Most applications we use to run our businesses and government are built to collect and process our data, rather than protect it. Having those in critical positions and with access to sensitive information do business on email or any app designed to make data accessible rather than secure means risks. We need to give our people the right tools, without any backdoors and built to protect data.
While consumers often give up too much of their information in exchange for free services, by and large these concessions are made by uninformed users who have no real recourse if things go badly and their privacy is compromised. Privacy settings should not be too difficult to locate and turned on. It is time to empower user to have more control over their information, not less.
Unless this confidentiality is truly protected by effective security measures, clients cannot trust their lawyers, and lawyers cannot credibly represent clients’ interests. Here is what you can do to boost your protection.
In making the decision about development framework, my team at Wickr opted to go with QT, a similarly-useful application development framework, for our desktop app. QT differs from Electron by skipping the browser on the client-side and integrating more directly with native system APIs to render the UI.
We have zero tolerance for anyone attempting to exploit our technology to conduct criminal activities. We take our responsibility to our community seriously and go to great lengths to assist law enforcement while protecting legitimate privacy interests of law abiding citizens. We aim to strike a balance between information security, the needs of law enforcement, and the right to privacy. It is no easy task, but we are committed to getting it right
In recognition of the risks facing our political institutions following the 2016 election breaches, the Senate’s Sergeant at Arms also approved and explicitly recommended the use of specific encrypted messaging apps for Senate use. Now is the time to leverage these tools to scale the protection to every elected official and their staff.
You can now easily search and add users directly to Secure Rooms or Conversations by simply typing in their email. If your contacts are found, you can start messaging right away. As always, Wickr Pro users can connect with both Pro and Wickr Me users, if federation is enabled by your network administrator.
In light of the attention focused on how the security of group messaging can be implemented better, Here is how Wickr fares against these types of attacks. In a nutshell, none of these attacks (nor anything similar) will work against Wickr. Here is why.
In an effort to enable private communications for the most vulnerable communities around the world, Wickr has opened access to its free private messenger Wickr Me for Iranian users. We have long worked with human rights activist and journalist communities in high-risk environments and know firsthand how important it is for civil society to have tools that enable strong default rather than opt-in end-to-end privacy.
Servers are treated by Wickr as untrusted so issues impacting the infrastructure are addressed by the architecture. Wickr is designed to provide peer-to-peer security with servers having no access to user content.
Wickr is committed to meeting and exceeding industry standards for transparency reporting. In this report you will discover the details of the past six months of our receipt and responses to user information requests or legal processes from July 1, 2017 until December 31, 2017.
Traditional methods of protecting valuable business and personal data are an arms race with no winners. It is time for a new strategy & platforms that enable data minimization and ensure that service providers & adversaries are kept out.
We developed Wickr tools in response to a very real need and adversaries that are increasingly difficult to defend against. The anti-data hoarding approach and privacy is the only way forward and it’s the principle that we stand for.
it is clear that momentum towards encryption is building not only among ethics authorities and commentaries, but amongst their clients who are proactively vetting law firms to assess their security prior to engagement.
In an age of ever more sophisticated cybercrime and mass surveillance, secure communication is an increasingly rare and premium commodity. As we develop better methods and models for protecting communication streams, it is essential to examine how the threat model for secure messaging applications has evolved beyond the traditional man-in-the-middle attack. This plays a crucial role in guiding the development of new secure communication tools to better address proven dangers to our digital security.
It is time to move sensitive communications out of easily compromised and discoverable channels. Neither email or IM is safe. Using these channels today is the same as knowingly clicking on a link from the Nigerian Prince. It is simply negligent.