Redefining Private & Secure Communication:
"True For Your Eyes Only"
Securing Private Communications with "Eye-to-Eye" encryption
The Whisper Company has created a new category of private and secure communication. It is True For Your Eyes Only™ communication.
With our innovative messaging application, invisible-ink™ or [i-i]™ for short (pronounced "eye-eye"), you and ONLY YOU can access, send and view your shared messages, documents, videos and voice notes. [i-i]™ guarantees, with ease-of-use, that you own and control your information.
When using [i-i]™, the moment the phone doesn't see your face in-front of it, the contents of the screen will obfuscate. Messages, that only you can see, will be invisible when you put your phone down or hand your phone to someone else. Documents, that only you can view, will be blocked from someone else viewing it.
The Whisper Company believes you are the rightful owner of your communications. When you communicate, you should decide who views your messages' contents, and what they can do with them. That's why we are bringing a new level of biometric secure, private and encrypted communication to the marketplace with patented and patent-pending technologies in our [i-i]™ application.
[i-i]™ Privacy You Can See, Security You Can Trust
TFYEO™ (True For Your Eyes Only™) communication, powered by The Whisper Company's PUA™ (Persistent User Authenticator), ensures individuals and businesses alike that the identity of both the sender and recipient of the message are authenticated.
By authenticating the recipient, the sender is assured that the message and any additional content (pictures, voice messages, videos, documents, etc.) will only be accessible to the recipient while their identity is (continuously) authenticated.
Our focus is on providing our users assurance that their messages, just like a whisper, are only being received by the person to whom they are communicating. Bringing the same peace-of-mind as having a face-to-face conversation.
Anyone other than the owner of the device that grabs it with invisible-ink open won't be able to see or do anything with the document (file, image, video, etc.) or messages. Documents are not visible and protected by our PUA shield. Messages are be invisible, and all they will see are blank dotted-line boxes.
That's why with invisible-ink when you see the dotted lines, you know the information is safe and will stay private. You can "See" you're safe. It is "Privacy You Can See, Security You Can Trust."
YOU VIEWING YOUR SCREEN
OTHERS VIEWING YOUR SCREEN
[i-i] Document Exchange allows the sender and recipient to know that they are verified and authenticated (in real-time) while sending the document and while accessing the document. You have true ownership of information. In order to send or access you must be authenticated. If anyone else tries to view the document they will not be able to see it. No one-but the authorized user-can send messages or documents.
Screen Shot Alerts
[i-i] ensures that your documents and messages cannot be copied via a screen-shot, screen-grab, or print-screen without your knowledge. If anyone takes a screenshot of a conversation or document all other parties in the conversation will be alerted when and who took the screen shot.
No Peeping Protection
[i-i]'s custom controls will alert you (the user) when someone else is over your shoulder viewing your screen when using [i-i]. Ensuring that when either party in the conversation is viewing the conversation that they are the only one viewing it. For even better peeking protection, we recommend adding a Privacy Screen (e.g., Anti-Peeping Tempered Glass Screen Protector Film).
[i-i] ensures that your documents and messages can only be viewed by the authorized party and can only be viewed for a designated amount of time, whether it be a couple of seconds or a couple of days. This functionality allows your communication to only be visible and exist for as long as you choose.
[In-transit & at-rest]
True Ownership - Message Redaction & Sharing Preferences
[i-i] encrypts your communication with Advanced Encryption Standard (AES 256), giving you military-grade encryption. [i-i] [Eye-to-Eye™] encryption is unique in that it remains encrypted at rest (when received by the phone). It only decrypts when the authorized user is viewing it (real-time), otherwise, it stays encrypted.
[i-i] makes sure that you stay in control of your communications. You are the owner of your communications, even after they leave your device. You can easily redact any sent image or message for you or anyone in the conversation. Furthermore, when sharing documents, you have the ability to choose your sharing preferences (whether or not they can download it or not).