Unparalleled Security and Privacy in Communications with
"Eye-to-Eye" ["i2i"]
The Whisper Company believes when you communicate, you should decide who views your messages' contents, and what they can do with them.
Decide what eyes can send and what eyes can view.
Privacy and Security is by design and by default with i2i authorization and i2i Encryption.
​







invisible-ink™
Our invisible-ink™ app gives endpoint security a For Your Eyes Only authorization secure space to communicate akin to a whisper.
i2i Authorization:
The invisible-ink app offers unparalleled protection as all users are continuously authorized and thusly creates a space with perfect identity assurance.
Only authorized can access, send and view shared contents, Be it documents, videos or voice notes; the moment the device doesn't see your face in-field-of-view, the contents on screen obfuscate. ​
​
i2i Encryption:
When the authorized user is not in-field-of-view, the contents not only obfuscate, but also is re-encrypted. Staying secure and unhackable when the authorized user is not present or their eyes are not viewing the endpoint and its contents.
Contents are only discoverable, visible and decrypted real-time when the authorized user is present and their eyes are on the endpoint and its contents.

Protect Your Community
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.
Protect Personal Sharing
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.


Protect You Users
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.
Protect your Organization
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.

invisible-ink Features

Eye-to-Eye Document Sharing
[For Your Eyes Only]
[i-i]™ Document Exchange allows the sender and recipient to know that they are verified and authenticated (in real-time) while sending the document and while accessing the document. You have true ownership of information. In order to send or access you must be authenticated. Nobody else can view or send. Only the authorized user-can send messages or documents. Document exchange as if you were in the same room, face-to-face or eye-to-eye [i-i].
![[6.5] Patent-pending PUA.png](https://static.wixstatic.com/media/09038a_c5e2df40a98b4262bdb24e8a47795783~mv2.png/v1/crop/x_0,y_195,w_1284,h_2525/fill/w_194,h_351,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/%5B6_5%5D%20Patent-pending%20PUA.png)
Eye-to-Eye Encryption
[In-transit & at-rest]
[i-i]™ encrypts your communication with Advanced Encryption Standard (AES 256), giving you military-grade encryption. i2i [Eye-to-Eye™] encryption is unique in that it remains encrypted at rest (when received by the phone). It only decrypts when the authorized user is viewing it (real-time), otherwise, it stays encrypted. Spyware protected as remote hacker can't see the encrypted information at-rest.

No Shoulder Surfing
[i-i]™ has custom controls will alert you (the user) when someone else is over your shoulder viewing your screen when using invisible-ink. Ensuring that when either party in the conversation is viewing the conversation that they are the only one viewing it. For even better peeking protection, we recommend adding a Privacy Screen (e.g., Anti-Peeping Tempered Glass Screen Protector Film).

Screen Shot Alerts
[i-i]™ ensures that your documents and messages cannot be copied via a screen-shot, screen-grab, or print-screen without your knowledge. If anyone takes a screenshot of a conversation or document all other parties in the conversation will be alerted when and who took the screen shot.

Self-Destruct Messaging
[i-i]™ ensures that only the authorized user can view for a designated amount of time, whether it be a couple of seconds or a couple of days. This functionality allows your communication to only exist for as long as you choose for whom you choose.


True Ownership - Message Redaction & Sharing Preferences
[i-i]™ ensures control of your communications. You are the owner of your communications, even after they leave your device. You can easily redact anything previously sent from the recipient's device.
Furthermore, when sharing documents, you have the ability to choose your sharing preferences. You now will have the ability to decide whether or not they can download or forward any multimedia (images or documents) sent. Sharing as if you were next to them. Like a Whisper.
ADDITIONAL FEATURES

Read Reciepts

Group Chatting

User Key Ownership

Unlock Feature to Share Information
Industries For Assurance that is
"Eye-to-Eye" ["i2i"]

Financial Technology
Financial sector is one of the most heavily regulated and fraud-targeted industries.
In 2021, losses due to fraud increased by 79% to $24 billion, despite improved methods of transactional authentication and anti-fraud tools. Fraudsters continue to push the boundaries of cybercrime by exploiting accounts. Account Takeovers (ATO)-associated losses increased by 109% with one in twenty Americans being victims of fraud in 2021. Users, now more than ever care about the privacy and security of their finances. Trust is more of a cause for concern than ever before. If users can't trust you, they will find someone who puts their trust, privacy and security as their top priority.

Health Care Technology
The advent of open health data is making access to critical and sensitive data an area where the highest level of assurance is needed.
The National Health Care Anti-Fraud Association (NHCAA) estimates that the financial lost caused by healthcare fraud are tens of billions of dollars yearly. Data theft and fraught is blighting the industry: the 2018 National Money Laundering Risk Assessment (NMLRA) shows that healthcare fraud is the largest source of illicit funds in the US, losing $110 billion each year. ​Open health data creates an expanded attack surface with end users, system administrators, and the like, requiring a more robust and persistent approach to authentication.

Legal Technology
Protecting sensitive and eyes only information is more imperative than ever.
Legal firms deal with highly sensitive data and govern high-value transactions. This, places law firms at high-risk. The American Bar Association (ABA) 2021 survey on technology use and cybersecurity evidence this finding 29% of law firms experiencing a cyber-attack. ​Ponemon calculated that the cost of credential theft had increased 65% from $2.79 million in 2020 to $4.6 million in 2021/2022. Both data access and transactions need to be secured using persistent and intelligent identification of law firm employees and clients.

Government Technology
Sensitive and classified information needs a new level of security.
Governments are uniquely positioned in terms of technology use cases; digital government services must provide technology solutions for a broad demographic of users, including citizens. Balancing security vs. usability is critical in this sector. Unfortunately, the government is also a target for fraud and cybercrime. Governments must supply usable but secure identity-centric services. Persistent, usable, secure authentication is a critical component of citizen identity. Coupled with this are the massive supply chains used by the government. Supply Chain Attacks often begin with a spear-phishing email that steals and circumvents poor authentication measures.
Our QRE Solution







