Silent Text app for iOS allows encrypted file transfers with self-destruct option
Every file is encrypted with a unique key, Silent Circle says
IDG News Service - Silent Circle, a startup company that provides encrypted mobile communication services, released a new version of its Silent Text app for iOS that allows users to exchange encrypted files at the push of a button. The files can be set to self-destruct.
Silent Circle currently offers two mobile apps for encrypted communication called Silent Phone and Silent Text, but plans to add Silent Mail in the future as well. As their names suggest, these apps can be used for secure voice and video calling, secure text messaging and secure email. A fourth app Silent Eyes is available for computers and can be used for encrypted video and voice teleconferencing.
The current and future apps are free to download, but can only be used with a subscription to Silent Circle's service that costs US$20 per month.
All of the communications pass through Silent Circle's servers, but they do so in encrypted form. The data is encrypted locally with keys generated on the devices. The company doesn't have access to them so it can't see the actual content.
Silent Circle's main goal is to put the security in the user's hands, said Jon Callas, the chief technology officer of Silent Circle. "The apps make sure that all of the security controls are with you and that we don't have any way to read your data. We can't read your texts, we can't listen in on the phone calls. Everything gets destroyed when the call completes."
With the newly launched version of the Silent Text app, users now also have the ability to attach files and their geographical location to text messages. The files can be documents, pictures, movies, audio recording, map locations -- basically anything that can normally be sent with an iOS device.
There is currently a 65MB per file size limit in order not to overload the service, but this is expected to be increased in the future, Callas said.
The user can also use a "burn notice" option that will automatically delete the file and the message it's attached to from both the recipient's device and his own device after a configured period of time, so that there are no forensic traces left.
Each file is encrypted with a unique key that gets deleted when the message is destroyed, Callas said.
While there are other tools to encrypt files and exchange them, this is often too complicated for non-technical users. One of the goals of these apps is to remove the complexity associated with encrypted communication, Callas said.
"The apps look pretty much like normal apps," he said. "The texting app looks like the normal texting app. You use it like you would use the regular texting app. We remove all the complexity for you."
- Software Asset Management: Ensuring Today's Assets Today's trends like BYOD and SaaS are new and exciting in terms of how they will help make our jobs more productive but...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- AIIM Trendscape: The New Mobile Reality This AIIM Trendscape report shares data, expert opinions, and a unique perspective on the impact of cloud and mobility in the enterprise, surfacing...
- Empowering Your Mobile Workers A modern mobile IT strategy is no longer an option, it is an absolute necessity. Here's how some of the nation's most progressive...
- It's not too late...Get Your Mobile Questions Answered Live! How can IT provide seamless and secure mobile communications and collaboration for all? Join this live Webcast as IDG asks an expert panel...
- Why do you need an enterprise mobile platform? Today companies must offer great apps that run on a range of devices, and connect to an exploding set of backend data. Appcelerator... All Mobile/Wireless White Papers | Webcasts