleting it from their device would infringe upon their autonomy and control over their personal data.
Can't Modify existing C-mail Which is Forwarded to Other Users
  • Transparency in Communication: When forwarding a message, CRYPE ensures the original message remains unaltered, preserving the context and content. Any modifications must be made in a new message, maintaining transparency and preventing misrepresentation.
Can't Modify a C-mail Once It's Been Sent
  • Authenticity of Record: Maintaining the original content of a sent message upholds its authenticity. This is crucial in scenarios where messages have legal, medical, or contractual significance. Altering a sent message could lead to ethical and legal issues.
Can't See if i was blocked by other user
  • Blocks in CRYPE: A CRYPE user can block any other user from communication. When a user blocks another, the blocked user can't send C-mails or make video calls to the blocker. However, the blocker can still contact the blocked user. If the blocked user tries to call or send C-mail, the call doesn't reach the blocker, leaving the caller unaware of being blocked.

    This situation raises an ethical dilemma. Should CRYPE maintain this privacy-centric approach, or should it inform the caller of their blocked status for the sake of transparency? From CRYPE's perspective, the first approach is a conscious choice to protect user privacy. Revealing the block status directly to the caller could be seen as an infringement of the blocker's privacy rights."
Handling C-mail Delivery When the Receiver is Offline
  • Offline C-mail handling: In P2P (Peer-to-Peer) communication systems like ours, both users need to be online for data transmission to occur. If a C-mail is sent while the receiver is offline, the message enters a waiting queue on the sender's side. It is transmitted once the receiver comes online.

    A potential issue arises if the sender also goes offline while the message is still in the waiting queue, as the C-mail cannot be sent in this case. To address this, users can designate a 'Favorite device' or use an 'Exchange Server', particularly beneficial for enterprise users. These devices, ideally online 24/7, can reliably send and receive C-mails at any time.

    For users with multiple devices logged into CRYPE, the system automatically designates the first desktop device as the 'Favorite device.' This device becomes a hub for routing all communication traffic and is key in synchronizing C-mails across other devices
Handling C-mail if the Exchange Server or the Favorite Device is unavailable
  • If an Exchange Server or a Favorite Device fails, then:

    For sending: The device creating the message will send it directly to the recipient and will then take over the synchronization of all other existing devices, including the Exchange Server or the Favorite Device if they are online.

    For receiving: If there are multiple devices available to the recipient, a message will be sent to an available device, with the priority being desktop devices over mobile devices. The device that receives the message will then be responsible for synchronizing it with all other devices, including the Favorite Device or Exchange Server-
Status Icon Legend
Outgoing C-mails
    Received and read C-mail
    Received, unread C-mail
    C-mail currently being received

Outgoing C-mails
    Sent C-mail
    C-mail sent to Favorite Device or Exchange Server
    C-mail currently being sent
    C-mail in queue
    C-mail failed to send

Incoming Calls
    Successful incoming call
    Missed call (unread)
    Missed call (acknowledged)
    Rejected call

Outgoing Calls
    Successful outgoing call
    Unsuccessful outgoing call
Conferences
Why Do I See My Own Live Video in the Same Caller Grid?
  • Self View: When initiating a video conference, my own live video appears alongside other participants in the caller grid. This common feature in video conferencing ensures that participants, especially those displayed in smaller icons, are aware of their camera positioning. It allows them to see exactly what video is being transmitted to other participants. This helps in adjusting their position for optimal visibility.

    If you prefer not to see your own video in this way, you can change this setting. Simply go to the 'Burger Menu', select 'Settings', and then choose 'Conference'. Here, you can enable 'Spotlight Mode' to adjust the video display to your preference
What subscription rights apply during a video conference with multiple participants?
  • CRYPE offers several subscription models, which may include limitations on communication capabilities. During a conference call, the functional rights of the conference leader always apply. Typically, this role is automatically assigned to the caller initiating the conference.
Conference Leader
  • Roles and Permissions: The person initiating a video conference is assigned as the 'Conference Leader'.

    This role exclusively grants the Conference Leader the authority to remove participants, muting microphones or terminate screen sharing streams initiated by any attendee. While each participant has the autonomy to leave the meeting at their discretion, only the Conference Leader possesses the privilege to add new participants without requiring group consent.
    Participants are free to propose guest additions, yet these suggestions require the Conference Leader's approval for the guests to be included in the ongoing video conference.

    Additionally, the role of the Conference Leader can be reassigned to a different participant during the course of a video conference.

    During the conference click on this user where you want to reassign the "Manager" role, click on the "more options" button and confirm your choice:


What Do the Green and Yellow Protection Shields Mean During a Call in CRYPE?
  • Understanding Protection Shield: CRYPE always establishes a secure, encrypted communication channel between devices using a static device IP. If such a connection is possible, your protection shield turns green.

    If your device changes its IP dynamically (e.g. due to Firewall NAT issues), CRYPE must use a STUN "Relay" Server to establish a direct channel, indicated by a yellow protection field.

    To avoid using a STUN Relay Server, consult your IT Administrator or Communication Provider on how to ensure a fixed IP assignment for your device.
What's the ideal video resolution for a conference?
  • In CRYPE, you can adjust your video settings under "BURGER MENU - VIDEO & AUDIO". This includes selecting your webcam, video resolution, and how many frames per second (FPS) your video will have. You can choose from AUTO (which automatically selects the best option), LOW, MEDIUM, or HIGH resolution. The settings you choose will be shown in the video preview window, along with the FPS.

  • You might think that the higher the resolution, like 4K, and the faster the FPS, like 60, the better your video call quality will be. But this "more is better" approach isn't always right. High resolutions and FPS can make your device work too hard to process the video. Also, most internet connections can't handle uploading high-resolution video streams. In video calls with many people, using high resolutions and FPS can cause the video to be scaled down, compressed, and worsen in quality. Your computer has to work extra hard to send these high-quality video streams to others, while also adjusting for the current internet speed.

  • So, remember the rule: "Less is often more". Use high resolutions and FPS only if you have a fast upload speed and the people you're communicating with have similar fast internet. Otherwise, you're just making your device do unnecessary work.

  • We recommend using a moderate resolution, like 1280x720 pixels, with a frame rate of 12-15 FPS as an excellent balance between quality,  computer performance and internet bandwidth.
Login / Logout
How many CRYPE accounts can I log into simultaneously?
CRYPE allows you to log into multiple accounts simultaneously, enabling you to accept video or audio calls and receive messages on the same device concurrently. Essentially, there is no limit to the number of user accounts you can log into at the same time.
What is the difference between Logout and Exit?
  • Logout: Using the Logout function, the user ends their CRYPE session, and the choice for Auto-Login is reset as well. This means that upon the next start of CRYPE, the user will need to log in again.

  • Exit: With the Exit function, the user closes CRYPE. If Auto-Login is enabled, upon the next start of CRYPE, the Auto-Login feature will automatically sign the user back into CRYPE.
Storage Location and Encryption
How to Protect Your Data through Encryption
  1. Windows: Use BitLocker, a built-in encryption tool available in Windows. To enable it, go to Control Panel -> System and Security -> BitLocker Drive Encryption, and follow the prompts to encrypt your hard drive.

  2. Linux: Utilize LUKS (Linux Unified Key Setup) for full-disk encryption. Most Linux distributions offer this option during installation. For an existing system, use the cryptsetup command to encrypt your drive.

  3. Mac: Take advantage of FileVault, Apple’s disk encryption program. Enable it in System Preferences -> Security & Privacy -> FileVault. Follow the instructions to encrypt your startup disk.

  4. Android: Enable device encryption in Settings. Navigate to Security -> Encryption & credentials -> Encrypt phone. This will encrypt your device's storage and safeguard your data.

  5. iOS: iOS devices automatically enable encryption when you set a passcode. To ensure this, go to Settings -> Touch ID & Passcode (or Face ID & Passcode on newer models) and set a strong passcode.

For all devices, remember to back up your data regularly and keep your encryption keys or passcodes safe and secure. This will protect your data from unauthorized access while ensuring you don't lose access to your encrypted information.
Where CRYPE Stores Data: A Guide
Important: Modifying CRYPE's data files is not recommended. Doing so may disrupt the app's functionality or stability.

CRYPE's Data Storage Structure:

  • CRYPE
                    CRYPE ID
                           Avatars
                           Local Avatars
                           Files
                           Posters
                           Temp
                           Segments

Where to Find CRYPE Folders:

  • Windows: C:\Users\username\CRYPE
  • Linux:         /home/username/CRYPE
  • Mac:            Macintosh HD/Users/username/CRYPE
  • Android & iOS:  Due to OS restrictions data is stored in the hidden App "data" directory , following the same folder structure.

Uninstalling the CRYPE app on mobile devices will delete automatically all stored personal data.
Does CRYPE offer a Cloud Backup?
CRYPE does not offer cloud backup; instead, it empowers users to self-manage their communication data responsibly. As a secure communication service, CRYPE doesn't store private data.

Users can utilize the backup feature within the app's burger menu to create backups and choose a secure storage location for their data.
Subscriptions
Is CRYPE still usable after subscription cancellation?
Absolutely! Once your subscription ends, you can still use CRYPE with its 'Base' features. However, the advanced features available in the subscription packages will no longer be accessible.
Devices & Synchronization
Why isn't chat history deletion synchronized with other devices?
Synchronizing deletions poses a significant security risk. If you lose your smartphone and someone gains access to your CRYPE app, they could delete all data on all your devices. For security reasons, CRYPE does not allow data access from one device to others.
Why do i need to enable synchronization for each device i use?
In "device-to-device" (P2) communication, CRYPE never stores your data on any third party servers. To sync additional devices besides your favorite one, enable synchronization under "BURGER MENU - DEVICES." Otherwise, messages are primarily received on your favorite device or an active device if the favorite is offline. Note that CRYPE can transmit gigabytes of data, which may result in high internet usage on mobile devices.
Why does the CRYPE app automatically close on mobile devices?
To stay reachable on your mobile devices, check the settings under "Manage Apps" on Android or iOS. Disable the function that automatically closes CRYPE when not in use.
Copyright ©  2024  All rights reserved
Last update: 12/11/2024
Back to content