Create a Private Room
Client-side keys. Server-blind. Messages never touch our servers.
No subscription loaded
Loading stores it only in this browser. Save the file to use later.
Load capabilities first.
A deniable room requires capability tokens. Load a capability bundle or redeem a code to get started.
Wallet / Capabilities
Capabilities are stored locally on this device. Load a bundle or redeem a code.
STEP 1
🛡️ Privacy Level
All rooms are end-to-end encrypted. Choose how much network privacy to add.
Avoid identifiers if you want maximum anonymity.
Selected tier costs 1 token.
Effective routing (derived): Standard
Always included in every level:
- End-to-end encryption
- No server-side storage
- Keys generated on your device
- Each level adds layers. None remove protection.
Messages cannot be read by us or anyone outside the room. Only a compromised device could expose them.
Room preview
Privacy: Private
Room name: —
Key ceremony: Configured in the next step. No room key is used yet.
Room Key Ceremony
Choose how your room key is generated, then commit. This step uses 1 room key.
key 🔐 Room Key Ceremony
Select a ceremony mode, then review what happens next.
Room keys are generated locally in this browser using device entropy. The room is created immediately.
Delivery: Relay-only (Stateless) — Offline users miss messages.
Stronger ceremony settings with optional offline entropy, admission controls, and recovery. The room is still created now in this browser.
Delivery: Relay-only (Stateless) — Offline users miss messages.
Key Generation Mode
These words strengthen the creator-side key derivation locally. They never leave your device.
What does Offline Entropy Mix-in do?
It mixes your diceware words or seed into the room key derivation, making the key stronger than device RNG alone.
This is not automatically the participant join password. Whether participants need separate proof material depends on the Admission Control you choose below.
Admission Control
Share join secret out-of-band; join requires proof of secret.
Join requires secret proof.
Governance & Recovery
Store shards offline. We cannot recover them.
Uses 1 room key and generates a one-time offline ceremony package for download. The room is not created yet — finalize from any device using the package.
Delivery: Relay-only (Stateless) — Offline users miss messages.
Key Generation Mode
These words strengthen the creator-side key derivation locally. They never leave your device.
What does Offline Entropy Mix-in do?
It mixes your diceware words or seed into the room key derivation, making the key stronger than device RNG alone.
This is not automatically the participant join password. Whether participants need separate proof material depends on the Admission Control you choose below.
Admission Control
Governance & Recovery
Create a group room with K-of-N governance. Membership changes and dissolve require a threshold of member signatures.
Delivery: Relay-only (Stateless) — Offline users miss messages.
Group Governance (K-of-N)
Configure how many members (N) and how many must agree (K) for governance actions like membership changes or dissolve.
Default: 2-of-3. Every governance action (add/remove member, dissolve room) requires at least K signatures from the N members.
Member Invites
N invite packages will be generated — one for each member. Distribute them securely.
Admission Control
All members use this shared secret to join.
Ceremony Summary
- Mode: Standard
- Key generation: Standard (CSPRNG)
- Admission: Dual-channel
- Recovery: Off
- Delivery: Relay-only (Stateless)
🌐 Network Routing
Routing is derived from Privacy Level. Override only if this server supports it.
🌐 Network Routing
Privacy level drives default routing: Private → Standard, Protected → Priority, Anonymous → Veiled (Tor/Mixnet when available).
Effective routing (derived): Direct
Priority routing requires a subscription with priority routing. This room will use Standard routing.
Tor/Mixnet aren’t enabled on this server. You can still use Tor Browser for client→server privacy.
Maximum Privacy guideDirect is usually lowest latency. Tor prioritizes network anonymity when enabled. Mixnet adds batching and delay to reduce traffic analysis risk.
· · Advanced: use Tor Browser to access Atopos · Threat model
What happens next
- What happens now
- Room keys are generated on this device using browser entropy and the room is created immediately. 1 room key is consumed.
- What you must keep
- Nothing extra — the invite link contains everything needed. Bookmark or copy it before leaving this page.
- What participants need
- The invite link. Share it via any channel you trust.
- Is the locator alone sufficient?
- Yes — the invite link is all that is needed to join in Standard mode.
- What happens now
- Room keys are generated on this device with your selected ceremony settings and the room is created immediately. 1 room key is consumed.
- What you must keep
- The invite link or room locator. If you used offline entropy, keep your seed words safe — recreating the room requires the same ceremony.
- What participants need
- Depends on admission mode:
Dual-channel: the public locator plus the room secret (shared separately).
SPAKE2: the public locator plus proof of the join secret (shared out-of-band). - Is the locator alone sufficient?
- No — dual-channel requires a separate secret; SPAKE2 requires secret proof. The locator alone does not grant access.
- What happens now
- Room keys are generated on this device. The room is created with K-of-N governance embedded in the constitution. N invite packages are generated — one for each member.
- What you must keep
- Your own invite package. Distribute the remaining N-1 packages to other members through secure channels.
- What participants need
- Each member receives their own invite package. Governance actions require K of the N members to sign.
- Is the locator alone sufficient?
- No — each member needs their specific invite package to join and participate in governance.
- What happens now
- 1 room key is consumed and a one-time offline ceremony package is downloaded. The room is not created yet — use the package on any device to finalize.
- What you must keep
- The ceremony package file. It can only be used once. If lost, the room key is gone and cannot be recovered.
- What participants need
- Access depends entirely on the ceremony package and the admission mode you selected. A standard invite link is not generated in this mode. Distribute join materials from the finalized ceremony.
- Is the locator alone sufficient?
- No — the package and ceremony materials are required. There is no universal invite link for offline-assisted rooms.
Review
Room name: —
Privacy: — (1 token)
Delivery: Relay-only (Stateless)
Key Ceremony: Standard
Effective routing (derived): Standard (enforced)
Downgrade forbidden. Routing cannot be lowered after room creation.
Cost: 1 capability
This will use 1 room key.
No recovery, no archive. Room and keys are only on participants’ devices.
Creates the room now in browser-local mode.
Redeem a new code Import bundleLoad subscription into this browser
Drop subscription_key.json here or click to browse
Loading stores it only in this browser. Save the file to use later.
Room created. Keys generated on your device.
Copy the invite link below and share it with participants. The link is all they need to join.
What to keep: Bookmark or copy the invite link before leaving this page.
What to share: The invite link — it contains everything needed to join.
Room created with dual-channel admission.
Share the locator publicly; share the secret separately via a secure channel.
What to keep: The room locator and your room secret. If you used offline entropy, keep your seed words safe.
What to share: The public locator can be shared openly. The room secret must be shared separately through a different channel (in person, secure messenger, etc.).
The locator alone does not grant access. Participants need both pieces.
Room created with SPAKE2 admission.
The invite link alone is not sufficient — joiners must prove knowledge of the secret.
What to keep: The room locator and your join secret. If you used offline entropy, keep your seed words safe.
What to share: The locator can be shared openly. The join secret must be shared out-of-band — never alongside the locator.
The locator alone does not grant access. Participants must prove knowledge of the secret to join.
Group room created with K-of-N governance.
Governance actions require 2 of 3 member signatures.
Member Invite Packages
Distribute each package to the corresponding member through a secure channel. Each package can only be used once.
Keep these packages secure. Each member needs their own package to join and vote on governance actions.
Governance status: Active — 0 of 3 members joined
Pending proposals: None
Proposals become available once K members have joined.
Your offline ceremony package has been downloaded.
1 room key was consumed. The room is not created yet — click below to create it now.
Import the downloaded package and create the room on this device.
SAS fingerprint: ------ — confirm this matches when speaking with participants
Import from another device
Have a ceremony package from another device or session? Upload it here to create the room.
Advanced: use CLI
Import the ceremony package using the Atopos Elite CLI:
atopos-elite import-full ceremony-package.json
Download the CLI at atoposlabs.com/download.
Package contents
- One-time creation grant (server-signed, expires)
- Room key material (K_room) — generated on this device
- Policy binding (tier, admission, ceremony mode)
Import Ceremony Package
Have a ceremony package from another device or a previous session? Import it here to finalize the room.
Applied policy (server-confirmed) (locked)
Changing settings would require creating a new room.
Room Minted
Share this link with participants to invite them.
The public locator alone does not grant access. Share the join secret separately through a different channel.
Secret-proof admission (SPAKE2)
Participants must prove knowledge of the shared secret to join. The locator alone is not sufficient for access.
Share the join secret out-of-band. Do not share it alongside the locator.
Ceremony-bound / offline-assisted admission
Access depends on the ceremony materials you prepared. A standard invite link is not available for this room.
Distribute join invites and transport handoffs from the offline ceremony package. The package cannot be reused.
Group governance admission (K-of-N)
Each member receives an individual invite package. Governance actions require K of N signatures.
Distribute invite packages out-of-band. Each package is single-use.
Next steps
Applied: Standard routing
Second Lock: Off