Twitter’s Whisper Systems now an open source project

  • Liam Tung (CSO Online)
  • — 22 January, 2013 10:47

Whisper Systems, the mobile security startup Twitter acquired in late 2011, is now an open source project which has a new official home outside the microblogging service.

[[xref: http://www.wired.com/wiredenterprise/2011/11/twitter-buys-moxie/|Moxie Marlinspike|]], co-founder of Whisper Systems, joined Twitter’s security team at the time of the company’s acquisition. The purchase caused a stir since it meant RedPhone -- Whisper’s free call-encryption service used by protestors during the Arab Spring uprising -- was taken offline.

However, shortly afterwards, Twitter open sourced some of Whisper System’s software, including RedPhone, TextSecure, an app that encrypts messages for Android, and full disk encryption tool for Android, WhisperCore.

Marlinspike announced the launch of whispersystems.org, the website for Open Whisper Systems, via Twitter on Monday. The launch comes a few weeks after he quit his post at Twitter and had some "fun projects" coming up. One that he launched early last year was cloud-based password cracking service CloudCracker that promised to crack passwords for a $17 fee.

Open Whisper Core's website will become the focal point for all new developments to software that Twitter released under Open Source license (GPLv3).

“This is where we will be promoting, distributing, and coordinating the continued development of mobile security and privacy software,” the project notes on its blog.

“In an environment of increasingly pervasive surveillance, we want to make it as easy as possible for anyone to be able to organize and communicate securely.”

The two tools the Open Whisper Systems has launched with are RedPhone and TextSecure, both available on Google Play as beta releases.

Follow @CSO_Australia and sign up to the CSO Australia newsletter.

Tags: Whisper Systems, Android, twitter

Rising security threat should motivate better employee support: Symantec

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Cloud Security and Compliance Solutions

Manage and visualize the security and compliance of VMware, physical, and hybrid-cloud infrastructure from the RSA Archer eGRC Platform.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.