Welcome!

News Feed Item

Invisible Text Introduces Next Generation of Ephemeral Applications with Launch of Invisible Call and Invisible Email Apps

As public demand for secure messaging continues, Invisible Text LLC CEO Dez White announced that the company is expanding into new realms of free private mobile communications http://goinvis.com. Beginning today, Invisible Email is available for download on iPhone Devices http://tinyurl.com/n3vsxyc and will be available on Android and Blackberry in the near future. Invisible Call is slated for release on May 22, 2014 and will also be iPhone, Android, and Blackberry compatible.

(Photo: Business Wire)

(Photo: Business Wire)

Invisible Email allows consumers to electronically mail sensitive information that irretrievably disappears after the recipient closes out the message. Emails may include attachments (which may be viewed but not downloaded) for use in the workplace as well as in users’ personal lives. The App requires that users be verified before an email is sent and received, ensuring both parties are the intended recipients.

With Invisible Call, telephone calls placed through the App leave no evidence of a call log. Using the franchise pairing technology, Invisible Call establishes a secure VOIP (Voice Over IP) session between users once both have been verified through their devices.

Invisible Email and Invisible Call join a growing list of free secure mobile applications invented by White. Invisible Text and Invisible Social, which launched in August 2013, and March 2014, respectively, allow users to send timed, permanently disappearing screen-capture protected messages, photos, documents, audio/video files, and GPS locations as well as remotely delete messages anytime before being read. The Invisible applications store no user information on Company servers and cannot be accessed or intercepted by third parties.

White is the youngest African American female tech entrepreneur to develop a suite of applications. The concept for Invisible Text and its progeny arose out of her own professional necessity. A former writer who often relied on source information, White found that as technology evolved, confidantes were increasingly reluctant to share sensitive details digitally. Accordingly, White set out to create a solution that would enable people everywhere to communicate privately and securely across multiple communication platforms.

White hopes that the Applications’ ease, variety, and practicality will attract consumers and corporate executives for use in everyday life and business.

“People correspond in a variety of ways. Offering free secure Email and Call options were the logical next step. We incorporated security features and verification functions so people can feel comfortable transmitting any type of personal information without fear that it will become compromised,” says White.

Planned updates include a video version of Invisible Call and a desktop-friendly edition of Invisible Email.

For further information, please visit www.goinvis.com or download all of the Invisible Apps:
http://tinyurl.com/psjwabv (Text)
http://tinyurl.com/kg3hnsn (Social)
http://tinyurl.com/n3vsxyc (Email)

Twitter @goinvis,
Instagram @goinvis
Facebook @goinvis

About Invisible Text LLC

Founded in 2012, Invisible Text and its suite of free multi-platform application products enable private communications between verified users. The Company’s direct pairing technology ensures that messages are transmitted exclusively between the intended parties and disappears after messages have been viewed. Invisible Text launched its first disappearing application iteration in August 2013, and launched version two in March 2014. Invisible Social was released in April 2014.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, demonstrated how to move beyond today's coding paradigm and shared the must-have mindsets for removing complexity from the develo...
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, explained how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
In today's uber-connected, consumer-centric, cloud-enabled, insights-driven, multi-device, global world, the focus of solutions has shifted from the product that is sold to the person who is buying the product or service. Enterprises have rebranded their business around the consumers of their products. The buyer is the person and the focus is not on the offering. The person is connected through multiple devices, wearables, at home, on the road, and in multiple locations, sometimes simultaneously...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
"When you think about the data center today, there's constant evolution, The evolution of the data center and the needs of the consumer of technology change, and they change constantly," stated Matt Kalmenson, VP of Sales, Service and Cloud Providers at Veeam Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Redis is not only the fastest database, but it is the most popular among the new wave of databases running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 19th Cloud Expo, Dave Nielsen, Developer Advocate, Redis Labs, will share the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.