Feeds

PGP founder's mobile privacy app goes live

Zimmermann & Navy SEAL pals unveil safe comms, at $20 a month

Providing a secure and efficient Helpdesk

Updated Silent Circle, the secure mobile communications app backed by Phil Zimmermann, has gone live - offering protection from all but the most determined of government departments.

Silent Circle comprises a handful of iOS/Android/PC apps facilitating secure phone calls, text messaging and video calling, with secure email promised soon, all presented through an idiot-friendly interface aimed at corporate executives and international journalists rather than local freedom fighters who might find $20 a month a bit rich.

We discussed the product at length in June, and it hasn't changed significantly since then. Communication between Silent Circle subscribers is entirely secure, while calls made outside the Circle are secured to the edge (which is in Canada or Switzerland) and then enter the unsecure public networks, Secure Circle is also registered outside the USA to avoid lawful-intercept requirements.

Cryptography is very rarely broken, publicly-scrutinised algorithms such as those used by Silent Circle require enormous resources to crack, beyond the reach of all but the most determined government. Secure networks are generally broken through poor implementations or badly-designed systems around the cryptography.

A good example is Cryptocat, a web-based tool for secure communications which was lauded by Wired and the Wall Street Journal before analysts started pointing out that storing crypto* on a web server is inherently risky, as one's security is entirely dependent on the sanctity of that public-facing server.

Complete security is, of course, impossible, and given most of us couldn't spot a Chinese remainder theorem if it hit us in the face, we're required to place our trust in experts or the companies they endorse. Having been largely responsible for PGP, the crypto which got the US government so upset, Zimmermann is a brand most geeks will trust. Silent Circle will be hoping those geeks can convince their corporate colleagues that $20 a month is a small price to pay for secure communications. ®

*Cryptocat has been in touch to assure us that version 2, launched last month, fixes all the highlighted issues, securing instant text messages without dependence on the security of the web server.

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.