An offline, open-source entropy engine for BIP39 seed phrases — air-gapped on a USB stick, and built so every bit of randomness is something you can inspect, audit, and verify. No blind trust.
ATM was built so the user never has to trust anything they cannot verify.
ATM generates a BIP39 seed phrase through a deliberate pipeline — four domains, each one testable, each one isolated, each one destroying its own inputs before control passes to the next.
.atm file, portable across any machine that runs ATM. High tiers switch to SLIP39 Shamir secret sharing: the seed is split into five shares, any three of which can reconstruct it.
A full generation completes in under a second. Every step is logged, fingerprinted, and wiped.
ATM doesn't force every user into the same security model. A six-question threat assessment maps each user to one of four tiers. Every downstream decision — entropy requirement, recovery mechanism, passphrase policy, vault behaviour — adapts to the assigned tier.
From launch to a seed phrase on paper takes about four minutes of real time. The walkthrough below shows the key moments — threat questionnaire, entropy collection, fingerprint verification, and recovery shares.
Most wallets ask for trust. ATM lets you verify. A comparison of trust models across key security dimensions.
| Trust Model Comparison | Ledger | Trust Wallet | ATM |
|---|---|---|---|
| Firmware audit | Closed source | Open source | Fully open source |
| Entropy source | Proprietary TRNG | OS / platform RNG | User + OS + external |
| Verification at generation | No cryptographic verification | No cryptographic verification | Commitment fingerprint |
| Verification without revealing mnemonic | Not supported | Not supported | Seed fingerprint + QR |
| Metadata exposure | High (KYC database) | Medium | Zero (air-gapped) |
| Recovery model | Standard BIP39 (single-seed recovery) | Standard BIP39 (single-seed recovery) | Adaptive / tier-based |
| Supply chain trust | Required | Platform dependent | Minimised (user-verifiable) |
| Execution Environment | Device firmware | Host OS dependent | Ephemeral (Tails, Amnesic) |
ATM exists because the failures it responds to aren't hypothetical. Operation RUBICON — the joint CIA/BND ownership of Crypto AG from 1970 to 2018 — demonstrated that manufacturers of cryptographic hardware can be captured without their customers ever knowing. The 2020 Ledger data breach exposed 272,000 customer records and turned a hardware wallet's brand database into a target list for physical attacks. CVE-2023-31290 showed that a single bug in a software wallet's entropy generator can produce predictable seed phrases — and drain real wallets. The common thread across all three: the user had no way to check. ATM changes that.
Read the full research context
Pravin Raj Morgan — final-year BSc (Honours) Cybercrime & IT Security at South East Technological University, Carlow. ATM began as a research question about whether ordinary users could ever truly verify their own private keys. Six months of building, breaking, and rewriting later — this is the answer.
The project was supervised by Richard Butler, with guidance and academic support in cryptographic design from Martin Harrigan.