No more switching between Gather for presence, Discord for chat, and Zoom for calls.
Walk up to a colleague and their voice fades in automatically. Step into a Room zone and a video conference opens — no buttons, no scheduling. Your tile position is the interface.
Every message is encrypted before it leaves your browser. The server stores opaque ciphertexts it can never read. Private keys never leave your device — not even for backup.
Walk into any Room zone and a LiveKit WebRTC video session opens automatically. Walk out and it closes. The map topology defines who can meet — naturally.
Discord-style text channels and 1-on-1 DMs, all zero-knowledge encrypted. Per-device ciphertext slices mean every trusted device can read its own messages independently.
Discord added audio/video E2EE in 2024 — but explicitly excludes all text messages. Gather.town has spatial presence but stores messages as plaintext. AtriumVerse is the only platform that closes all three gaps.
* Discord added audio/video E2EE via DAVE protocol (Sept 2024) but explicitly excludes text. Gather.town free tier capped at 10 users (2025).
Launch a server, pick a tile map (classroom or campus layout), and set it public or private. The backend parses spawn points and zones automatically.
Pick your avatar — Bob, Alex, Adam, or Amelia. Your character spawns at your last saved position and other players appear in real time.
Walk up to someone to talk, enter a Room to video call, or type in an encrypted channel. Your position is the only control you need.
No exotic dependencies. The entire encryption stack runs on the browser's built-in Web Crypto API.
"The server never receives a plaintext message or private key at any point."
— AtriumVerse architecture guarantee
On first login your browser generates an X25519 keypair. The public key goes to the server. The private key is stored only in IndexedDB — it never leaves your device.
You back up your private key using Face ID / Windows Hello (WebAuthn PRF) or a passphrase. The encrypted blob is stored server-side, unreadable without your biometric.
ECDH between your private key and the recipient's public key produces a shared secret. HKDF(secret, message_id, 'dm-epoch:N') derives a per-message AES-256-GCM key.
When a member leaves a channel the epoch increments, a new channel key is distributed to remaining devices, and the departing member cannot decrypt future messages.
Choose a classroom or campus layout — or upload your own Tiled JSON map.