Wickr brings its self-destructing messages to Windows, Mac and Linux

Just like the mobile version, Wickr's new desktop apps sends messages that vanish without a trace.

Wickr has launched a set of new desktop apps for anyone feeling skittish about conversing over the Internet.

The new apps for Windows, Mac and Linux promise not to keep any record of your communications. Wickr doesn't store conversations or metadata on its servers, and it uses multi-layer AES256 and ECDH521 encryption to send messages to other users. (The company also offers a $100,000 bounty for anyone who finds serious vulnerabilities in its encryption.)

Each message also includes a self-destruct timer, with a maximum length of six days and a minimum of three seconds. Beyond just removing messages from the chat window, Wickr users a "Shredder" that periodically wipes message history from users' hard drives and RAM, and claims that shredded messages can't be recovered through forensic investigations.

To sign up, users create a name that allows other users to find them, along with a password for signing in and using the app across multiple devices. Users have the option to enter an email address and phone number--Wickr says it stores "cryptographically scrambled representations" of this information on its servers--but this is not required. After signing in, users can chat with groups of up to 10 people, and send text, images, video and audio messages.

Here's the caveat: There's nothing stopping the message recipient from taking a screenshot and storing or distributing it. While Wickr's Android app is able to block screenshots, this feature is not possible on iOS and doesn't seem to be available on the desktop versions. In other words, sending a self-destructing message through Wickr still requires a measure of trust.

Why this matters: With the potential for government snooping and data breaches, there's clearly a need for messaging apps that don't keep a record of users' communications. While Wickr isn't the only example--BitTorrent Bleep and Silent Circle are other options--its combination of free apps and broad platform support stands out for now.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationssecurityWickre-mailMessagingsoftwareSocial networking softwareprivacy

More about BleepLinux

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jared Newman

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts