

On the positive side, this means that users can create completely anonymous accounts not tied to any external identifying information (especially when using Wickr via an anonymizing service like Tor).

To this end, presently, access to Wickr accounts is protected using passwords. However, when departing from a model where accounts are bound to verifiable external identities - such as, say, a phone number, email address, Facebook account we must address the question of how access to Wickr accounts can be restricted to their owners. This is even more critical when Wickr’s goal is to allow users to access their accounts from multiple devices. This plays a particularly important role in providing users with a platform for both end-to-end secure and anonymous communication (Wickr Me). Why Passwords?Ī central privacy feature of Wickr is its ability to support accounts identified by arbitrary usernames. Finally, I’ll address the potential threats password use exposes us to and what Wickr does to mitigate those threats. Next, I’ll describe how exactly how they are used.

First, I’ll explain why Wickr has opted to use passwords. The Wickr platform is built around two types of secrets: cryptographic keys and passwords.
