Comments Subscribe to Personal Liberty News Feed Subscribe to Personal Liberty

Company Makes Surveillance-Proof Technology Accessible To All

February 6, 2013 by  

Company Makes Surveillance-Proof Technology Accessible To All

The wireless, always-on society that has become the norm in the 21st century offers boundless convenience in how we communicate, learn and store new information. The convenience of mobile technology also opens users up to privacy threats from government, criminals or any number of people with malicious intent. One company is working to help mobile technology users retain the convenience of instant communication while remaining confident that their privacy will not be breached.

The start-up tech firm Silent Circle introduced a surveillance-proof smartphone app in October that made making secure phone calls and text messages from a smartphone easy enough for the everyday user. The company also promised that the encryption software included no backdoors for snooping government agencies emboldened by Patriot Act-era wireless surveillance permissions.

The company offers a privacy service for both Android- and Apple-based smartphones, beginning at just $20 a month, that includes protection for calls, texts, email and video on the smartphone.

On the Silent Phone website, the company explains how the service works:

Each user will receive a special Private Encrypted 10-digit phone number individual to them. Silent Phone allows you to easily integrate existing contacts and favorite information on your device to provide complete functionality securely. We built Silent Phone and our network to be true Device-to-Device encrypted security –no one can listen in, no one can wiretap , no one but you and the subscriber on the other end has access –not us, not anyone. Everyone wants to know “How did you do it?” –how is it possible that Silent Phone can make clear crisp Video & Voice calls over 3G 4G or any other older network –100% encrypted with almost no latency? Our custom-built PBXs, servers, software and algorithms were built and designed by our All-Star team of “who’s who” in the world of VoIP, Encryption and Secure Software.

Because the encryption is peer to peer, not even Silent Circle holds a key to the information sent over the network. Users can also set messages to self-destruct after they are received. The company also recently expanded its capabilities so that users can securely send emails and documents securely without the fear of interception.

Sam Rolley

Staff writer Sam Rolley began a career in journalism working for a small town newspaper while seeking a B.A. in English. After learning about many of the biases present in most modern newsrooms, Rolley became determined to find a position in journalism that would allow him to combat the unsavory image that the news industry has gained. He is dedicated to seeking the truth and exposing the lies disseminated by the mainstream media at the behest of their corporate masters, special interest groups and information gatekeepers.

Facebook Conversations

Join the Discussion:
View Comments to “Company Makes Surveillance-Proof Technology Accessible To All”

Comment Policy: We encourage an open discussion with a wide range of viewpoints, even extreme ones, but we will not tolerate racism, profanity or slanderous comments toward the author(s) or comment participants. Make your case passionately, but civilly. Please don't stoop to name calling. We use filters for spam protection. If your comment does not appear, it is likely because it violates the above policy or contains links or language typical of spam. We reserve the right to remove comments at our discretion.

Is there news related to personal liberty happening in your area? Contact us at

  • Mr Diesel

    I’ll wait until it is peer reviewed. Hamachi(LogMeIn) is peer-to-peer that is similar. Once the traffic is setup at their servers the connection is made between the two parties and no one can see any unencrypted traffic. TOR is different, the NSA and a few other government agencies and foreign governments run their own TOR nodes (endpoints) where the traffic drops out of encryption and the traffic is completely visible to inspection.

    Yes, I sometimes place an expert on the Internet.

  • Mr Diesel

    Play an expert…..

  • dave

    I wonder how long this technology will be available to the citizens?
    This would impair or benevolent government efforts to “keep us safe”
    Sad it is, that privacy is not a right, but more and more a luxury.

    • ONTIME

      Benevolent Government is a oxymoron……..

  • FreedomFighter

    Unplug the TV, microwave the smart Drivers Lic for 10 seconds in the microwave oven. Ditch the cell phone, if you cant, never say anything you could not yell in public place. Keep your computer clean, put nothing on it that is important – have hard copies of all important information. Dont get a smart meter, if forced — there are ways to defeat it.

    Laus Deo
    Semper FI

  • TIME

    Dear People,

    If its been made ~ its not ” UN~Breakable.” / ” UN~HACKABLE”

    As all the technology that you can acquire has been around for at least 30 years before you can even get it, if not longer.

    Don’t fool yourslf into thinking anything otherwise. When you do wake up to what really is and what really is not, you may quite have a melt down.

    Peace and Love, Shalom

  • ibcamn

    yep!modern technology,ain’t it great?!sometimes tech is just not worth it for most people,i say if you own the phone(any tech item) its up to you to stop the invasion of privacy,you know it’s possible and yet you took the chance by buying it(tv phone and whatever else this is applicable too)so accept the problem and fix it!

  • Ben Gardner

    My question is will they roll over like RIM did a few years back and turn over the encryption algorithms to the government when (not IF) they are demanded by big sister.. That is what killed RIM’s sales of Blackberry and have cause them to change their name this week.

  • James

    The peer-to-peer encryption package excludes the Email, that remains server-based.

  • Chester

    Ben, what killed RIM was Apple and all the Android phones doing the same things, but faster and better than the original Blackberry, not any problems with security, I know, according to you, every company that dies did so because they crossed up the government, or gave the government too much information, but just isn’t so. And again, to all the people insisting any “new” tech is at least thirty years old before it hits the market, better take a good look at the equipment you typed that comment on. If your computer is less than twenty years old, most of what is in it, both hardware and software, did not exist thirty years ago, even in the concept stages.

    • FreedomFighter

      You would be surprised, nothing comes out that isnt old tech, old to the black ops world that is.

      Laus Deo
      Semper FI

      • APN

        I agree completely. How did we put a man on the moon in the 1960′s when “we citizens” were still using rotary land based phones and crunching numbers on a IBM 360 mainframe using magnetic tapes and 80 column punch cards for input?.

        Another good example would be ARPANET, designed by the Defense Department, and yes, this was the GOVERNMENTS first packet switching network that became the internet we use today. In fact, NASA has had technology for decades before it finally trickled down to we “Subjects”.

        We also have military technology that the “World” has never witnessed.


        PS> Nothing is “Secure” in a FREE OPEN society, never has been and never will be.

      • Andy

        Sounds like a really good deal–for Silent Circle, that is. You pay $20/month…where’s the proof of this security? This is not something you can see, touch, smell or taste. Sorry, I’m not buying it!


Sign Up For Personal Liberty Digest™!

PL Badge

Welcome to,
America's #1 Source for Libertarian News!

To join our group of freedom-loving individuals and to get alerts as well as late-breaking conservative news from Personal Liberty Digest™...

Privacy PolicyYou can opt out at any time. We protect your information like a mother hen. We will not sell or rent your email address to anyone for any reason.