Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

6/27/2012
05:29 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Free App Encrypts, Destroys Mobile Messages

Startup Wickr launches today with iPhone, iPad, iTouch app that ‘leaves no trace’ of text, video, and picture messages

A startup launched today with a free app for the iPhone, iPad, and iTouch that employs military-grade encryption and self-destruction for text, video, and picture messages for privacy purposes.

DefCon veteran and security venture catalyst Nico Sell, a co-founder of the Wickr, says the time is right for this form of user-friendly private communication. The app also comes with anti-forensics features so messages can’t be resurrected. “Today by default, we send an email, and everything lasts forever,” but it should not be so easy to monitor or hack, she says. The goal of Wickr is to “leave no trace,” and to by default ensure that online communications are not traceable by governments, corporations, or bad guys, according to the company’s mission.

“We made this app for hundreds of millions of users, not just for the paranoid people. It’s so easy to use, so we know this can [catch on]. My three-year-old can send an encrypted message,” Sell says.

Wickr is based on 256-bit symmetric AES encryption and RSA 4096 encryption, as well as a proprietary algorithm. “It’s the first end-to-end encryption application that works without relying on a PGP key,” says Robert Statica, information technology professor at New Jersey Institute of Technology and one of the co-founders of Wickr. He says Wickr’s servers don’t see users’ accounts, and all it stores is a cryptographic version of the users’ Wickr IDs and hardware IDs, so they remain anonymous.

In a text session on Wickr, for example, only the recipient’s device can decrypt the message. And users set a retention policy for how long a message is saved before it self-destructs.

An Android version of the app is in the works as well as a paid, enterprise version of the software that will roll out in a couple of months that allows for higher-volume video and voice messages, for instance. But Wickr doesn’t plan to remain only in the mobile device space: laptop and desktop versions are also in the plans to protect email and other communications, its founders say.

Will anonymous, encrypted communication entice enterprise IT departments as a new security app, or raise data leakage concerns? “Leaking is a problem. But data that’s destroyed can’t be leaked,” says security expert Dan Kaminsky, who acts as a formal advisor to the company.

Kaminsky says the bottom line with Wickr is that it’s a communication environment with the expectation of privacy. “When you send a message, it will be deleted, and when you receive a message,” the app later deletes it, he says.

Wickr’s Sell says the self-destruct feature of the app is key. “We’ve all had friends’ emails [hacked] and posted online and it wasn’t their mistake: someone else was not doing good security,” says Sell, who is the founder of DefCon Kids, Montara Mountain, and several security companies

Encryption technology has been around for a long time, but its use remains the exception rather than the rule for email and other person-to-person communications. “Wickr is part of a second wave of security technologies that’s trying to integrate usability for normal people. Sure, us nerds can figure out PGP and have key-signing parties,” Kaminsky says, but most people can’t do that.

Wickr’s other co-founders are Kara Coppa, a security expert with military and commercial experience who pioneered the military’s first intrusion prevention system deployment; Christopher Howell, a former investigator for the State of New Jersey with experience in computer crime investigations and forensics; and Robert Statica, an IT professor at New Jersey Institute of Technology.

[Immaturity in mobile-device hardware and operating-system environments is holding back organizations' deployments of strong cryptographic protections around mobile applications. See Mobile's Cryptography Conundrums.]

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
YRAV000
50%
50%
YRAV000,
User Rank: Apprentice
7/5/2012 | 6:08:34 AM
re: Free App Encrypts, Destroys Mobile Messages
Try Comodo mobile security to keep you phone safe and secure.
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...