Twitter Buys Mobile Security Startup Whisper - InformationWeek

InformationWeek is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

IoT
IoT
Mobile

Twitter Buys Mobile Security Startup Whisper

Two-person development shop created software for secure text and voice communications on Android smartphones.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
Twitter has snapped up Whisper Systems, a two-person mobile security software development firm that was founded last year.

Terms of the deal weren't disclosed by Twitter, which confirmed the Whisper Systems acquisition in an emailed statement. "As part of our fast-growing engineering team, they will be bringing their technology and security expertise to Twitter's products and services. We're happy to have Moxie and Stuart onboard," it said, referring to the Whisper's sole two employees: Stuart Anderson, and a researcher who goes by the name of Moxie Marlinspike.

Marlinspike is well known for exposing flaws in the digital certificate ecosystem, as well as developing a solution: Convergence, a tool that's designed to crowdsource certificate authenticity.

[ Security skills are in big demand. Read Best Paying IT Security Jobs In 2012. ]

But digital certificate fixes and smartphone security haven't been a focus for Twitter, which is a social networking and microblogging service. "Twitter isn't in the business of providing secure communications tools to end-users. - Hell, it still doesn't even use HTTPS by default," said security and privacy researcher Christopher Soghoian, via Twitter. "I'm struggling to understand this deal."

One explanation is that Twitter was shopping more for talent than mobile security technology. Indeed, all of Whisper's five products, which secure Android devices and communications, remain in beta. That includes secure-texting (TextSecure) and encrypted-voice-communications (RedPhone) software. Other products include Android data protection and full-disk encryption software WhisperCore, as well as Flashback, for saving encrypted Android backups to the cloud. Marlinspike has said previously that while the company's initial products were developed for Android, the company planned to extend them to Apple's iOS, as well as BlackBerry devices.

Twitter has declined to detail its exact plans for the existing Whisper Systems technology. But Marlinspike and Anderson said in a statement posted to the Whisper Systems site on Monday, where news of the acquisition first appeared, that "the Whisper Systems software as our users know it will live on (and we have some surprises in store that we're excited about), but there is unfortunately a transition period where we will have to temporarily take our products and services offline." As of Monday, notably, "RedPhone service will be interrupted immediately, but FlashBack users have a month to pull off any backup data they would like before that service also goes offline," it said.

Anyone relying on RedPhone to encrypt their communications would have likely encountered the service interruption firsthand. As noted by the Register, "dissidents and others who need RedPhone to encrypt their Android calls have no ability to use the service--and they have the Twitter acquisition to thank for the disruption."

That's relevant since Whisper Systems had made TextSecure and RedPhone, previously available only in the United States, available to Egyptian users after mass protests against the regime of Hosni Mubarak broke out in Cairo and Alexandria early this year. According to news reports, the government was conducting a massive surveillance campaign, including monitoring--and at times, blocking outright--SMS, voice communications, people's PCs, as well as Internet channels, including Facebook and Twitter.

Apply advanced analytics to the sales pipeline, Web traffic, and social buzz to anticipate what’s coming, instead of just looking at the past. Also in the new, all-digital issue of InformationWeek: A practical guide to biometrics. Download the issue now. (Free registration required.)

We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
Comment  | 
Print  | 
More Insights
Slideshows
10 Cyberattacks on the Rise During the Pandemic
Cynthia Harvey, Freelance Journalist, InformationWeek,  6/24/2020
News
IT Trade Shows Go Virtual: Your 2020 List of Events
Jessica Davis, Senior Editor, Enterprise Apps,  5/29/2020
Commentary
Study: Cloud Migration Gaining Momentum
John Edwards, Technology Journalist & Author,  6/22/2020
White Papers
Register for InformationWeek Newsletters
The State of IT & Cybersecurity Operations 2020
The State of IT & Cybersecurity Operations 2020
Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!
Video
Current Issue
Key to Cloud Success: The Right Management
This IT Trend highlights some of the steps IT teams can take to keep their cloud environments running in a safe, efficient manner.
Slideshows
Flash Poll