Twitter to open source Android security tech
TextSecure, an Android text messaging client for encrypting messages, is up on GitHub now and other products will follow
IDG News Service - Twitter plans to open source some of the Android security products built by the developers behind Whisper Systems, which Twitter acquired last month.
Twitter is starting with Whisper Systems' TextSecure, an Android text messaging client that encrypts messages. Developers can view the source code at GitHub.
"We hope that as an open source project, TextSecure will be able to reach even more people, with an even larger number of contributors working to make it a great product," developers and Whisper Systems' founders Moxie Marlinspike and Stuart Anderson wrote on the Whisper Systems blog.
Twitter plans to open source "some" of Whisper Systems software but in a blog post about the move it did not specify which other products it would target. Other products include WhisperCore, software that enables full disk encryption and management tools for Android phones, as well as products that offer voice encryption, firewall software and encrypted backup.
When Whisper Systems announced that Twitter was acquiring the company it didn't say much about what Twitter might be planning to do with the technology. Offering the technology to the community so soon after the acquisition could indicate that Twitter made the acquisition primarily for the developer talent.
Whisper Systems' products fill a void in the Android OS, which lacks the kinds of security features that many businesses want. Few other companies are doing full disk encryption for Android, but there are many other companies taking different approaches to securing and managing Android phones. Among them are 3LM, Good Technology, Sybase, BoxTone, Fiberlink and MobileIron.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Alert Logic for PCI DSS Compliance To achieve PCI DSS compliance, you must identify and remediate all critical vulnerabilities detected during PCI scans. Threat Manager streamlines this process by...
- Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks The Rise of CyberSecurity
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts