ATSAM Protocol

ATSAM Protocol — Raven's layered security architecture.

ATSAM (Anchored Transient Stealth Authentication Mechanism) is Raven Messenger's open-design security protocol — on by default since v1.7. It is a layered protocol covering every Raven communication path — offline Bluetooth mesh, bridge handoff between mesh and internet, and online server-routed messages. ATSAM combines post-quantum hybrid pairing, private nearby discovery, live device confirmation, encrypted routing with rotating per-message tags, and optional Vault Mode for one-time-pad content protection. The result: message content and identity metadata are protected whether the conversation travels over nearby devices, through a bridge node, or across the public internet — with nothing for the user to switch on.

What is the ATSAM protocol?

ATSAM (Anchored Transient Stealth Authentication Mechanism) is the open-design security protocol behind Raven Messenger. It is a five-layer stack that performs (1) post-quantum hybrid pairing using X25519 combined with ML-KEM-768 (NIST FIPS 203), (2) private peer discovery via bilateral beacon encryption, (3) live device confirmation through a fresh challenge-response, (4) encrypted routing with rotating per-message recipient tags, and (5) optional Vault Mode using one-time-pad content protection for sensitive text. ATSAM applies uniformly to Raven's three communication paths: offline Bluetooth mesh, bridge handoff between mesh and internet, and online server-routed delivery.

Acronym
Anchored Transient Stealth Authentication Mechanism
Used by
Raven Messenger (raven-messager.com), v1.7+
Default state
On by default on every install — no setup required
Type
Layered messaging security protocol
Layers
Pairing · Discovery · Confirmation · Routing · Vault Mode
Paths covered
Offline Bluetooth mesh, bridge handoff, online server-routed
Public docs
github.com/Raven-offline-messenger/raven-security

ATSAM is on by default. There is nothing to enable.

As of Raven v1.7, the ATSAM core layer ships enabled out of the box for every new install and every existing user. The first time you pair a contact, Raven's hybrid post-quantum pairing runs automatically — you do not have to flip any toggle, accept any prompt, or visit any settings screen.

Want to verify it's on?
Open Raven → Settings → Security → ATSAM protocol → ATSAM settings. The "ATSAM hybrid pairing" toggle is on.
Want to turn it off?
Same screen, flip the toggle off. New pairs fall back to the pre-ATSAM Noise IK path. Existing paired sessions keep working unchanged.

Two additional content-layer add-ons (PROXIMA-VAULT for one-time-pad text and PV-Stealth for rotating envelope tags) ship off by default; they are optional and require explicit per-conversation opt-in.

Most messengers assume the internet is always available. Raven does not.

Traditional messengers rely on cloud servers to route messages and mediate identity. Raven is different. It is designed to keep trusted users connected even when the internet is unavailable, using nearby devices as part of an offline mesh. This requires more than ordinary end-to-end encryption. Raven must also protect how devices discover each other, confirm nearby peers, and route messages without exposing stable identities.

Five layers. Each with a precise job.

ATSAM is not a single encryption algorithm. It is a layered security stack designed for Raven's online and offline architecture. Each layer has a precise job: pairing trusted devices, discovering nearby peers privately, confirming that a peer is live, routing messages, and protecting highly sensitive content through optional Vault Mode.

One protocol, every path. ATSAM applies to every way a Raven message travels: the offline Bluetooth mesh, the bridge that hands traffic between mesh and internet, and online server-routed messages. Pairing, identity, routing tags, and content encryption are derived from the same key tree regardless of which path the bytes take, so flipping between paths never weakens the protection.

1

Post-Quantum Hybrid Pairing

Establishes a shared root secret using classical and post-quantum cryptography combined.

Layer 1
2

Private Peer Discovery

Paired devices recognize each other. Strangers see only random-looking radio noise.

Layer 2
3

Live Device Confirmation

A fresh challenge confirms a peer is actually present before the UI shows "nearby".

Layer 3
4

Encrypted Mesh Routing

Mesh relays forward encrypted envelopes without learning the recipient's identity.

Layer 4
5

Vault Mode

Optional one-time-pad protection for the most sensitive text messages.

Layer 5

Five primitives, composed honestly.

🛡️

1. Post-Quantum Hybrid Pairing

When two users establish trust, Raven creates a shared root secret using a hybrid of classical elliptic-curve cryptography and post-quantum key establishment. This gives Raven a stronger foundation than relying on one cryptographic family alone.

Hybrid root Strong floor
📡

2. Private Peer Discovery

Raven devices need to find trusted friends nearby without broadcasting names, phone numbers, public keys, or stable identifiers. ATSAM's discovery layer allows paired devices to recognize each other while making discovery beacons appear random to strangers.

Candidate discovery only

A beacon match does not immediately prove that a peer is live. Raven confirms liveness in the next layer.

3. Live Device Confirmation

After a possible nearby peer is detected, Raven performs a fresh challenge-response confirmation. This prevents old recorded beacons from being replayed to falsely show that a friend is nearby.

Helps prevent replay-based false presence
🕸️

4. Encrypted Routing (mesh, bridge, online)

When messages move through nearby devices, a bridge node, or an online inbox, no relay should learn who the final recipient is. ATSAM uses per-message routing tags so any forwarder — a Bluetooth mesh peer, a bridge handing traffic to the internet, or the online server itself — only sees an opaque envelope and a rotating 128-bit tag, never a username, phone number, or stable recipient identifier.

Per-message rotating tags Same construction for mesh, bridge, and online

This reduces metadata leakage but does not fully hide timing or traffic volume from a global observer.

💠

5. Vault Mode for sensitive messages

For selected high-sensitivity text messages, Raven can use Vault Mode. Vault Mode is based on one-time-pad content protection, which can provide information-theoretic secrecy when strict conditions are met: the pad must be random, secret, long enough, and never reused.

Information-theoretic under strict conditions

Vault Mode is for small text or structured messages, not media files.

ATSAM Public Security Overview

Read the public overview of ATSAM, Raven's layered protocol for private discovery, encrypted mesh routing, and optional Vault Mode. The document covers design principles, the five-layer stack, the threat model, an design rationale, and a list of what ATSAM does not claim.

PDF · 15 pages · Raven Protocol Research · May 2026
Read the ATSAM Public Security Overview

What Raven protects against.

Different adversaries can do different things. The honest way to talk about security is to say who we defend against, and how.

📶

Nearby radio observer

A stranger nearby may see Bluetooth or Wi-Fi traffic. Raven is designed so discovery beacons do not expose names, phone numbers, or stable public identities.

🔁

Replay attacker

An attacker may record an old beacon and replay it somewhere else. Raven uses live confirmation to prevent old discovery messages from being treated as verified presence.

🛰️

Mesh relay

A relay may forward messages without being part of the conversation. Raven's mesh routing is designed so relays do not see plaintext content or stable recipient identifiers.

What Raven does not claim.

ATSAM is designed with honest security claims. It does not make Raven unbreakable, does not fully hide global traffic patterns, and cannot protect a device that is already compromised. Its goal is layered protection: strong content encryption, private peer discovery, safer mesh routing, and transparent limits.

The protocol on its own terms.

Raven is a different kind of system, and ATSAM is described on its own terms rather than measured against other products. The checklist below is what ATSAM aims to provide today, with clear limits stated alongside each item.

Capability
Raven with ATSAM
Works with internet
Yes
Works without internet (Bluetooth mesh)
Yes
End-to-end encrypted content
Yes
Private nearby discovery
Yes
Encrypted routing on every path (mesh, bridge, online)
Yes
Optional Vault Mode for sensitive text
Yes
Post-quantum hybrid pairing
Yes
Honest public security overview
Yes

Common questions.

Do I have to enable ATSAM manually?

No. As of Raven v1.7, ATSAM is on by default for every install. The first time you pair a contact, post-quantum hybrid pairing runs automatically — there is no toggle to flip and no prompt to accept.

Where can I verify ATSAM is on?

Open Raven → Settings → Security → ATSAM protocol → ATSAM settings. The "ATSAM hybrid pairing" toggle is enabled. You will also see two optional content-layer add-ons (PROXIMA-VAULT and PV-Stealth) that ship off by default.

Can I turn ATSAM off?

Yes. The toggle in the ATSAM settings screen disables the core layer. New pair handshakes fall back to the pre-ATSAM Noise IK path. Existing paired sessions keep working unchanged. The toggle is there in case you ever want to interoperate with a peer running an older client.

Is Raven unbreakable?

No. No honest security system should claim that. Raven uses layered cryptography and states its limits clearly.

Is ATSAM the full protocol specification?

No. The public ATSAM document is a security overview. Internal specifications include wire formats, exact key schedules, and implementation requirements.

Does Raven work without internet?

Raven is designed to support offline communication through nearby-device mesh routing when internet connectivity is unavailable.

Does Vault Mode protect every message?

Vault Mode is optional and intended for high-sensitivity text or structured messages. Large media files use standard encrypted transport.

Does ATSAM hide all metadata?

ATSAM reduces identity and routing metadata exposure, but it does not fully hide timing, radio traffic volume, or global traffic patterns.

When does ATSAM ship inside Raven?

ATSAM is live as of Raven v1.7. The core pairing + key-tree layer is on by default; the two content-layer add-ons (PROXIMA-VAULT and PV-Stealth) ship off and stay opt-in per conversation.

Want the full public overview?

The complete ATSAM Public Security Overview includes the design principles, threat model, design rationale, a list of what ATSAM does not claim, and the development roadmap.

PDF · 15 pages · Raven Protocol Research · May 2026
Read the public overview