Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:38 AM
Dark Reading
Dark Reading
Products and Releases

Silent Circle Announces Silent Text For Android

iOS and Android users can communicate privately with peer-to-peer encrypted platform

WASHINGTON, D.C. – September 3, 2013 – Silent Circle, the global encrypted communications firm revolutionizing mobile device security for organizations and individuals alike, today announced the availability of its Silent Text secure messaging and file transfer app for Android devices via Google Play. With the addition of Silent Text for Android, Silent Circle's apps and services offer unmatched privacy protection by routing encrypted calls, messages and attachments exclusively between Silent Circle users' iOS and Android devices without logging metadata associated with subscribers' communications.

Silent Text for Android's features include:

· Burn Notice feature allows you to have any messages you send self-destruct after a time delay

· Send map locations encrypted and controlled

· Peer-to-peer key management – keys are on each device, not on Silent Circle's servers

· No one but you and the person you are texting can decrypt and read the information

· Send any file up to 100MB

· Revolutionizes secure business and personal communications with a tap of the finger

"Relentless surveillance and espionage by state-sponsored, commercial, and criminal actors worldwide continues to demonstrate vulnerabilities in cellular calls and mobile communications that executives, government officials and others rely on everywhere they travel," said Silent Circle CTO and co-founder Jon Callas. "At a time when large-scale network monitoring is making many cloud, telecommunications and other businesses' privacy policies almost moot, our services give employees and individuals with sensitive information the confidence to communicate and collaborate anywhere."

Silent Text for Android adds to Silent Circle's comprehensive set of private, peer-to-peer encrypted communications services including Silent Phone for secure mobile voice and video calling and encrypted voice and video communication on Windows PCs with Silent Circle Desktop for secure calls and conferencing.

"With our latest versions of Silent Phone and Silent Text, we give iOS and Android users a private, end-to-end encrypted platform for calling, messaging and sharing files designed to be inherently more secure than other mediums," Callas continued. "Beyond strong encryption, our apps give users important, additional privacy controls, such as Silent Text's ability to wipe messages and files from a recipient's device with a 'Burn Notice.'"

About Silent Circle's encrypted peer-to-peer communication services:

Silent Phone: Encrypted mobile VoIP calling with ability to seamlessly switch to high-quality, secure video calls, on-demand. Currently available for iOS and Android, it can be used with Wi-Fi, 3G or 4G LTE cellular anywhere in the world.

Out-Circle Access: Enables calls between one Silent Phone subscriber and a non-subscriber.*

Silent Text: Encrypted text messaging with support for almost any attachment up to 100MB and "Burn Notice" feature for permanently deleting messages from senders' and receivers' device registries. Messages can include map locations and multimedia recorded in the app. Currently available for iOS and Android.

Silent Circle Desktop: Encrypted VoIP audio and video calls and conferencing from Windows laptops and desktops through Silent Circle's custom HD network. Compatible with Silent Phone. Currently available for Windows PC's.

*Currently limited to PSTN calls in U.S., Canada and Puerto Rico.


Silent Circle is a global encrypted communications service headquartered in Washington D.C. providing a revolutionary peer-to-peer platform for encrypted voice, video, text and file transfer on mobile devices via a secure, proprietary network, software and mobile apps. Silent Circle was co-founded by Mike Janke, former Navy SEAL and best-selling author and Phil Zimmermann, the world famous Silicon Valley creator of Internet encryption for voice and data and 2012 inductee into the Internet Hall of Fame. For more on Silent Circle, go to: https://www.silentcircle.com

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
How a Manufacturing Firm Recovered from a Devastating Ransomware Attack
Kelly Jackson Higgins, Executive Editor at Dark Reading,  5/20/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-05-22
CSV Injection was discovered in ProjectSend before r1053, affecting victims who import the data into Microsoft Excel.
PUBLISHED: 2019-05-22
A CWE-754 Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex TriStation Emulator V1.2.0, which could cause the emulator to crash when sending a specially crafted packet. The emulator is used infrequently for application logic testing. It is susceptible to an attack...
PUBLISHED: 2019-05-22
A CWE-200: Information Exposure vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause the disclosure of SNMP information when reading memory blocks from the controller over Modbus.
PUBLISHED: 2019-05-22
A CWE-248: Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause denial of service when reading invalid physical memory blocks in the controller over Modbus
PUBLISHED: 2019-05-22
A CWE-248 Uncaught Exception vulnerability exists in all versions of the Modicon M580, Modicon M340, Modicon Quantum, and Modicon Premium which could cause a denial of Service when sending invalid debug parameters to the controller over Modbus.