Secure Messaging Protocols Part 2: The Bleeding Edge | Wickr

Managed Secure Messaging & Federation

Post Compromise Security

Group Messaging

Message Franking

--

--

--

Secure Ephemeral Communications. Built for the enterprise. End-to-end encrypted messaging. Secure rooms. Peer-to-peer encrypted file sharing. Multi-platform.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

New Listing: $AXS

Trade Command Center

A decision framework for Cyber Investment and Cyber Insurance for CISOs and CIOs| Lucideus

How to remove malware from your Windows PC

PAN Card: How to Apply For PAN Card & How to Download PAN Card | PAN Card Status

Reliance Jio’s new recharge plan, 2.5 GB data daily and validity of one year

Reliance Jio's new recharge plan, 2.5 GB data daily and validity of one year

Finding Forensic Goodness In Obscure Windows Event Logs

PROTECTING THE RETIREMENT INDUSTRY FROM CYBER THEFT AND RANSOMWARE

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Wickr

Wickr

Secure Ephemeral Communications. Built for the enterprise. End-to-end encrypted messaging. Secure rooms. Peer-to-peer encrypted file sharing. Multi-platform.

More from Medium

The Option to Migrate off Authy’s Proprietary System

Coding in C is foundational to what is conceptualized in the realm of computer programming and the…

Libraries in C: a coding exploration.

ENDPOINT SECURITY: RISING RISKS AT THE ENDPOINT AND HOW TO PROTECT AGAINST THEM

Asymmetric Key Cryptography (and Hashes)