Silent Text app for iOS allows encrypted file transfers with self-destruct option
Every file is encrypted with a unique key, Silent Circle says
IDG News Service - Silent Circle, a startup company that provides encrypted mobile communication services, released a new version of its Silent Text app for iOS that allows users to exchange encrypted files at the push of a button. The files can be set to self-destruct.
Silent Circle currently offers two mobile apps for encrypted communication called Silent Phone and Silent Text, but plans to add Silent Mail in the future as well. As their names suggest, these apps can be used for secure voice and video calling, secure text messaging and secure email. A fourth app Silent Eyes is available for computers and can be used for encrypted video and voice teleconferencing.
The current and future apps are free to download, but can only be used with a subscription to Silent Circle's service that costs US$20 per month.
All of the communications pass through Silent Circle's servers, but they do so in encrypted form. The data is encrypted locally with keys generated on the devices. The company doesn't have access to them so it can't see the actual content.
Silent Circle's main goal is to put the security in the user's hands, said Jon Callas, the chief technology officer of Silent Circle. "The apps make sure that all of the security controls are with you and that we don't have any way to read your data. We can't read your texts, we can't listen in on the phone calls. Everything gets destroyed when the call completes."
With the newly launched version of the Silent Text app, users now also have the ability to attach files and their geographical location to text messages. The files can be documents, pictures, movies, audio recording, map locations -- basically anything that can normally be sent with an iOS device.
There is currently a 65MB per file size limit in order not to overload the service, but this is expected to be increased in the future, Callas said.
The user can also use a "burn notice" option that will automatically delete the file and the message it's attached to from both the recipient's device and his own device after a configured period of time, so that there are no forensic traces left.
Each file is encrypted with a unique key that gets deleted when the message is destroyed, Callas said.
While there are other tools to encrypt files and exchange them, this is often too complicated for non-technical users. One of the goals of these apps is to remove the complexity associated with encrypted communication, Callas said.
"The apps look pretty much like normal apps," he said. "The texting app looks like the normal texting app. You use it like you would use the regular texting app. We remove all the complexity for you."
- Use the Mobile App Mix to Choose an Enterprise App Store Strategy In this research report Gartner outlines how organizations can optimally secure, distribute, and manage mobile applications for employees and contracted workers.
- The Case for Mobile Apps Today's mobile apps turn handheld devices into e-book readers, portable navigation systems, digital wallets and more. And for organizations with mobile workers, they...
- The 5 Big Lies About Going Mobile You've heard about the power of mobile to change your business. But have you realized your mobile potential? It's about much more than...
- Transforming enterprise applications for mobile environments This new white paper explains how Dell Application Modernization and Development Solution Set can help you understand when to develop new mobile apps,...
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- Why do you need an enterprise mobile platform? Today companies must offer great apps that run on a range of devices, and connect to an exploding set of backend data. Appcelerator... All Mobile Apps White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!