FAQs

Atopos is designed so we do not know who you are, what you say, or which rooms you create. This limits what support can do.

Product & Privacy Model
What is Atopos?
A secure, encrypted communication platform for private, temporary collaboration. You create rooms or send one-time secrets. Messages are end-to-end encrypted — our servers never see or store your messages. We do not store room keys. Users are responsible for lawful and appropriate use.
What does "deniable" mean?
The system is designed so we do not retain message content or room keys. We have minimal records. Participants are responsible for their own use of the service.
Do you store messages, rooms, or identities?
No. We store encrypted envelopes for delivery, but we do not have keys to decrypt them. We do not store room keys, one-time secrets, or user identities.
Can you recover rooms or secrets if I lose them?
No. If you lose a room key or secret link, the content is permanently unrecoverable. We are designed not to have access.
Can you see who I spoke to or what was said?
No. We have no visibility into room participants or message content.
Do you log IP addresses or device identifiers?
We do not store IP addresses or device identifiers for user traffic. We may log minimal server metrics (e.g., request counts) without identifiers.
How long do rooms exist?
Rooms have a configurable expiry (typically 24 hours by default, up to a maximum). When empty for a grace period or past expiry, they are tombstoned.
What happens if a participant screenshots or records?
We cannot prevent or detect screenshots. Deniability protects against us, not against other participants. Only share keys with people you trust.
Room Keys / One-time Secrets
What is a room key?
The room key is the invite link or credentials needed to join a room. Whoever has it can access the room. If you share it with the wrong person, revoke access by destroying the room and creating a new one.
Can I rotate a room key?
You can create new invite links. There is no server-side "rotation" — you effectively get new invite URLs. Old links may still work until you destroy the room.
What if I share the key with the wrong person?
Destroy the room and create a new one. We cannot revoke access for specific participants because we do not know who they are.
Can I prove a room existed?
No. Our design prevents us from attesting that a room or message existed. That is intentional.
Tokens / Payments
Why do you sell tokens?
Tokens fund the service. They are prepaid room keys for creating rooms and burn-after-read secrets.
What does a token purchase create on your side?
A payment record in Stripe and a bundle code. We do not link the purchase to any room or session. The bundle code is shown once; we do not store it in a way that links it to you.
Why is support limited without a Stripe transaction ID?
We have no way to verify your purchase or identity without a transaction identifier. If you provide a Stripe payment/charge ID, we may be able to investigate billing issues.
Refunds: what is / isn't refundable?
Token purchases are generally non-refundable. Exceptions may apply where required by law. Contact support with your Stripe transaction ID if you believe a refund is owed.
What happens if a payment succeeds but tokens don't show?
Contact support with your Stripe transaction ID. We can verify the payment and issue replacement bundle codes. Without a transaction ID, we cannot investigate.
Support Scope
What can support help with?
Billing and token issues that can be verified via a transaction ID. We may help with payment success but missing tokens if you provide the Stripe payment/charge ID.
What can't support help with?
Room content, message recovery, identity verification, or anything requiring visibility we do not have. We cannot recover lost room keys or one-time secrets.
How do I contact you if you don't have my email?
Use the Support form and optionally provide an email or other contact method. We do not have your details by default. If you want a response, you must voluntarily provide contact information.
Safety / Abuse Boundaries
Do you monitor abuse?
We do not monitor, inspect, or log communications. We have no visibility into room participants or message content.
How do abuse reports work if you can't see rooms?
Abuse reporting is limited by design. We cannot verify or investigate reports about room or message content. If you experience harm, consider local resources (e.g., law enforcement, trusted contacts).
What should I do if I'm threatened?
Leave the room and do not share more information. Consider local authorities or support resources. We cannot intervene in specific rooms because we cannot see them.
CLI & Mobile
What is the Atopos Elite CLI?
A command-line tool for offline room creation, encrypted messaging, file transfer, and burn-after-read secrets. It runs entirely on your device with no server dependency for ceremony operations. Download it from our Download page.
Is there a mobile app?
An iOS app is in development. It uses the same Rust cryptographic core as the CLI, compiled as a native library. Android support is planned.
Can I pay with Monero?
Yes. Monero payments create no identity linkage between payment and token issuance. A fresh one-time address is generated for each payment, and payment records are deleted after tokens are delivered.
If your issue is about a room or message content, we cannot verify or intervene. For billing issues, include your Stripe transaction ID.
Support Terms Privacy Refund Policy ← Back to Home