Welcome!

Symbian Authors: Jack Newton, Kevin Benedict, Matthew Lobas, Shelly Palmer, RealWire News Distribution

News Feed Item

Silent Circle Releases Silent Phone For Android And Out-Circle Access

Private encryption service developed by PGP inventor Phil Zimmermann protects voice and video calls on both Android and iOS devices across cellular and Wi-Fi networks

WASHINGTON, Jan. 16, 2013 /PRNewswire/ -- Silent Circle, a global private encrypted communications firm revolutionizing privacy and mobile security, today announced that its Silent Phone app delivering the industry's first peer-to-peer secure encrypted data communications service is now available in Google Play for Android users. Silent Phone is also the first and only service offering that enables secure video via your smartphone over 3G, 4G, EDGE or Wi-Fi networks.

(Logo:  http://photos.prnewswire.com/prnh/20121016/LA92632LOGO )

Already available for Apple's iOS devices in the App Store, Silent Phone combines an elegant app interface with state-of-the-art encryption technology and Silent Circle's secure, custom-built Silent Network to protect voice and video call data on cellular and Wi-Fi networks from interception and eavesdropping. Recognized for its high fidelity, unobtrusive nature and signature use of the ZRTP peer-to-peer encryption protocol - which eliminates third-party encryption key management and tampering risks - Silent Phone sets the gold standard for assuring private communications.

"Senior corporate executives and government officials are using work-issued smartphones and their own personal devices under BYOD for sensitive discussions, despite their increasing susceptibility to eavesdropping and other surveillance threats across all communication mediums," said Silent Circle CTO, co-founder and former PGP Corporation co-founder Jon Callas. "Silent Phone is an easy to use, yet powerful smart phone application that leverages state of the art technology and is now available for iOS and Android, the two most popular smart phone platforms."

"Large organizations are in need of a secure, cross platform communications service. We are pleased to offer Android users, who comprise approximately 75 percent of the total smartphone market, a robust service offering," said Silent Circle CEO, co-founder and former U.S. Navy SEAL, Mike Janke. "Encryption of this strength and performance has never been this easy for top executives and other espionage targets to use in support of their job requirements, mobility and missions. Our customers have the crucial advantage of placing highly secure calls anywhere they can find a signal."

To use Silent Phone, customers download the app from Google Play or the App Store and create a Silent Circle account. For a $20.00 per month subscription, a Silent Phone account features a unique "silent" phone number for secure, end-to-end encrypted calls "inside the Circle" between any two Silent Phone subscribers, which are routed through the Silent Network.

Using the just released "Out-Circle Access" option, calls can also be made "outside the Circle" from the Silent Phone app to regular phone lines, with encryption in place between the Silent Phone user and the Silent Network boundary. This enables Out-Circle Access subscribers to make and receive calls to any numbers outside the Silent Network in the U.S., Canada and Puerto Rico for an additional $29.00 per month.

Utilizing the computing power of today's smartphones and tablets, Silent Circle's apps and private network do not require any hardware modifications, tokens or other ancillary items with users' devices. Subscribers simply gain built-in, high-security apps for calls, texts, e-mail and conferencing (alongside their devices' native apps) that integrate with their existing contacts, favorites and other device information. Silent Circle combines apps and other proprietary technologies to meet the secure communications needs of enterprises and individuals around the world with absolutely no back doors.

About Silent Circle's "Silent Suite" of apps:

  • Silent Phone: Encrypted voice and video calls on mobile devices. Currently available for iOS and Android, it can be used with Wi-Fi, EDGE, 3G or 4G cellular anywhere in the world.
  • Silent Text: Encrypted text messaging with "burn notice" feature for permanently deleting messages from device registries. Currently available for iOS with Android version pending.
  • Silent Eyes: Encrypted VoIP (video & voice) teleconferencing from laptops and business conference systems through Silent Circle's custom HD network. Currently available for Windows.
  • Silent Mail: Coming soon, Silent Mail will offer encrypted e-mail on Silent Circle's private, secure network and compatibility with popular e-mail client software.

ABOUT SILENT CIRCLE

Silent Circle is a global, private encrypted communications service headquartered in Washington D.C. that provides cutting-edge encrypted text, e-mail, mobile phone and video teleconferencing services through a secure, proprietary network and software apps. Silent Circle was co-founded by Mike Janke, former Navy SEAL and best-selling author, and Phil Zimmermann, the world famous Silicon Valley creator of Internet encryption for voice and data and a recent inductee into the Internet Hall of Fame. For more on Silent Circle, go to: https://www.silentcircle.com

Press Contact:
Tom Resau
Welz & Weisel Communications
[email protected]
703-877-8103

SOURCE Silent Circle

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete at launch. DevOps may be disruptive, but it is essential.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
"There is a natural synchronization between the business models, the IoT is there to support ,” explained Brendan O'Brien, Co-founder and Chief Architect of Aria Systems, in this SYS-CON.tv interview at the 15th International Cloud Expo®, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
The BPM world is going through some evolution or changes where traditional business process management solutions really have nowhere to go in terms of development of the road map. In this demo at 15th Cloud Expo, Kyle Hansen, Director of Professional Services at AgilePoint, shows AgilePoint’s unique approach to dealing with this market circumstance by developing a rapid application composition or development framework.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's platform-as-a-service. The new platform enables developers to build ap...

Advanced Persistent Threats (APTs) are increasing at an unprecedented rate. The threat landscape of today is drastically different than just a few years ago. Attacks are much more organized and sophisticated. They are harder to detect and even harder to anticipate. In the foreseeable future it's going to get a whole lot harder. Everything you know today will change. Keeping up with this changing landscape is already a daunting task. Your organization needs to use the latest tools, methods and expertise to guard against those threats. But will that be enough? In the foreseeable future attacks w...
Building low-cost wearable devices can enhance the quality of our lives. In his session at Internet of @ThingsExpo, Sai Yamanoor, Embedded Software Engineer at Altschool, provided an example of putting together a small keychain within a $50 budget that educates the user about the air quality in their surroundings. He also provided examples such as building a wearable device that provides transit or recreational information. He then reviewed the resources available to build wearable devices at home including open source hardware, the raw materials required and the options available to power s...
“The age of the Internet of Things is upon us,” stated Thomas Svensson, senior vice-president and general manager EMEA, ThingWorx, “and working with forward-thinking companies, such as Elisa, enables us to deploy our leading technology so that customers can profit from complete, end-to-end solutions.” ThingWorx, a PTC® (Nasdaq: PTC) business and Internet of Things (IoT) platform provider, announced on Monday that Elisa, Finnish provider of mobile and fixed broadband subscriptions, will deploy ThingWorx® platform technology to enable a new Elisa IoT service in Finland and Estonia.
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, deploy, and manage applications integrating voice, video and data. He is the co-founder of TeleStax, a...
The Internet of Things is not new. Historically, smart businesses have used its basic concept of leveraging data to drive better decision making and have capitalized on those insights to realize additional revenue opportunities. So, what has changed to make the Internet of Things one of the hottest topics in tech? In his session at @ThingsExpo, Chris Gray, Director, Embedded and Internet of Things, discussed the underlying factors that are driving the economics of intelligent systems. Discover how hardware commoditization, the ubiquitous nature of connectivity, and the emergence of Big Data a...
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
The Internet of Things is a misnomer. That implies that everything is on the Internet, and that simply should not be - especially for things that are blurring the line between medical devices that stimulate like a pacemaker and quantified self-sensors like a pedometer or pulse tracker. The mesh of things that we manage must be segmented into zones of trust for sensing data, transmitting data, receiving command and control administrative changes, and peer-to-peer mesh messaging. In his session at @ThingsExpo, Ryan Bagnulo, Solution Architect / Software Engineer at SOA Software, focused on desi...
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize supplier management. Learn about enterprise architecture strategies for designing connected systems tha...
"For over 25 years we have been working with a lot of enterprise customers and we have seen how companies create applications. And now that we have moved to cloud computing, mobile, social and the Internet of Things, we see that the market needs a new way of creating applications," stated Jesse Shiah, CEO, President and Co-Founder of AgilePoint Inc., in this SYS-CON.tv interview at 15th Cloud Expo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.