
Wickr will federate users with any OpenID Connect-compliant system.Ī Wickr network is also the place where Wickr administrators configure security groups to manage messaging, calling, security, and federation settings. Most organizations will federate users through an existing identity system. Users might be added manually or imported. A network is a group of users and its related configuration, similar to Slack workspaces. It is integrated with Amazon CloudWatch for monitoring.Ī Wickr administrator manages networks. You can control access to Wickr administration using familiar AWS Identity and Access Management (IAM) access control and policies. Wickr administration is now integrated and available in the AWS Management Console. Here I am on macOS connected with me on iOS in my kitchen. They may use emoticons to react to messages, exchange files, and make audio and video calls. Once downloaded from a preferred app store and registered, users can create chat rooms or send messages to individual recipients. It is available for Windows, macOS, Linux, Android, and iOS devices. The Wickr client application is very familiar to end users and easy to get started with.
#Wickr pro releases code#
The source code we use in Wickr clients to implement the secure messaging protocol is available to audit and review. The Wickr secure messaging protocol is open and documented, allowing the community to inspect it. I drew the below diagram to show how the key exchange works at a high level. There is a way to migrate history from your old device to your new device if you have the two devices at hand and single sign-on (SSO) configured. When the recipient adds devices to their account later on (for example, I add a macOS client to my Wickr account, in addition to my iPhone), the new device will not see the message history by default. Message-specific keys are passed through a key derivation function that binds the key exchange to a recipient device. This ensures that only intended recipients have the message-specific AES key to decrypt the message. The message-specific AES key is exchanged with recipients via a Diffie-Hellman elliptic curve key exchange (EDCH521) mechanism.

The message content (text, files, audio, or video) is encrypted on the sending device (your iPhone, for example) using the message-specific AES key. It means that the system provides authenticity and confidentiality: no unauthorized party can inject a message into the system, and no unintended party can access or understand the communications without being given them by one of the correspondents.Įach message gets a unique AES encryption key and a unique ECDH public key to negotiate the key exchange with other recipients.

Wickr provides secure communication between two or more correspondents. The information retained is stored on the servers you choose and stays entirely under your control. The flexible administrative controls make it easy for your Wickr administrator to manage the communication channels and retain information to meet regulatory requirements when required.

Unlike many enterprise communication tools, Wickr uses end-to-end encryption mechanisms to ensure your messages, files, voice, or video calls are solely accessible to their intended recipients. I am excited to announce the availability of AWS Wickr, an enterprise communications service with end-to-end encryption, that allows businesses and public sector organizations to communicate more securely, enabling customers to meet auditing and regulatory requirements like e-discovery, legal hold, and FOIA requests.
#Wickr pro releases update#
Update Janu: I removed the reference to AWS CDK.
