Home

Functional

Hardware

About

End-to-end Encryption
End-to-end encryption means that only the two parties or group friends have access rights. All information is not stored in the cloud and third parties are prevented from decrypting and accessing it, fundamentally protecting privacy and security.
End-to-end encryption technology
Incognito Login

Do not collect mobile phone address book or identity information

No forced request for permissions, enabling invisible login

Protect personal information security

Traceless login
Transaction Security

Accounts are created using mnemonic phrases or private keys,

No further personal information is required,

Protect the security of your property transaction information.

Trade security
Secret Chat Mode

Chat messages can be set to be destroyed after reading

You can set the time limit of 1 day, 7 days, and 1 month, and it will be deleted after expiration

Once the chat message is screenshot, recorded, or forwarded

Receive reminder information immediately

Private Chat mode
Ten thousand people Group chat

In addition to basic group chat, Goethe also launched a group chat for tens of thousands of people,

You can set up private groups and public groups as needed,

Meet the multifunctional needs of large-scale business and event organizations.

Private Chat mode
Efficient Group management

Group chat project information can be individually pinned to the top

Can be set to prohibit people in the group from adding friends and banning each other

Has functions such as member protection and anonymous chat

Efficient Group management

As a new generation of Internet, Web3.0 has three major advantages: decentralization, security, and privacy protection.

Breaking the Web2.0 user information monopoly model and fundamentally solving the problem of traditional Internet information theft,

Guarantee user security and privacy,

Provides fertile soil for the development of Internet social applications!

Web1.0

"Read only"

Decentralized management

Web2.0

Participatory

Centralized management

Web3.0

Decentralization and security

Privacy Protection

"Privacy, freedom"
is Goethe’s ultimate mission
Gather is based on the Web3.0 infrastructure public chain NA Chain relies on the underlying DNS+DFS module, uses cryptography technology and open network protocols, and combines hardware boxes to provide distributed long link clusters, thereby providing a stable decentralized message exchange network and technically eliminating the risk of privacy leaks.
GProto communication protocol allows Goethe to transmit at high speed even in weak network environments, ensuring the safety, reliability and timely arrival of data.

In the development of Web 3.0, Hong Kong is the world's leading pioneer representative region.

Hong Kong will officially become the first region in the world to regulate and license virtual asset trading platforms from June 1, 2023,

And allocate HK$50 million to support Hong Kong's Web3.0 ecosystem and turn it into Hong Kong's future economic and social transformation!

Hong Kong Goethe Co., Ltd. © 2023 www.gather.top. All Right Reserved