6 Apps Keep You Away From Privacy Leak Concerns
1. Hemlis
This is an IM app developed by Private Bay's co-founder. Hemlis means secret in Swedish, which shows that it has a high privacy requirement for privacy. When using Hemlis to send messages, during the short time that messages are sent, the messages will be stored in Hemlis server; once they are sent, they will be deleted from server. If a message has not been sent, Hemlis will also delete the message, and requires the user to send it again.
2. Passible
Rather than letting the browser automatically remembers your password, why not adopt more secure method? Passible (iOS) is a password management App. It adopts advanced 256 AES encryption to manage your password. This standard is also used by bank and military.
3. Wiper
Wiper (iOS \ Android) is an IM app, it has a peculiar feature: wipe button. This implies that the users of Wiper can us Wipe button to erase chat logs between themselves and the other side at any time.
4. Signal
Signal (iOS) is a VoIP App, and all calls users dialed through Signal are encrypted. Signal uses a dual real-time encryption tool to secure the user's conversations. It even allows the user to set a password, so that others who want to use Signal to call you need to input this password to ensure both sides can confirm each other's identity must be true.
5. Cyber Dust
Cyber Dust is an IM class App (iOS), which is developed by famous American investor, Dallas Mavericks owner Mark Cuban. It's similar to Snapchat, which is a Burn after Reading application, but it is more focused on short messages. Cyber Dust will automatically delete the sent message after the 30 seconds when the short message is sent, and this message won't be stored on any server or cloud.
6. Wickr
Wickr (iOS \ Android) is an IM App. It used to be a military-grade leak proof SMS application, now it's civilian. It is characterized by: no metadata, specify devices (so messages can only be read on this device), set the automatic destruction time.
When you are concerned about cell phone security, you can't ignore the security of computer. It's necessary to install basic computer security software such as firewall, anti-virus software; in addition, the software that can help you to password protect files in computer is also essential.