Trust & Safety
Understanding what Atopos protects, what it limits, and how to use it responsibly.
- Plain-English Threat Model — What we protect, what we limit, and what we cannot protect against.
- Local keys & Extra Lock — How keys work and how to manage them.
- Threat model vs marketing myths — Honest limits vs exaggerated claims.
How Atopos compares
| Atopos | Signal | Wire | ||
|---|---|---|---|---|
| End-to-end encryption | Yes | Yes | Yes | Yes |
| No phone number required | Yes | No | No | Yes (email) |
| Server-blind (server never has keys) | Verified (16 claims) | Claimed | Claimed | Claimed |
| Published threat model | Yes | Partial | No | Yes |
| Formal verification | TLA+ | Protocol only | No | No |
| Verifiable security evidence | Machine-runnable | No | No | No |
| Monero payment option | Yes | No | No | No |
| Offline room creation | Yes (CLI) | No | No | No |
| Open source | Yes | Client only | No | Yes |
This comparison reflects our understanding as of April 2026. We encourage you to verify each claim independently.