


#DIFFERENCE BETWEEN WICKR PRO AND WICKR ME CODE#
It was missing points because its source code was not open to independent review ( open source), and because its security design was not well-documented. It received points for having communications encrypted in transit, having communications encrypted with keys the provider didn't have access to ( end-to-end encryption), making it possible for users to independently verify their correspondent's identities, having past communications secure if the keys were stolen ( forward secrecy), and having completed a recent independent security audit. On January 5, 2015, the Electronic Frontier Foundation gave Wickr a score of 5 out of 7 points on their "Secure Messaging Scorecard". Wickr has also launched a "bug bounty program" that offers a reward to hackers who can find a vulnerability in the app. Since its launch, Wickr has gone through regular security audits by prominent information security organizations, which verified Wickr's code, security and policies. In addition to encrypting user data and conversations, Wickr strips metadata from all content transmitted through the network. Īll communications on Wickr are encrypted locally on each device with a new key generated for each new message, meaning that no one except Wickr users has the keys to decipher their content. While Wickr Enterprise was created for companies with larger workforces to easily integrate into their organization's IT workflows. Wickr RAM was designed with the military in mind the app stays secure even in "harshest environments". Since developing its first app, Wickr Me, the company has released Wickr Pro, Wickr RAM, and Wickr Enterprise. The release of the desktop Wickr app coincided with introducing the ability to sync messages across multiple devices, including mobile phones, tablets, and computers. In December 2014, Wickr released a desktop version of its secure communications platform. Initially unveiled on iOS and later on Android, the Wickr Me app allows users to set an expiration time for their encrypted communications.
