Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

SilentCircle Launches Encrypted Call Service for Android

Silent Circle, a startup company providing private encrypted communications solutions, this week released a version of its “Silent Phone” app for Android.

Silent Circle, a startup company providing private encrypted communications solutions, this week released a version of its “Silent Phone” app for Android.

Silent Phone offers a peer-to-peer secure encrypted data communications service, and is now available for Android, adding to existing support for iOS devices.

With the goal of revolutionizing privacy and mobile security, the company was co-founded by former Navy SEAL sniper Mike Janke, and PGP creator Phil Zimmermann, and has created an advanced platform for encrypted text, e-mail, mobile phone and video teleconferencing services through a secure, proprietary network and set of applications.

SilentCircle LogoSilent Phone uses an application running on a smartphone or tablet, combined with encryption technology and Silent Circle’s secure, custom-built “Silent Network” in order to secure voice and video call data across cellular and Wi-Fi networks.

Silent Phone also supports secure video over 3G, 4G, EDGE or Wi-Fi networks, the company said.

For $20.00 a month, users get their own individualized phone number to use for secure calls through the SilientCircle service. That number can be used for encrypted calls “inside the Circle” between any two Silent Phone users, which are routed through the Silent Network, the company explained. An option for “out-circle” access is also available where users can make calls outside the circle to and from any number, though the last leg of the connection looses the encryption benefit after leaving the Silent Circle network.

Silent Phone utilizes the ZRTP peer-to-peer encryption protocol which eliminates the risks of having a third-party store and manage encryption keys. The company also promises that there are “absolutely no back doors” in the platform.

“Senior corporate executives and government officials are using work-issued smartphones and their own personal devices under BYOD for sensitive discussions, despite their increasing susceptibility to eavesdropping and other surveillance threats across all communication mediums,” said Silent Circle CTO, co-founder and former PGP Corporation co-founder Jon Callas. “Silent Phone is an easy to use, yet powerful smart phone application that leverages state of the art technology and is now available for iOS and Android, the two most popular smart phone platforms.”

Advertisement. Scroll to continue reading.

“Large organizations are in need of a secure, cross platform communications service. We are pleased to offer Android users, who comprise approximately 75 percent of the total smartphone market, a robust service offering,” said Silent Circle CEO, co-founder and former U.S. Navy SEAL, Mike Janke. “Encryption of this strength and performance has never been this easy for top executives and other espionage targets to use in support of their job requirements, mobility and missions.”

To use Silent Phone, users get the app from Google Play or the App Store and create a Silent Circle account.

Silent Circle offers other secure communications solutions including:

• “Silent Text” which provides encrypted text messaging with “burn notice” feature for permanently deleting messages from device registries. Available for iOS now with Android version coming soon.

• Silent Eyes – Encrypted VoIP (video & voice) teleconferencing from laptops and business conference systems through Silent Circle’s custom HD network. Currently only available for Windows machines.

The company also plans to launch an encrypted e-mail service to be called “Silent Mail” that will offer compatibility with popular e-mail client software.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.

Register

Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cybersecurity Funding

Los Gatos, Calif-based data protection and privacy firm Titaniam has raised $6 million seed funding from Refinery Ventures, with participation from Fusion Fund, Shasta...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Privacy

Many in the United States see TikTok, the highly popular video-sharing app owned by Beijing-based ByteDance, as a threat to national security.The following is...

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.