Securing Private Communications with "Eye-to-Eye" Encryption
The Whisper Company believes when you communicate, you should decide who views your messages' contents, and what they can do with them.
Decide who can view and if recipients can share your contents. Let's Change Communication for Good.
Our invisible-ink™ app gives you perfect identity assurance. Only you can access, send and view shared messages, documents, videos and voice notes. The moment the phone doesn't see your face in-front of it, the contents of the screen obfuscate. Documents, that only you can view, will be blocked from someone else viewing it. Decrypting only with your eyes.
Guarantee, with ease-of-use, that you own and control your information. Delete any information sent at any point from your and the recipient's phone. It is a new level of ownership in communications.
[i-i]™ Document Exchange allows the sender and recipient to know that they are verified and authenticated (in real-time) while sending the document and while accessing the document. You have true ownership of information. In order to send or access you must be authenticated. Nobody else can view or send. Only the authorized user-can send messages or documents. Document exchange as if you were in the same room, face-to-face or eye-to-eye [i-i].
Screen Shot Alerts
[i-i]™ ensures that your documents and messages cannot be copied via a screen-shot, screen-grab, or print-screen without your knowledge. If anyone takes a screenshot of a conversation or document all other parties in the conversation will be alerted when and who took the screen shot.
No Shoulder Surfing
[i-i]™ has custom controls will alert you (the user) when someone else is over your shoulder viewing your screen when using invisible-ink. Ensuring that when either party in the conversation is viewing the conversation that they are the only one viewing it. For even better peeking protection, we recommend adding a Privacy Screen (e.g., Anti-Peeping Tempered Glass Screen Protector Film).
[i-i]™ ensures that only the authorized user can view for a designated amount of time, whether it be a couple of seconds or a couple of days. This functionality allows your communication to only exist for as long as you choose for whom you choose.
[In-transit & at-rest]
[i-i]™ encrypts your communication with Advanced Encryption Standard (AES 256), giving you military-grade encryption. i2i [Eye-to-Eye™] encryption is unique in that it remains encrypted at rest (when received by the phone). It only decrypts when the authorized user is viewing it (real-time), otherwise, it stays encrypted. Spyware protected as remote hacker can't see the encrypted information at-rest.
True Ownership - Message Redaction & Sharing Preferences
[i-i]™ ensures control of your communications. You are the owner of your communications, even after they leave your device. You can easily redact anything previously sent from the recipient's device.
Furthermore, when sharing documents, you have the ability to choose your sharing preferences. You now will have the ability to decide whether or not they can download or forward any multimedia (images or documents) sent. Sharing as if you were next to them. Like a Whisper.