Privacy messaging tool Wickr adds Dropbox integration

The latest version also adds video messaging, synching and a secure way to search for other friends or contacts

Wickr, a mobile messaging application that electronically shreds communications, has added the ability to send documents from Dropbox, leave video messages and a more secure way to search for other users of the application.

The latest version, 1.9, is due to be released on Apple's App Store on Monday. Wickr has been designed to tackle the problem of protecting people's private communications so that no one but the intended recipient will ever be able to see a message.

Wickr allows people to send encrypted messages with an expiry date ranging from a few seconds to a few days. The message is then scrubbed from the phone by overwriting its data. Wickr's servers only see encrypted data when sending the message, and even Wickr's servers are scrubbed of that unreadable data.

The application is intended to provide a much greater degree of privacy in an era where companies such as Facebook and Google retain massive amounts of user data. "Whether it's a subpoena or a hacker or a nation state -- there a lot of people trying to get that data," said Nico Sell, one of Wickr's founders. Wickr, based in San Francisco, has applied for a patent for how it securely communicates.

The free application was released last June, and Sell says it has hundreds of thousands of users so far. The latest version includes a host of performance enhancements and improvements to the user interface, in addition to some key features.

Whereas before the application could just send text messages, Wickr now allows people to send documents or video from the file-storage services Dropbox, Google Drive and Box. For example, people can send a PDF to their colleague and set self-destruct time. Sell said it is particularly useful for people who send highly sensitive PDFs, such as in health care or law.

In another improvement, Wickr has developed a way for people to connect with other Wickr users, but with a much stronger degree of privacy, said Robert Statica, a Wickr cofounder and an information technology professor at New Jersey Institute of Technology.

Many social networking applications offer the ability to scan a person's contact book in order to find other users. But that often means the service provider also has a copy of a person's address book. Wickr avoided doing the same thing since it infringes on users' privacy, Sell said.

But Wickr found a way around the problem. It creates a cryptographic hash of information from a person's address book and then compares that to other encrypted address book information to link users. Since the data is encrypted, Wickr has no idea who is connecting, and the data would be useless to a hacker. The feature is, however, for users who do not mind if other people find out they are using Wickr.

"What we realized is the majority of our consumers don't care about being anonymous," Sell said. "They want to be connected with their friends, but we wanted to do it in a way that doesn't abuse your contacts books."

Other new features include the ability to auto-login into Wickr, which lets user decide if they want to lower the security bar a bit but use Wickr in a way that is as fast as an SMS application. It also has a synching feature that lets people use the same Wickr account across several iOS devices. But as a security precaution, if a message is opened on one device, it is not accessible from other devices on the same account, Statica said.

Wickr eventually plans to roll out paid-for premium features later this year, such as the ability to send larger files and leave longer message. Voice messages in the free version are limited to 30 seconds, and file is limited at 5MB.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags securityWickrmobile securityDesktop securitydata protectionprivacy

More about AppleDropboxFacebookGoogleTechnology

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place