top of page


invisible-ink app.png

Securing Private Communications with "Eye-to-Eye" Encryption

wisper 2.png

The Whisper Company believes when you communicate, you should decide who views your messages' contents, and what they can do with them. 


Decide who can view and if recipients can share your contents. Let's Change Communication for Good.















Our invisible-ink™ app gives you perfect identity assurance. Only you can access, send and view shared messages, documents, videos and voice notesThe moment the phone doesn't see your face in-front of it, the contents of the screen obfuscate.  Documents, that only you can view, will be blocked from someone else viewing it. Decrypting only with your eyes.


Guarantee, with ease-of-use, that you own and control your information. Delete any information sent at any point from your and the recipient's phone. It is a new level of ownership in communications

Visible FYEO.png
invisible-ink app PUA Documents ipad.png
invisible-ink app PUA Documents iphone.png
Invisible FYEO.png
invisible invisible-ink app.png

invisible-ink Features

Invisible-ink app PUA Documents iphone 2.png
Invisible-Ink Features

Document Exchange

[i-i] Document Exchange allows the sender and recipient to know that they are verified and authenticated (in real-time) while sending the document and while accessing the document.  You have true ownership of information.  In order to send or access you must be authenticated.  Nobody else can view or send.  Only the authorized user-can send messages or documents. Document exchange as if you were in the same room, face-to-face or eye-to-eye [i-i].

Invisible-ink app Screenshot Notification.png

Screen Shot Alerts

[i-i] ensures that your documents and messages cannot be copied via a screen-shot, screen-grab, or print-screen without your knowledge.  If anyone takes a screenshot of a conversation or document all other parties in the conversation will be alerted when and who took the screen shot.

Invisible-ink app Second-face Detection.png

No Shoulder Surfing

[i-i]has custom controls will alert you (the user) when someone else is over your shoulder viewing your screen when using invisible-ink.  Ensuring that when either party in the conversation is viewing the conversation that they are the only one viewing it.  For even better peeking protection, we recommend adding a Privacy Screen (e.g., Anti-Peeping Tempered Glass Screen Protector Film).

Invisible-ink app Self-destruct.png

Self-Destruct Messaging

[i-i] ensures that only the authorized user can view for a designated amount of time, whether it be a couple of seconds or a couple of days.  This functionality allows your communication to only exist for as long as you choose for whom you choose.

[6.5] Patent-pending PUA.png

Eye-to-Eye Encryption
[In-transit & at-rest]

[i-i] encrypts your communication with Advanced Encryption Standard (AES 256), giving you military-grade encryption. i2i [Eye-to-Eye™] encryption is unique in that it remains encrypted at rest (when received by the phone).  It only decrypts when the authorized user is viewing it (real-time), otherwise, it stays encrypted. Spyware protected as remote hacker can't see the encrypted information at-rest.

Invisible-ink app Sharing Preferences.png
Invisible-ink app Message Redaction.png

True Ownership - Message Redaction & Sharing Preferences

[i-i] ensures control of your communications.  You are the owner of your communications, even after they leave your device.  You can easily redact anything previously sent from the recipient's device.

Furthermore, when sharing documents, you have the ability to choose your sharing preferences. You now will have the ability to decide whether or not they can download or forward any multimedia (images or documents) sent. Sharing as if you were next to them. Like a Whisper.




Read Reciepts

Group Chatting

User Key Ownership

Unlock Feature to Share Information

degrade wisper.png
bottom of page