Do You Know What Your Apps Are Up To? 10 Must-Have iPhone Apps; The 10 Most-Pirated Movies (this week); How to convert music and videos with VLC ; AV-Comparatives Names Product of the Year for 2014; Mozilla dusts off old servers, lights up Tor relays; Windows 10: You’ve got questions, I’ve got answers; Rolling Stone opens its archives on Google Play; Spies Know What You’re Downloading on File-Sharing Sites, New Snowden Docs Show; Hopper’s New Travel App Tells You The Best Time To Fly; Build your own home media center: Get started with Kodi; Want to spy on your wife? Change your grades? Hire a hacker! Bill Gates: I feel stupid for only speaking English; What I’ll Do With My Parents’ Facebook After They Die; Simple System Tweaker (free).
Hey, User! Do You Know What Your Apps Are Up To? – Suspending privacy concerns has become the tacit ‘payment’ exacted from consumers for accessing a ‘free’ service. Which of course means the service is not actually free. But that doesn’t mean people don’t care about privacy, more that they are being encouraged to trade it — to think of privacy as a currency which buys them digital access. To engage in a transaction. To illustrate both the transactional nature of privacy and how left in the dark consumers can be about the exact app permissions they are agreeing to when they tap ‘I agree’, the makers of encrypted communications software and hardware, Silent Circle and Blackphone, have put together the below video — which attempts to shed light on how extensive and unacceptable some app permissions can be.
10 Must-Have iPhone Apps – Look at any list of the best iPhone apps, and you could be there a while. Even if you narrow down your search to just the best free iPhone apps, there are still a lot of recommendations to consider. This list of ten must-have iPhone apps is for busy people who want to cut to the chase. These ten apps are the most essential ones that I think everyone should download.
The 10 Most-Pirated Movies (this week) – Three new flicks made it onto the most-pirated movies list this week—American Heist, Taken 3, and John Wick—and they feature Adrien Brody, Liam Neeson, and Keanu Reeves, respectively. If you want to learn more about those three movies, as well as the other movies that were popular among pirates, click through the slideshow linked both above and below.
How to convert music and videos with VLC – Getting software to convert music and videos for free is easy, but usually comes with some drawbacks. When you try to install the freeware, several other applications may try to sneak in by disguising themselves as tools for your computer. Also, you may end up with a converter that displays ads all over the interface. If you’re already using VLC on your desktop, you’ll be pleased to know that not only does it play pretty much all audio and video formats, it can convert them too. Here’s how to convert between formats in VLC:
Media menu in VLC. Nicole Cozma/CNET
Mozilla dusts off old servers, lights up Tor relays – Mozilla has given the Tor network a capacity kick with the launch of 14 relays that will help distribute user traffic. Engineers working under the Foundation’s Polaris Project inked in November pulled Mozilla’s spare and decommissioned hardware out of the cupboard for dedicated use in the Tor network. It included a pair of Juniper EX4200 switches and three HP SL170zG6 (48GB ram, 2*Xeon L5640, 2*1Gbps NIC) servers, along with a dedicated existing IP transit provider (2 X 10Gbps). French Mozilla engineer Arzhel Younsi (@xionoxfr) said its network was designed to fall no lower than half of its network capacity in the event of maintenance or failure.
People Looked at a Lot of Porn During the Northeast’s Short-Lived Snowmageddon – To the surprise of no one, Pornhub’s traffic spiked as snowbound Northeasterners spent Tuesday getting frisky with themselves.
AV-Comparatives Names Product of the Year for 2014 – 2014’s product of the year is Bitdefender Internet Security 2015. That’s not to say Bitdefender totally outperformed all of the other products tested by AV-Comparatives. In fact, there was a tie for the top spot, as Kaspersky Internet Security (2015) scored just as well as Bitdefender. In a case like that, the honor goes to whichever product had not won before, or, as in this case, the product that hadn’t won as recently. With Kaspersky, AVG, Avira, Emsisoft, F-secure, and Fortinet also made the cut-off for top rated products.
“the honor goes to whichever product had not won before, or, as in this case, the product that hadn’t won as recently.” LOL!
Time to admit, your “tests” serve no practical purpose.
Microsoft previews free, updated Power BI business intelligence tool – Aiming at a mass business-user audience, Microsoft has released a preview of the next version of its cloud-based data visualization software, Power BI, with a promise to maintain a free option even after its general release. Starting Tuesday, businesses can sign up at PowerBI.com to test it (the first version premiered last February). A free version of the software is available immediately from the Apple App Store for the iPad. Power BI will also be available for free later this year for the iPhone, Android, and Windows 10.
A new edition of the company’s data visualization tool is now freely downloadable
Drone maker to add no-fly firmware to prevent future White House buzzing – The company that manufactured the drone used in the ill-fated flight has announced that it will issue a mandatory upgrade to the firmware for its Phantom 2 line of products to make sure that customers comply with the FAA’s no-fly zone around DC.DJI’s Phantom 2 drones already have firmware settings that prevent them from being flown near airports and other places where officials have set restrictions on flight. According to the company’s statement, DJI is also continuing to update the no-fly zone list for future firmware releases to prevent flights in other sensitive areas—and to prevent drones from being flown across national borders.
The ill-fated DJI Phantom 2 drone flown by a drunken intelligence agency employee into a tree on the White House grounds has kicked up more than a few wood chips.
OneDrive updates make Microsoft’s cloud storage system better for photos – Over the next few weeks, the company says it’s introducing changes that will automatically import photos from external devices, allow users to categorize them in new albums with clear thumbmail images, and use an updated search function to find specific files and photos saved on the service. OneDrive users were already able to upload smartphone pictures straight to OneDrive using Microsoft’s iOS, Android, and Windows Phone apps, but the updates mean that you’ll be able to transfer files to the cloud service from cameras, USB sticks, and external hard drives linked to your computer.
Windows 10: You’ve got questions, I’ve got answers – On January 21, in a two-hour-plus event at its Redmond headquarters, Microsoft unveiled features that will be appearing in Windows 10 “over the next three, four, five months.” Two days later, the company released a new Windows 10 Technical Preview version, build 9926, for anyone who signed up with the Windows Insider program. If you’re eager to get started with the new build, read my hands-on installation guide first. In this post I cover what’s in Windows 10 and what you can expect through the remainder of 2015.
Hidden tweaks that will make Windows 10 even better – You’ve already seen some of the changes Microsoft is making in Windows 10, but there’s even more in the January preview than what you see by default. All you need to know is where to go to unlock the extra goodies.
VexBox disciplines teens with slow internet – The device we’re looking at today is a box that hooks up to your home internet network to slow it down. Madness, you say? This device is made for parents of teenagers. Parents who, apparently, do not allow their children to own smartphones. This box controls the internet speed of your router, slowing it down to the same speed you’d have had if you clocked in at the birth of widespread internet – 56k and dial-up. Instead of turning the web connection throughout your house off entirely, this device just cuts your internet speed down to a crawl. If this KickStarter is funded, the VexBox will retail for a cool $79 USD. Just eighty dollars to slow your internet down to a crawl to infuriate your child to such a level that they … do their homework.
Watch the first super slow GoPro footage recorded at 240 frames per second – GoPro has a huge lead over its competition these days — we found out just how big when we pitted the best action cameras against each other last fall. Now, a new firmware update is about to widen the gap even further. Set to release in February, the update will add the ability to record 720p footage at 240 frames per second — 10 times slower than the standard framerate — to the Hero 4 Black, GoPro’s 4K action camera. Gizmodo got an early version of the update and shot some footage with it at and around the X-Games last weekend. The results are a mixed bag.
Amazon is taking on Microsoft Exchange with its own enterprise email service – WorkMail data is deeply encrypted with private keys, and the company is letting enterprise clients pick a geographic region where their emails will be stored. That could help employees access messages faster, but more importantly means that privacy-minded businesses can pick a region with favorable laws designed to keep prying eyes away from their data. WorkMail will cost $4 per inbox, a rate that’s largely in line with what Microsoft and Google charge for their enterprise offerings. It’ll launch in the second quarter of this year, so Amazon still has time to show businesses exactly how WorkMail can surpass Exchange.
Rolling Stone opens its archives on Google Play Newsstand – Rolling Stone is opening up its archives, making select stories from its nearly 50 years of publication free for anyone to read. The stories will all be available through Google Play Newsstand, making this a big grab for Google that should help to promote the app’s sales of digital magazines and use as a news reader. Fast Company reports that three to four big stories from each issue will show up in the open archives, which Rolling Stone reportedly plans to augment with sound and video content next year. Every issue will have a presence in the archives, and all cover stories will be available. Newsstand is available on both iOS and Android, so a wide audience should be able to access these stories.
Hopper’s New Travel App Tells You The Best Time To Fly – A mobile application called Hopper, out today on iTunes, is using data and analysis from “billions” of flight prices in order to tell travelers when they should fly and buy tickets. The company claims that it’s able to save users as much as 40 percent on flights, and in 95 percent of cases will get you a cheaper flight or one that’s at least the same price as you would have otherwise found elsewhere. By monitoring trip prices 24/7 and further in advance, Hopper says your chances of scoring a deal increase.
Build your own home media center: Get started with Kodi – Want to build one PC to rule all your living room media needs? Meet Kodi! In part one of this series we show you how to set up the media player software formerly known as XBMC.
FCC warns against Wi-Fi hotspot blocking and hints at further crackdowns – After shutting down Marriott’s attempt to block personal hotspot use, the FCC says it’s looking into more violations elsewhere.
Want to spy on your wife? Change your grades? Hire a hacker! – Since being profiled in The New York Times two weeks ago, Hacker’s List has buckled under a deluge of traffic and still goes up and down on a regular basis. If Hacker’s List job postings are any indication, people largely want to hack the social media or e-mail accounts of lovers and ex-lovers, remove negative personal and professional feedback posts from the ‘Net, and alter the databases that guide so much of our lives—including grades, DMV records, and even hotel rewards programs. What follows is a curated selection of Hacker’s List job postings from the last several weeks, along with the amounts of money on offer.
Stop using your birthday, start using one of these password manager apps – Sure, you could go without a password manager—if you want to try to remember all of your super-secure passwords and login credentials on your own, or if you live dangerously and use the same password for all of your accounts. But let’s get real: There’s no reason to do that, not when there are so many excellent password managers out there that can store passwords securely for you, and generate them, too.
Silk Road paid thousands in shake-downs from malicious hackers – When operating outside of the law, you can’t rely on the police to protect your illegal enterprise from other criminals. The Silk Road marketplace founders likely learned this lesson in 2012 and 2013, after paying thousands of dollars to cyber extortionists who threatened to expose serious site vulnerabilities or hit it with denial of service attacks, according to evidence presented in federal court in Manhattan on Wednesday. On at least two separate occasions, Silk Road operators paid malicious attackers ransoms in exchange for keeping the site up and secure.
One Step Ahead: Pedophiles on the Deep Web – Criminals are always one step ahead. While the public can enjoy anonymity tools or hard-drive encryption for privacy and security, people with more nefarious motivations are going to use these technologies to stay undetected, make money, or improve the efficiency of existing criminal enterprises. Nowhere is this more apparent than with pedophiles. Getting an introduction to the tools these people use to cover their tracks is easy enough. On the uncensored version of The Hidden Wiki, a site that maintains a regularly updated list of what’s available on the deep web, is a selection of guides for pedophiles who want to browse, download, or share material.
Linux C library exploit affects all systems dating back 2000 – Sometimes, the price of popularity is more scrutiny. As the Linux operating system, and open source in general, gets more and more coverage in mainstream media and news, a lot of security holes, and big ones at that, are being exposed, or at the very least sensationalized. After the “Shellshock” bug last September, which was reported to be even worse than the “Heartbleed” bug of the open source OpenSSL vulnerability, comes a “GHOST” security exploit that affects almost all Linux systems that date all the way back to 2000.
The Ghost security hole perfectly illustrates the efficiency of open source – A new security hole has been found (and patched) on Linux systems. Jack Wallen uses this example as yet more proof the open-source community exemplifies how patching should be done.
Spies Know What You’re Downloading on File-Sharing Sites, New Snowden Docs Show – The program, code named LEVITATION, is based on newly released documents obtained by NSA whistleblower Edward Snowden. It was created by Canada’s Communications Security Establishment (CSE) to identify and locate users around the world who access files such as “Jihadist propaganda” or bomb-making guides on file sharing websites such as Rapidshare and the now-defunct Megaupload. According to the documents, CSE analysts “see about 10-15 million” uploads and downloads each day, but only “350 interesting download events per month,” which amounts to less than 0.0001 percent of all events.
Use Siri to find a lost iPhone’s owner – This works even if a found phone is locked. But there’s something you should know about this feature.
Facebook’s Powerful Ad Tools Grew Its Revenue 25X Faster Than User Count – Facebook’s been a quest to improve its ad measurement, and it’s definitely paying off. In Q4 2014, Facebook’s user count in the US & Canada only grew by a tiny 0.97% from 204 million to 206 million, but the average ad revenue it earns from each of those users grew 24% from $6.64 to $8.26. That’s insane. Jawdropping.
Samsung’s profits continue to slip – Samsung Electronics made an operating profit of 5.29 trillion won ($4.87 billion) off the back of 52.73 trillion won ($48.6 billion) in revenue last quarter. These are big numbers by almost anyone’s standards, but the problem is that they don’t meet the company’s own; last year operating profit was 8.31 trillion won from 59.28 trillion won revenue, meaning that these latest results reveal respective dips of 36 and 11 percent. Although Samsung points to increased sales of the Galaxy Note 4 as a bright spot, its mobile division is still down 64 percent year-on-year in terms of operating profit, leaving others like the processor and RAM businesses to pick up some slack.
Apple Shipped As Many Smartphones As Samsung In Q4 2014, According To Analysts – It looks like making larger screen smartphones was a good decision from Apple. Fresh off a monster earnings report — including the largest profit of any corporate company in history — Apple sold as many phones as Samsung in the final quarter of 2014.
LG’s Annual Profit Doubles To $475M After Shipping 59.1M Smartphones In 2014 – Samsung may be stumbling after posting its lowest annual profit for three years, but the same can’t be said for fellow Korean company LG, which just revealed that it shipped 59.1 million smartphones last year, a 24 percent increase on its figure from 2013.
Qualcomm admits “large customer” loss amid Samsung speculation – They’re not naming names, but we can pretty much read between the lines. In its Q1 2015 fiscal report, chip maker Qualcomm is lowering its revenue outlook for the second half of this fiscal year due to a number of huge factors. Aside from a shift in share among OEMs and higthened competition in China, where is actually facing some legal battles, Qualcomm also mentions the loss of a “large customer” of its Snapdragon 810. Given how things are going, it’s hard not to believe that it is referring to Samsung.
Games and Entertainment:
5 fun multiplayer games for your Google Chromecast – Swing through the official Chromecast website and you’ll find a growing library of single- and multi-player games. Some come from larger brands, while others are from independent developers looking for exposure. I’ve gathered up five of my favorite Android — and iOS! — games that come with Chromecast compatibility or enhancement. The next time you’ve got friends over and want to liven the mood, break out one of these. You might be surprised at how interactive that media device can be.
Hit mobile game Badland is headed to consoles – After launching on iOS to much acclaim in 2013, the dark and wonderful Badland has since made its way to all the major mobile platforms — you can even pick it up for your BlackBerry. No specific release date has been announced — you can expect to see the game on consoles this spring — but it’s coming to a huge range of platforms. That includes the PS3, PS4, Vita, Xbox One, and Wii U, along with Windows, Mac, and Linux via Steam. At first glance, it might not seem like the most natural fit: one of Badland’s defining characteristics is that it’s designed to work perfectly with a touchscreen.
Unreal Engine 4 Paris virtual tour: indistinguishable from reality – A virtual Parisian apartment has been rendered in video form for your enjoyment this week. Not by an architecture firm, nor a home furnishings group, but by a video game developer by the name of Dereau Benoît. This short journey through a virtual space was made real with Unreal Engine 4, the latest from Epic Games in graphics engine delivery. Everything you’re seeing here – modeling, texturing, lighting, and post-production – have been created with Unreal Engine by Benoît. The music you’re hearing comes from Sigur Rós.
The Rise, Fall, and Rebirth of LucasArts’ Adventure Classics – With Grim Fandango remastered for 2015, The Secret of Monkey Island turning 25, and Full Throttle 20 this year, here’s an overview of the company that made these adventure classics happen.
Monkey Island 2: LeChuck’s Revenge
10 multipayer Android games where you share the same phone – These aren’t tired pass-and-play games. These are games where you and a friend swipe and tap your phone at the same time.
PlayStation to dump Music Unlimited app in favor of Spotify – On Wednesday, Sony announced a shake-up to its PlayStation-branded music-streaming service, complete with a new app, a switch to Spotify as a content provider, and an indefinite disconnection for PlayStation Vita owners. As a result, the old Music Unlimited app will be retired on March 29. No release date for the new app was listed, but we can assume it will launch some time after February 28, as current Music Unlimited users will receive “up to 30 days” of free PlayStation Music access during that span.
Off Topic (Sort of):
Bill Gates: I feel stupid for only speaking English – Technically Incorrect: The Microsoft co-founder admires Mark Zuckerberg’s grasp of Chinese and laments his own linguistic inabilities.
GoDaddy yanks Super Bowl ad over puppy mill faux-pas – Animal rights activists quickly set up a Change.org petition in response to GoDaddy’s puppy ad, which they said endorsed puppy mills. Selling a puppy via a website to an owner that hasn’t been vetted? That can be a one-way ticket to a dog fighting ring, they claimed. With more than 42,000 signatures gathered in less than 24 hours, GoDaddy decided to pull the ad. They even yanked it from YouTube, but someone else predictably put it right back up:
What I’ll Do With My Parents’ Facebook After They Die – My mother and father have long made it clear what their wishes are for when their times come—except for when it comes to their online footprints.
This skull may provide a new link between Neanderthals and modern humans – This accidental find may upend what’s known as the assimilation model, or partial replacement model. According to this model, modern humans originated from Africa but then evolved through interbreeding with European Neanderthals. It’s estimated that human DNA today has between 2 and 4 percent Neanderthal genes, so it’s not a question of if interbreeding occurred, but when and where. The Manot skull shares some physical characteristics with Neanderthals and could suggest this interbreeding happened in the Levantine corridor instead of Europe. Without genetic testing, however, the morphological comparisons are just speculative.
Clara Amit / Israel Antiquities Authority
Temporary tattoos measure sugar levels without drawing blood – Diabetics need to closely monitor their blood sugar levels. However, this crucial routine becomes more than a chore since it usually involved drawing blood. That is why researchers are continually searching for non-invasive, not to mention not painful, ways to measure glucose levels. Researchers from the University of California San Diego are looking into using temporary tattoos to perform this function without even breaking the user’s skin, paving the way for other medical use cases as well, like delivering medicine through the skin as well.
Something to think about:
“The cure for boredom is curiosity. There is no cure for curiosity.”
– Dorothy Parker
Today’s Free Downloads:
AquaSnap – AquaSnap is a free software that greatly enhances the way you can arrange windows on your Desktop. It gives you the possibility to move and resize windows exactly the way you want, without losing a pixel, with simple gestures which makes you more productive.
AquaSnap is a great replacement for the Aero Snap and Aero Shake features of Windows 7 and is compatible with every Windows versions and consumes very little memory and CPU.
SyMenu – SyMenu allows you to manage portable applications resident on a removable drive. SyMenu can be installed in pen drives, external USB disks, memory cards and even CDs and DVDs.
Moreover SyMenu can automatically link any application residing on host pc. Any linked item (SyItem) can be organized in a hierarchical structure with colorful folders and found with the internal search tool.
You can customize SyMenu, adding links to portable programs, documents, Windows commands, folders and urls. Linked items can reside on the same USB device or even on host since SyMenu supports absolute path (such as C:\Windows\Explorer.exe).
Start Search bar: (Windows Vista like) allows to quickly search amongst any SyItem configured on menu;
Windows Start Menu wrapper: SyMenu exposes through Start Search bar every program linked in host PC Windows Start menu too;
Extension Manager: allows to temporarly replace normal Windows extension associations with SyMenu custom extension association;
Autoexec: allows to launch a custom list of SyItems at SyMenu startup or closing.
Execution modes: Run, RunAs, Open folder and Show Properties.
Batch Import: allows to make massive imports of new SyItems.
Tweaking.com – Simple System Tweaker – Tweaking.com – Simple System Tweaker is designed to bring only the safest tweaks to your system to increase speed and stability.
Windows is setup in a default configuration. By fine tuning your Windows configuration you can increase the speed and snappiness of the operating system. These tweaks are the ones that are safe and shown to cause no side effects with any programs. Each tweak only gives a small performance boost. But they all add up, so the more tweaks you do the more performance you get.
In Pursuit of Freedom – The Pushback Continues:
Regin super-malware has Five Eyes fingerprints all over it says Kaspersky – The Regin malware, often described as the devil spawn of Stuxnet and Duqu, is the handiwork of the Five Eyes nation state spy apparatus, analysis reveals.
The malware was named in November by researchers impressed with the smarts that helped it hide in plain sight for up to six years.
Analysis overnight by Kaspersky malware reversers Costin Raiu and Igor Soumenkov found a Regin plugin – a keylogger called QWERTY – used source code known to be the product of a Five Eyes intelligence alliance member nation.
“We’ve obtained a copy of the malicious (QWERTY) files published by Der Spiegel and when we analysed them, they immediately reminded us of Regin,” the duo said.
“Looking at the code closely, we conclude that the “QWERTY” malware is identical in functionality to the Regin 50251 plugin.
“Considering the extreme complexity of the Regin platform and little chance that it can be duplicated by somebody without having access to its source codes, we conclude the QWERTY malware developers and the Regin developers are the same or working together.”
Canada Casts Global Surveillance Dragnet Over File Downloads – Canada’s leading surveillance agency is monitoring millions of Internet users’ file downloads in a dragnet search to identify extremists, according to top-secret documents.
The covert operation, revealed Wednesday by CBC News in collaboration with The Intercept, taps into Internet cables and analyzes records of up to 15 million downloads daily from popular websites commonly used to share videos, photographs, music, and other files.
The revelations about the spying initiative, codenamed LEVITATION, are the first from the trove of files provided by National Security Agency whistleblower Edward Snowden to show that the Canadian government has launched its own globe-spanning Internet mass surveillance system.
According to the documents, the LEVITATION program can monitor downloads in several countries across Europe, the Middle East, North Africa, and North America. It is led by the Communications Security Establishment, or CSE, Canada’s equivalent of the NSA. (The Canadian agency was formerly known as “CSEC” until a recent name change.)
The latest disclosure sheds light on Canada’s broad existing surveillance capabilities at a time when the country’s government is pushing for a further expansion of security powers following attacks in Ottawa and Quebec last year.
Australia: Top cop’s claims cast shadow over data-retention plan – A parliamentary submission by NSW Police deputy commissioner Naguib “Nick” Kaldas claims that an internal affairs unit of the state’s police force had inappropriately obtained warrants to electronically bug not only him, but also other police officers and members of the public.
The claim comes as Australian lawmakers debate proposed new legislation enforcing two-year mandatory metadata retention by the nation’s telcos for warrantless access to individuals’ information by law-enforcement agencies.
The submission (PDF) by Kaldas, dated January 19, was published on Thursday by the parliamentary inquiry into the conduct and progress of the Ombudsman’s Operation Prospect.
How to Leak to The Intercept – People often tell reporters things their employers, or their government, want to keep suppressed. But leaking can serve the public interest, fueling revelatory and important journalism.
This publication was created in part as a platform for journalism arising from unauthorized disclosures by NSA contractor Edward Snowden. Our founders and editors are strongly committed to publishing stories based on leaked material when that material is newsworthy and serves the public interest. So ever since The Intercept launched, our staff has tried to put the best technology in place to protect our sources.
Our website has been protected with HTTPS encryption from the beginning. All of our journalists publish their PGP keys on their staff profiles so that readers can send them encrypted email. And we’ve been running a SecureDrop server, an open source whistleblower submission system, to make it simpler and more secure for anonymous sources to get in touch with us.
Gag order prevented Google from disclosing WikiLeaks probe for 3 years – A month ago, Google said it does not publicly address individual cases when it comes to government requests for customer data “to help protect all our users.”
But on Wednesday, Google changed course after being ripped for failing to notify WikiLeaks that three years ago, Google handed over data to federal authorities about three staffers of the secret-spilling site as part of the government’s espionage probe of the site and its founder, Julian Assange. The reason for the three-year delay, Google said, was because it had been under a gag order that it was fighting.
“From January 2011 to the present, Google has continued to fight to lift the gag orders on any legal process it has received on WikiLeaks,” Al Gidari, a Google lawyer told The Washington Post. He said the media giant’s policy is to always challenge indefinite gag orders. The gags on these were partly lifted, he said.
Vodafone unwraps anti-snooping app for businesses – Vodafone has launched a secure messaging app for privacy-minded companies.
The app, available to Vodafone’s enterprise customers in Germany, is being touted as a way to prevent industrial espionage and snooping on corporate calls.
Vodafone will provide end-to-end encryption for calls made over the VoIP-based app, called Vodafone Secure Call. The app will work for both wi-fi and mobile calls carried over Edge, UMTS, or LTE networks, and will work both in Germany and abroad.
The app, which uses AES 128-bit encryption, is available for iOS and Android phones for a monthly fee of €14.95 per user. While Vodafone said last year that a Windows Phone app was also under development, for now Secure Call is only available for the two main smartphone platforms.