2 The World is threatened our privacy and security is gone! Google, Facebook, WhatsApp, are all reading, selling and using our data for their benefit. Snowden has proven that governments record all internet traffic, have built back-doors and access into software, hardware and cloud solutions. Citizens lost their privacy. Democracy is undermined. SMBs and Enterprises face Industrial Espionage. p p pretty Easy privacy
3 Protection is compromised The common protection technology TLS (based on X.509) is compromised if: one single Certification Authority (CA) is taken (hacked, undermined, infiltrated) like the NSA in the most probable case then all communication using software which is trusting this CA is compromised. p p pretty Easy privacy
4 Metadata alone reveals a lot , even encrypted, leaves header metadata (to: - from: position and subject:) in clear text available for spooks to see. Metadata alone allows to draw interesting conclusions, like Leon s relationships illustrated by 12 months of metadata. Organisations like the NSA can do a lot more with our metadata. p p pretty Easy privacy
5 Metadata alone reveals a lot p p pretty Easy privacy
6 p p is contributing to change. The Network is 0wned by the Five Eyes already. Probably it s a lost case for now. We urgently need Free Hardware to trust in! Open Source Hardware projects are working on it. We need secure Free Software. Support Free Software now! And we need peer-to-peer communication in between: p p.
9 Client Market Share 26% Litmus Analytics (Dec 2013) 14% 12% 12% 8% 6% 6% 5% 3% 2% Apple iphone Outlook Google Android Apple ipad Apple Mail Gmail Outlook.com Yahoo! Mail Windows LiveWindows Mail Mail
10 p p. Supported platforms. Android iphone Outlook Apple Mail ipad Enterprise Version Browser Plugin Connector Box
11 p p. Collaboration and Convergence. Each p p implementation is working with each other seamlessly. p p is collaborating with , Jabber, WhatsApp, Twitter, encrypts in OpenPGP, S/MIME, and many, many more. p p means converging all Mail and Messaging services in one single App. Everything works together. p p.
12 p p. iphone Handshake Illustration.
13 p p. Free Software. p p removes the complicated user driven key management through a zero-touch user experience. p p is open-source and free software. p p is peer-to-peer communication with end-to-end encryption and an unmatched level of privacy. p p will synchronize keys between all devices and provide that way a back-up of your private key.
14 p p. Privacy as Default. p p is seamless and fully automated integration of security in Mobile, Web and PC communication. p p provides Internet Standards for making privacy and security the default for all messaging apps. p p works with most others and automagically at a higher security after simple handshake with safe words. p p standardization process started with W3C following IETF. p p
15 p p. The team. Leon Schumacher, Founder Sandro Koechli, Founder Volker Birk, Founder Robert Goldmann Edouard Tisserant p p
16 p p. The advisory board. Invitation accepted: Elgar Fleisch Frank Kargl Emmet Keeffe Knut Mager Lars Rabbe Meinhard Starostik Ralph Szygenda Prof. ETH Zurich & Prof. HSG St. Gallen Prof. University of Ulm CEO and Co-Founder, irise Chief Privacy Officer, Novartis former CIO Yahoo & Skype Constitutional Judge & Lawyer (Land Berlin) former Group CIO General Motors p p
Getting it Right: Seven Steps to Right Channeling Customer Interactions A Joint Whitepaper from IntelliResponse and Oracle In seven simple steps, ebusiness, Customer Experience and Contact Center professionals
Google Apps as an Alternative to Microsoft Office in a Multinational Company The GAPS Project Thesis presented in order to obtain the Bachelor s degree HES by: Luc BOURQUIN Supervisor: Thierry CEILLIER,
UCi2i Video Managed Services Discover why video conferencing is the way to do business wherever you are www.uci2i.com 0844 546 7001 Who are UCi2i? Put simply, we enable you to communicate face to face,
SMALL BUSINESS the basics in telecommunications solutions 1 2 Mobility Innovation, transformation and the cloud Security and business continuity At AT&T, we understand the unique needs that small businesses
February 2015 Evaluation of the Blue Jeans Network (BJN) Video Collaboration Service Hands-on testing of one of the leading cloud-based video conferencing bridging services Background Founded in 2009 by
B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-OS Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility enables organizations to transform
Responsive Email Design Our guide to helping you get started March 2013 Version 0.4 Contents Introduction... 3 What is Responsive Design?... 4 What about email?... 5 So what are the pros and cons?... 6
DATA SHEET CA Product Vision CA Product Vision helps manage project and product requirements and enables a comprehensive release planning process insuring only the features your customers really need are
White Paper Getting ahead in the cloud A White Paper by Bloor Research Author : Fran Howarth Publish date : March 2013 Users are demanding access to applications and services from wherever they are, whenever
R EDEFINING CUS T OM E R CONTACT Applications for Businesses made simple Imagine the perfect communication solution. It would have the best components from the best business telephone systems and contact
THE EXPERIENCE OPTIMIZ ATION PL AYBOOK FOR DIGITAL MARKETERS Let Your Customers Uncover Your Next Big Win The Experience Optimization Playbook for Digital Marketers 2 CONTENTS INTRO: Evolution of Today
VODAFONE G-CLOUD SMS-SERVICE Version Content Owner Date 1.1 Robert Hotchkiss 27 August 2013 Page 1 of 13 TABLE OF CONTENTS 1. The G-Cloud SMS-Service... 3 1.1 Overview of the G-Cloud SMS-Service... 3 1.2
TeamViewer 7 Manual Meeting TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of contents 1 About TeamViewer... 5 1.1 About the software... 5 1.2 About the manual... 5 2 Basics...
Who are Simply Companies large and small trust Simply Mail solutions with their private business email communications, We re one of a handful of UK companies accredited as a Microsoft Partner with Gold
OpenScape Enterprise Discover how to unleash the potential of your virtual teams To achieve business advantage, enterprises are finding new ways of tapping the collective skills, knowledge, expertise and
LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction
TeamViewer 7 Manual Remote Control TeamViewer GmbH Kuhnbergstraße 16 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About TeamViewer... 5 1.1 About the software... 5 1.2 About the manual... 5
10 VoIP Companies and Technologies to Watch in 2013 CONTENTS Introduction...3 1. Cloud-Based Unified Communications, or UCaaS...3 2. Skype...4 3. Microsoft Lync...5 4. VoIP Integration With Video...5 5.
Cistera Networks White Paper Hosted Business VoIP: The Next Wave in Revenue Hosted Business VoIP Now Mainstream It is only recently that Hosted Business VoIP (HBVoIP) has become a viable alternative for
Odin 2015 SMB Cloud InsightsTM UNITED STATES DEFINITIONS SMBs Defined We define SMBs also known as small and medium enterprises (SMEs) as companies with one to 999 employees. There are around 7 million
Manage your digital life in your personal info management system Serge Abiteboul Benjamin André Daniel Kaplan INRIA & ENS Cachan Cozy Cloud Fing & MesInfos Abstract Geeks already know how to control their
About inty Dedicated Exchange Server 2013 The inty Dedicated Exchange 2013 Solution is a fully managed implementation with the following features: High-availability and built to Microsoft s reference architecture
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-2015-026 July 6, 2015 Keys Under Doormats: Mandating insecurity by requiring government access to all data and communications
emarketing There are lots of reasons to shift your e-marketing to Tikit emarketing v6 Pause to think whether you can create email messages as effortlessly as this. Drag & drop template, form and message
Copyright 2006-2013, 3CX Ltd. http://www.3cx.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious unless