Communication Confidential: Startup Offers P2P Encrypted Voice, Text, VideoCommunication Confidential: Startup Offers P2P Encrypted Voice, Text, Video
Startup Silent Circle rolls out encrypted text, voice, video -- and soon, email -- for the ultra privacy- and security-conscious
October 17, 2012
PGP email encryption creator Phil Zimmermann has co-founded a new startup offering encrypted communications services for voice, text, video, and email that operates on a new multimillion-dollar peer-to-peer network.
The privately held Silent Circle has invested somewhere between $5 million to $10 million in a custom-built, peer-to-peer network infrastructure that uses end-to-end encryption and erases the session keys after a call or text is finished.
But Silent Circle's services aren't for just anyone: "We're an encrypted communications service targeting high-end services for businesses [and individuals] around the world," says Mike Janke, co-founder and CEO of Silent Circle, which went public yesterday.
The company has four encrypted communications services: Silent Phone, Silent Eyes (for video), and Silent Text (for text messaging). Silent Mail -- encrypted email is on the horizon. The cost is $20 per user per month for all four services, and the services are aimed mainly at users who travel, especially overseas, and need to lock down their mobile devices and other communication.
Among its beta testers: Hollywood stars (not to be named, of course), NATO, and fashion designers. It's for organizations or people tired of "their intellectual property getting ripped off," says Janke, who is one of two former Navy SEALs at the company.
But Silent Circle isn't the first company to come up with a secure, private communications circle approach to privacy: Earlier this summer, startup Wickr rolled out a free app for iPhone, iPad, and iTouch devices that employs military-grade encryption and self-destruction for text, video, and picture messages. The goal of Wickr is to "leave no trace" and to, by default, ensure that online communications are not traceable by governments, corporations, or bad guys, according to the company’s mission.
Silent Circle's Janke says the concept is the same, but the products are different. "[Wickr is] just one app. We have a text app that's very similar to it, but we also are using point-to-point to build our own stand-alone network," he says. "Our product is not trying to be everything for everyone: It's for a select few professionals and individuals around the world," rather than any user, he says.
Security Investigations Inc., a boutique security firm that provides private investigation and physical security consulting services to A-list celebrities, government agencies, and dignitaries, has beta-tested Silent Circle's services. Vern Abila, president of Security Investigations, says his firm plans to use it internally as well as recommend it to its "high net-worth" individual clients,
"They designed it to look just like the iPhone screen for texting and phone calls. That will ensure people will use it a lot more," Abila says. "The peer-to-peer thing is cool ... You can talk on the phone and do video and voice at the same time and be encrypted."
Silent Circle -- led by Zimmermann, who is president -- has stuck with a self-funding model, turning away venture capital in order to remain independent and neutral. It does not store encryption keys, with the exception of its upcoming Silent Mail email service, which will allow users to either create and manage their own PGP keys or have Silent Circle's PGP Universal server generate the keys.
Voice and texting were priority in the rollout time frame. "[Voice and texting are] primarily what people do, and what everybody said they were most interested in" for encrypted communications, says Silent Circle CTO Jon Callas, who co-founded PGP.
The encrypted services initially support 4G and 3G Apple iOS devices, according to company execs; Android support is in the works.
Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware