Silent Text app for iOS allows encrypted file transfers with self-destruct option
Every file is encrypted with a unique key, Silent Circle says
IDG News Service - Silent Circle, a startup company that provides encrypted mobile communication services, released a new version of its Silent Text app for iOS that allows users to exchange encrypted files at the push of a button. The files can be set to self-destruct.
Silent Circle currently offers two mobile apps for encrypted communication called Silent Phone and Silent Text, but plans to add Silent Mail in the future as well. As their names suggest, these apps can be used for secure voice and video calling, secure text messaging and secure email. A fourth app Silent Eyes is available for computers and can be used for encrypted video and voice teleconferencing.
The current and future apps are free to download, but can only be used with a subscription to Silent Circle's service that costs US$20 per month.
All of the communications pass through Silent Circle's servers, but they do so in encrypted form. The data is encrypted locally with keys generated on the devices. The company doesn't have access to them so it can't see the actual content.
Silent Circle's main goal is to put the security in the user's hands, said Jon Callas, the chief technology officer of Silent Circle. "The apps make sure that all of the security controls are with you and that we don't have any way to read your data. We can't read your texts, we can't listen in on the phone calls. Everything gets destroyed when the call completes."
With the newly launched version of the Silent Text app, users now also have the ability to attach files and their geographical location to text messages. The files can be documents, pictures, movies, audio recording, map locations -- basically anything that can normally be sent with an iOS device.
There is currently a 65MB per file size limit in order not to overload the service, but this is expected to be increased in the future, Callas said.
The user can also use a "burn notice" option that will automatically delete the file and the message it's attached to from both the recipient's device and his own device after a configured period of time, so that there are no forensic traces left.
Each file is encrypted with a unique key that gets deleted when the message is destroyed, Callas said.
While there are other tools to encrypt files and exchange them, this is often too complicated for non-technical users. One of the goals of these apps is to remove the complexity associated with encrypted communication, Callas said.
"The apps look pretty much like normal apps," he said. "The texting app looks like the normal texting app. You use it like you would use the regular texting app. We remove all the complexity for you."
- Top 12 Laptop Bags for Mobile Pros
- Think Deleted Text Messages Are Gone Forever? Think Again
- 7 New Faces of the C-suite
- 5 Ways CIOs Can Rationalize Application Portfolios
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Performance Management: The Mobile App Development Playbook This comprehensive 16 page Forrester Research, Inc. report, authored by Jeffrey Hammond, Forrester VP and Principal Analyst, details a number of valuable, commonly...
- New Problems Require Innovative Solutions The mobile market is expected to be worth $25 billion by 2015
- Getting Agnostic about Mobile Devices The idea of being able to interact with customers, prospects, and stay attuned to competitive pressures is not new, but the velocity at...
- The cloud: inevitable, but not ubiquitous It's an age old question for those considering cloud: where do I start? But with all the hype surrounding the cloud, that's not...
- Leveraging the Cloud for Dev/Test This video discusses some of the key considerations that IT organizations should take into account when moving test and development projects to the...
- A Secure Cloud for Development and Testing Environments This video shows the benefits of hosting your development and testing environments in the Enterprise Cloud Services - Virtual Private Cloud. All Mobile Apps White Papers | Webcasts
As emerging technologies evolve they often find an initial niche in highly specialized scenarios, or in specific industry verticals, before expanding to wider areas of applicability. Within these initial niches, the early adopters can be anything from digital enthusiasts to fashionistas, or they can be folks simply using the technology because it serves a specific need extremely well. (free registration required) more