Recently, according to Sohu reported that new intelligent applications on the platform, protect the application of user information is also hot, and recently, a new store in the Apple Stores Wickr detonated a download boom. The application, which claims to provide military-level protection for user messages, has also sparked deep thinking about the protection of information.
Wickr provides end-to-end encryption to the data being transmitted, and therefore does not leave a copy of the message in the server. Such encryption technology allows the user to decide who can see the information and how long it will take to set the Wickr time for the message sent, set from seconds to days, and the message will be completely removed from the terminal and server after the set time has ended. At the same time, Wickr can transmit data including text, pictures, audio, video and many other formats.
The San Francisco start-up company is also developing apps for Google's Android operating system, co-founder Nico Sell said: "We believe that information communication should only be kept for a short period of time, and that personal and business communications can be traced according to the current computer system." People should have two different kinds of communication, one traceable and one untraceable. E-mail is traceable, and Wickr is designed for untraceable communication. "He is also the main person behind the Las Vegas hacking conference, and other founders are the military cyber security expert Kara Coppa and the computer crime investigation expert Howell.
Wickr security measures include two aspects, one is the encryption of the server link, the company co-founder Robert Statica said, Wickr through AES and RSA Strong encryption, the company's servers can not even read the content, so do not worry about the server to disclose privacy issues.
Another aspect of Wickr's confidentiality is how it destroys what you send, because simply deleting the file does not mean that the files have been destroyed. Wickr will write back random garbage data and overwrite the original data so that even if someone else gets the file through the data recovery software, it doesn't see anything. "If someone tries to recover the deleted data, all he gets is a bunch of junk data." "Encrypting your information is a way to protect privacy, but the most fundamental way to protect confidential information is to destroy it, which is the original motivation of our design," says Robert Statica. "(MK)
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.