Signal is compatible with RedPhone, its Android sibling An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.Signal comes from Open Whisper Systems, which developed RedPhone and TextSecure, both Android applications that encrypt calls and text messages.The application is compatible with RedPhone and eventually RedPhone and TextSecure will be combined in a single Android application and called Signal as well, according to a blog post.Signal is notable for two reasons. First, it’s free. There are many voice call encryption products on the market for various platforms, most of which are not cheap and are aimed at enterprise users. Second, Signal is open source code, meaning developers can look at the code and verify its integrity. That’s important because of concerns that software vendors have been pressured into adding “backdoors” into their products that could assist government surveillance programs.The beauty of Signal is its simplicity. Setup requires verifying the device’s phone number through a one-time code that is sent by SMS. Signal displays only the contact details of the other user who has it installed. It provides end-to-end encryption of voice calls over a data connection. Signal displays two words on a screen during a call, which are meant to be verified with the party on the other end to ensure a man-in-the-middle attack isn’t underway.Signal adds to a growing number of mobile encryption offerings from software vendors. Silent Circle, based in Washington, D.C., offers encrypted calling and texting services for a monthly subscription, and is a partner in Geneva-based SGP Technologies which makes the BlackPhone, a security minded device released last month. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe