Secure Mobile Phone

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 16 October 2012

Silent Circle Has Launched - An Affordable Secure Communications Package

Posted on 09:03 by Unknown
Their opening salvo...
"We want to fight for your right to privacy. We are pushing back against the tide of surveillance. We don’t like oppressive regimes, indiscriminate wiretapping, big brother, data criminals, intellectual property theft, identity thieves or governments that persecute their citizens for saying or writing their opinions." — Silent Circle


Services:
• Silent Phone
• Silent Text (with a self-destructing feature)
• Silent Eyes (video call encryption)
• Silent Mail (coming soon)
All sold together as Silent Suite for $20.00 per month.


Coming Soon...

"Worldwide Secure Communications with the Secure Business Package brings together the entire Silent Circle suite of products. Not only is this an Encrypted Secure Calling Plan – it's also extremely cost effective compared to today's un-secure VoIP calling plans. The average large domestic carrier basic cell phone plan is about $40 a month with low minutes, low data and un-secure calls. With our Secure Business Package you can have peace of mind that you are communicating securely without worrying about your minutes. In today's market, unlimited calling and data plans with the major cell carriers cost over $120 a month – with our Secure Business Package at $49 per month, on top of a basic carrier plan of around $40 per month, is still much cheaper than today's unlimited carrier plans – and it's SECURE."

ENTERPRISE SOLUTIONS
"In today’s highly-connected International business realm, even small to moderate sized businesses have international employees, offices and partners. Silent Circle was developed and designed to help stop the theft of personal and corporate Intellectual Property, to defeat a critical piece of the Bring Your Own Device (BYOD) issue and to provide a true commercial Software-as-a-Service model for secure communications."

FutureWatch: Like the telephone itself, having one is useless, having two useful. Having millions of subscribers makes it an imperative.


If and when this product scales up, will there be any reason to communicate insecurely? Will the word wiretap join the lexicon graveyard along with galoshes, spitoon and fedora? The answer may depend upon two live-wire words... government regulation. 

For now, anyway, this is great progress. ~Kevin
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in advice, App, business, cell phone, counterespionage, eavesdropping, encryption, FutureWatch, privacy, product, telephone, wiretapping | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • The Ratters - men who spy on women through their webcams
    The woman is visible from thousands of miles away on a hacker's computer.   The hacker has infected her machine with a remote administr...
  • Google Glass Hacked - Everything You See and Hear Transmitted to Anyone
    Google's Glass wearable computer have been hacked so video and audio can be transmitted online to anyone. Hackers have been able to remo...
  • This Week in Spy News
    The chairman of Stow College in Glasgow has resigned after a row over a recorded conversation on a device branded a "spy-pen". ( m...
  • CONTEST (ENDED) - Who Is This Man?
    We have a winner! Congratulations!! Answer below. Clues... • Born 1897. • Died 1973. • Expert wiretapper.  • Good high speed driver.  • Shar...
  • The US classification system
    (Updated: October 12, 2013) Top Level Telecommunications often involve information that has to be kept secret. To ensure that, governments h...
  • When Paranoids Collide they Blow the Whistle on Tea Kettles
    Customs agents in Russia found tea kettles and irons bugged with tiny Spyware chips that exploit WiFi connections , reports a local news out...
  • "1984" Gets a New Look
    via creativity-online.com ... You can't judge a book by its cover, but there's no denying that a thoughtful, bold packaging can mak...
  • Watergate's Next Watergate
    A history professor hopes that a federal court's recent order to release long-sealed Watergate documents will shed light on the motivati...
  • Laser Beam Eavesdropping - In the News Again
    Since the 1970's, stories about laser listeners have periodically popped up in the news. The common thread is their magical ability to e...
  • From BULLRUN to NOCON and LACONIC
    On September 5, The Guardian , The New York Times and ProPublica jointly revealed that NSA has a top secret program to break encryption sy...

Categories

  • advice
  • aerial
  • amateur
  • Android
  • App
  • Apple
  • art
  • biometric
  • BlackBerry
  • blackmail
  • Bluetooth
  • Boeing
  • book
  • business
  • BYOD
  • CALEA
  • cartoon
  • cautionary tale
  • CCTV
  • cell phone
  • CIA
  • Classification
  • Clothing
  • computer
  • contest
  • counterespionage
  • Darwin
  • data
  • detection
  • drone
  • dumb
  • eavesdropping
  • email
  • employee
  • encryption
  • ERII
  • espionage
  • extortionography
  • FBI
  • fiber-optic
  • find
  • food
  • FREE
  • fun
  • FutureWatch
  • General Dynamics
  • Germany
  • Gold Phone
  • government
  • GPS
  • GSM
  • Hack
  • historical
  • Hotline
  • humor
  • IAPSC
  • IMCPB
  • Infrared
  • Internet
  • ISAF
  • Israel
  • IST
  • IT
  • just coincidence?
  • KDM
  • keystroke
  • KGB
  • Kremlin
  • laser
  • law
  • lawsuit
  • leaks
  • malware
  • marketing
  • MI6
  • mind reading
  • miscellaneous
  • mores
  • movie
  • nature
  • Netherlands
  • North Korea
  • NSA
  • Obama
  • optics
  • OSS
  • password
  • PI
  • police
  • political
  • poll
  • POTUS
  • PRISM
  • privacy
  • product
  • quiz
  • quote
  • Ra-parents
  • Ray-Gun
  • recording
  • Red Phone
  • religion
  • RFID
  • Russia
  • sabotage
  • satire
  • scam
  • shredder
  • Situation Room
  • social engineering
  • software
  • sports
  • Spy Museum
  • spy school
  • spybot
  • spycam
  • spyware
  • SpyWarn
  • statistics
  • STE
  • steganography
  • STU-II
  • STU-III
  • surveillance
  • survey
  • telephone
  • TEMPEST
  • Tips
  • toy
  • tracking
  • trade secret
  • TSCM
  • Twitter
  • UMTS
  • USA
  • USB
  • USSR
  • Vatican
  • VoIP
  • voyeurism
  • Watergate
  • weird
  • White House
  • Wi-Fi
  • Wireless
  • wiretapping
  • X-Ray Vision

Blog Archive

  • ►  2013 (455)
    • ►  November (47)
    • ►  October (53)
    • ►  September (31)
    • ►  August (50)
    • ►  July (50)
    • ►  June (47)
    • ►  May (35)
    • ►  April (40)
    • ►  March (29)
    • ►  February (33)
    • ►  January (40)
  • ▼  2012 (84)
    • ►  December (33)
    • ►  November (33)
    • ▼  October (12)
      • Seeing Through Shower Curtains and Other Light Sca...
      • The Washington-Moscow Hotline
      • Maltego - For the PI and Security Director of the ...
      • FBI Issues Warning Regarding Android Malware
      • New Burglar Alarm... not for you, for the burglar.
      • Bike Race Dopes - Another DIY TSCM Failure
      • $89.99 Wi-Fi Bug You Control With Your iPhone... f...
      • Common Problem - Technology Outpaces Spies
      • Today in Eavesdropping History
      • Chinese Communications Equipment Maker ZTE Cuts Co...
      • Silent Circle Has Launched - An Affordable Secure ...
      • Future Room Lighting to Double as Light "Wi-Fi"......
    • ►  June (2)
    • ►  May (2)
    • ►  February (1)
    • ►  January (1)
Powered by Blogger.

About Me

Unknown
View my complete profile