https://blog.silentcircle.com/silent-text-version-1-8-security-update/ http://blog.azimuthsecurity.com/2015/01/blackpwn-blackphone-silenttext-type.html http://www.washingtonpost.com/business/capitalbusiness/encryption-company-silent-circle-creator-of-blackphone-raises-30-million/2014/05/21/0f9f0820-e103-11e3-8dcc-d6b7fede081a_story.html http://n4bb.com/blackphone-rooted-5-minutes/ http://trilema.com/2013/snsa-first-product-the-cardano/ https://bitbet.us/bet/1100/cardano-to-ship-in-2015/ http://www.contravex.com/2014/09/23/please-to-pgp-guide-for-linux-os-x-windows/ Silent Circle has confirmed* allegations* that their privacy software has been completely useless. A memory corruption vulnerability allowed decryption of private messages to any attacker with the victim's user ID or phone number. Silent Circle is no stranger to this kind of embarrassment; a few months after receiving 30 million dollars* in funding, a Blackphone was rooted* by hackers at DEF CON. Discouraged former users of this pathetic device should be comforted to know that proper cryptography will likely* be made user friendly* by the end of the year. Until then, people who wish to obscure their messages from the prying eyes of big brother should stick to the classics*.