Posts Tagged communications

Mobile Apps: Silent Circle

Check this out. Silent Circle is a subscription service that promises to deliver a secure and encrypted communications platform. Phil Zimmermann put this concept together and he is marketing this thing for security professionals with the help of some former Navy SEALs.

What I like about this service is that companies could actually set up accounts with contractors/employees using Silent Circle, and know that the communications between all parties will be secure. From the phone calls to text messages to emails–the entire communications system will be secure and extremely difficult to hack.

Families can also be a part of a separate Silent Circle account between the contractor and their loved ones/friends. This is great because today’s enemy’s and hostile governments all have a desire to hack into the accounts of folks involved with security operations throughout the world. They monitor everything from Facebook and Twitter accounts, to emails/phone calls etc. You have to assume all of that is happening, and to have any tools to help in the battle to secure your communications is a good thing. –Matt

 

 

Silent Circle

When a Silent Circle subscriber makes a phone call, sends a text or video chats with another Silent Circle member, that transmission is secured and encrypted end-to-end from the iPhone, Android, iPad or computer on our crystal-clear secure network. Silent Mail is an elegant and encrypted email solution, however, it utilizes server side key encryption not peer-to-peer. Our Silent Phone, Silent Mail and Silent Text products also allow you to call or send/receive emails to anyone in the world – any phone number – any email address, even to those not in our secure Circle (subscribers). Our products download from the Apple App Store, Android Play Store and from our website – simple, fast, secure.
Silent Network
We Designed It, We Custom-Built It & We Own The Network
Silent Circle Network provides encrypted communication tools that leverage cutting edge and simple to use apps and software. Here’s how we do it:
• Open Source Peer-Reviewed Encryption – Our founders are the inventors of the world’s most trusted encryption protocols: PGP, ZRTP, SCimp
• Multimillion dollar custom-built high definition network
• Geographic server redundancy – Servers located in Montreal and Toronto built with scalability for continued geographic expansion (Our Switzerland Network will come online Fall 2012)
• 100% dedicated network – No sharing
• Custom-built servers, PBXs and hardware – Ensuring security integrated through design
• E-Commerce, customer service, analytics and network monitoring software all custom built and designed to ensure security
• Device-to-Device Encryption – True peer-to-peer key negotiation with every communication session. Keys are destroyed at the end of every call eliminating the possibility of retroactive compromise
• Interactive Voice Authentication – Visual and vocal encryption verification eliminating the possibility of MiTM (man in the middle) attacks and a short authentication string (SAS)
• Peer Reviewed Encryption and Hashing Algorithms
– Elliptic Curve Cryptography (P-384)
– Advanced Encryption Standard (AES-256)
– Secure Hash Algorithm (SHA-256)

Company website here.

—————————————————————-

Phil Zimmermann’s Silent Circle Builds A Secure, Seductive Fortress Around Your Smartphone
By Neal Ungereider
October 5, 2012
The cryptography legend is teaming up with two ex-Navy SEALs to offer encrypted phone calls, video conferencing, and text messages with no learning curve whatsoever. The target market? Businesspeople and government employees traveling abroad.
In the 1990s, cryptography pioneer and Pretty Good Privacy (PGP) creator Phil Zimmermann faced federal criminal investigation. His encryption software was so strong, it was charged, there was fear it violated arms trafficking export controls.

Read the rest of this entry »

Tags: , , , ,

Technology: Google Translation Tool, and Reaching Out to the Rest of the World

     This is an awesome tool.  Feral Jundi is read by mostly english literate folks from all over the world, and now with Google Translator, we can reach everyone else. And believe me, I get emails from security contractors or individuals interested in the business from all over the world, and this makes total sense to better serve this group.

     So this is how Google Translator (parked at the right on FJ) works. You hit the arabic button for example, and bam, FJ is in arabic!  Although I am sure the literal translations probably get a little mixed up, but either way, it is still a translated copy of FJ.

    From what I gather, my friends who might speak english but cannot read it, use their own translation services to read blogs like this. I am sure a few already use Google Translator, and maybe in the comments section we can get some good feedback about other translation tools.

    But what is cool about this Google Translator tool is that there is a mechanism now on this site that you can use to pump out a quick translation of the site.  That makes FJ more useful and accessible than ever before. Although, if you write back to me, please use this free google translation service, and cut and paste in the email what you want to say to me. –Matt

Tags: , , , , ,