Unseen Edge Server Router


The biggest news this week is the sporty new edge server and router coming from Unseen. Here’s what it will do:

Anti-blocking, this will form the basis of the trusted nodes on our network and allow our users to get around firewalls, including a few big ones (we hope)

Digital currency wallet node distribution

Content delivery network – receive and distribute content privately

Personal firewall to keep bad things out and your things from leaving

Remote management (if you want to have us do this)


P2P functions like email, your own private network, etc. (many of these are future features, but many have been tested)

Most of this box will be open source (running Ubuntu)

We’ve got the first 100 routers in house and they are now being tested. We’re going to make some of these available for free to qualified Unseen users, but we’ll need some information from you first, the normal retail on something like this is about $400, so go complete the survey if you’d like to help with this and have a chance to get one for free:

Complete the brief Survey and get our largest discount on
an Unseen Premium Lifetime Account as our thanks to you.

Take the Survey Here

Lifetime Unseen is still available. As we complete the last upgrades to become completely premium, we’re still in beta and this is the best time to get a lifetime account. This will be the last time you’ll need to pay us for basic service in the future, if you’ve got lifetime.

Get Lifetime HERE (no survey required), use this code: save30


The Edge Server Details and Specs (photos)
We think you’ll be pleased with everything our team is putting into this server. Yes, it’s not just a router, it’s also an X86 Ubuntu server! Placed at the edge of the network in your home, office or data center, we’ll be able to provide a lot of functionality you can’t get any other way; anti-blocking, extra protection from bad guys and a lot more.

The parts all come from Switzerland – PC Engines: it’s possible to get the parts and DIY just download the code for free and install it yourself, too, in a few weeks.

We’ve got the first 100 routers in house going through QA now, One of our engineers did a beautiful job with the logo on the shell. The aluminum metallic blue is just spectacular.

Logo Router

Each router has an X86 based processor, here some of them are, stacked up, prior to going through testing:


After testing, they are carefully placed on a rack:


Here is a view of the ports on the back, (left to right) antenna, power, 2 x USB 2.0 (3.0?), 3 x 1 Gb ethernet, RS-232 serial, antenna :

router connections

Look inside:

router inside

Each router has the following:

3 x 1 GBit ethernet
2 x USB 2.0 (the boot shows USB 3.0 but the original mfr specs were for USB 2.0)
Serial port (9 pin)
1 x 802.11 a/b/g/n WiFi (2.4 or 5 GHz, but not both at same time)
AMD G series T40E, 1 GHz dual Bobcat core with 64 bit support, 32K data + 32K instruction + 512K L2 cache per core
4 GByte DDR3-1066 DRAM
64 GByte SSD
Ubuntu 14.04 LTS

You can use this like a router, it will include management software like the routers at computer shops, however that’s only a very small part of the capabilities of this device, it’s quite powerful and will play a key role with our network. If you have any questions, you can send email to edgeserver@unseen.is.

For those of you who have extra hardware and the ability to manage things, we’ll be providing the source, .deb files and installation scripts so you can BYO hardware. Downloads will be free.

Don’t forget the survey here:

As always, thank you very much for your support.
The Unseen Team

Read more

Iceland’s Volcano Not a Serious Threat to Unseen’s Internet Service


A lot of people are wondering…what’s going to happen with the internet service for Iceland with the volcano Bárðarbunga beginning to erupt? We spent quite a bit of time investigating this before we decided to move Unseen to Iceland.

Let’s first look at the geology of Iceland. The island of Iceland is volcanic in origin, it was formed by volcanic activity from the North American and European tectonic plates pulling apart. Over time and because of the opening of the plates in that particular location, the island was created and continues to grow to this day. It’s also the reason we have such clean and cheap power and hot water in Iceland from the volcano. Our rack at the Thor Data Center has about twice the power that you normally get in other European or US data centers. In fact, cheap power is the reason they built three very large aluminum smelters on the island and import bauxite ore from around the world.

Most of the vulcanism is focused in the center part of the island, away from the population center of Reykjavik. The Bárðarbunga volcano is 150 miles (as the puffin flies) from our data center. If there is a large eruption, the ash will fly to the south and east, towards Europe, this is why there is an airline alert right now. Volcanic ash isn’t very friendly to jet engines, so if the eruption gets big enough, they’ll have to stop service to the main EU countries until the ash clears. Here’s a map from the Iceland Meteorological Office:


The other component of an eruption is lava and pyroclastic flow, which in this case will include a lot of the glacier that’s on top of the mountain. This flows to the south, where there are many huge and beautiful valleys carved out from this kind of flow by past eruptions and the solid parts of the eruption flow to the ocean. Because this has happened many times before in Iceland, the internet there has been designed as a ring:

Iceland Ring Network

The landfall for the sub-oceanic fiber cables that carry your data in and out of Iceland are also situated in locations that are well away from this threat:

iceland internet

We’re watching the situation carefully and will keep everyone informed if there are any service disruptions. Moving Unseen to peer to peer architecture in the near future will make these kinds geological events of little import.

Read more

If Your Unseen Call Failed – Troubleshooting WebRTC


The new Unseen calling upgrades are a huge breakthrough.  Now, because of the cooperation between Chrome, Opera and Firefox, Unseen users can make audio and video calls of outstanding quality.  One billion people are now enabled to use this great technology.  There are still a few bugs and tweaks you might need to make.

Be sure your mic (and camera for video) and speakers are all working.  Be sure to check the speaker icon in the upper right of the Unseen chat window to be sure it’s not X’d out and click on the speaker to be sure the volume is turned up high enough.  You can still hear the ding-ding, but the volume could be turned down, so check that and turn it up.  Here’s some more:

My Call Failed – how to troubleshoot

Unseen’s one to one call is peer to peer, that mean the data stream is transferred only between the caller and callee. This is the best security for your call. Additionally, we’re using DTLS encryption on both ends, for even greater security. If it’s not possible to make peer to peer connection, the data stream is automatically relayed via our TURN servers (only 8% of Unseen calls use this, in the event of a Symmetric NAT).


We support Chrome 29+, Firefox, Opera, Desktop Client and Android (iOS is coming soon). To make an audio call, the caller and recipient need to have a microphone, video call requires a camera. If you use browsers, make sure to enable your microphone and camera.



- On Chrome it will ask once at the first time you make a call, it will display “Allow” and “Deny” buttons below the address bar.


- On Firefox it will ask every time you make a call (be sure to chose a correct microphone and camera).



If you hear no sound, after the call is made, please check your speaker and check the volume button on the right top corner of Unseen chat window (is it on with enough volume or not).



If you get the error message “Media permission denied”, it means the recipient does not enable Microphone or Camera (they may not have that).



If you get the error message “Failed to get local SDP” from Browsers / Desktop App, the recipient might cache old library of our previous release. You need to tell them clear browser cache or clear the desktop application cache (by click on the Unseen tray icon –> clear cache).



If you get the error message “Failed to get local SDP” from Android to your friends, you need to check:



- Your Unseen Android app needs to be at least 1.5.2 above. We have an Android release v1.5.2 on 05/31/2014 that fixes the issue one way calling to Desktop application, Chrome < 35 and Opera.


- You need to restart your Phone after installing Unseen Android so it will be able to work correctly with browsers and the desktop application.



If you get the error message “No / SSL”, the recipient may not available or can not connect to our server.



If you receive error message “Call sevice is not available” on Android phone, you are not connected to our SIP server. There are some reasons for this:



- First you should try to log out and login again, try to make the call again.


- If this still happens, you can go to the settings of the App –> Call Settings –> Change the transport protocol to UDP


- If it still doesn’t work, your network may block the connection (some mobile networks block UDP 5060, TCP 5060) or your phone version is locked (by blocking TCP 5060 or UDP 5060). You can troubleshoot this by using a wifi connection instead of the 3G / 4G network. If it still doesn’t work, please help us by using your terminal / command line with following command:



telnet ssig.unseen.is 5000



telnet ssig.unseen.is 5060



and give us your screenshot.



Here is our test between Supported browsers, desktop client and Android:

calling tests

Read more

Unseen Supports Firefox + Chrome + Opera for Audio/Video Calling!!


We just pushed out this email to our users, if you are not on it yet, here’s some valuable information:


We’ve got some very good news.  The battle between Chrome and Firefox for WebRTC security is now over and Chrome and Firefox are now compatible for WebRTC calling!  We’re very happy with this event and Unseen is now able to offer secure calling for both Firefox and Chrome!  We had a bit of a disruption, as Chrome updated to version 35 and they changed the security protocol to make it compatible with Firefox, but our team worked very hard and pulled some all-nighters to get things working.  This means you can now make audio and video calls securely using Unseen from any of the following devices:

Chrome Browser
Firefox Browser
Windows Desktop Client
Mac Desktop Client
Ubuntu Desktop Client
That covers about 70% of the browser market, so now about 1 billion people can use Unseen for secure and private calling right from their browser, without downloading or installing a thing, using the peer to peer connection and DTLS encryption that’s built in!  How cool is that?
Be sure to tell your friends know that they can use Chrome OR Firefox to do web based calling now, the quality is quite spectacular.  Be sure to ALLOW your browser to access your microphone and videocamera when you make your call.  On Chrome, you only need to do that once, Firefox requires this approval before every call, but we expect in the future, you’ll just approve Unseen.is once and you’ll be in business!
Let us know of any bugs at support@unseen.is
Check it out now HERE
Group Conference Calling – chat.unseen.is – Ready for Testing

Xg86zxB-small We have also launched a new site you’ll be sure to want to try out, it’s our updated group calling feature for audio and video calling.  No account is required for your privacy, but it’ll require everyone to use Firefox or Chrome.  There’s a built in text chat room, too.  Nothing is saved with this service, so it’s extremely private.  You can choose between a relay server in Iceland or the US (for our Asian customers).

Let us know what you think about this new service, we expect to integrate many of these features into the regular Unseen web site and apps within the next couple of weeks, so we’d really appreciate it if you take it for a try.


Updates to Android

We made a push earlier this afternoon (Iceland time)  for the Android and updated to v1.5 beta to fix compatibility for calling between platforms:
- Video / Audio Call to Chrome, Firefox, Opera, Unseen Desktop client is wokring properly with DTLS encryption
- Added support for TURN server (needed in the case of symmetric NAT)
- Support Chrome version 35
- Other improvements
Bug fixes:
- User not able to login when the username contains uppercase character
NOTE: You will need to UNINSTALL the old version first, then restart the phone after installation for the calling feature working properly to Web and Desktop App.  It’s available from our site and the Google Play store at these links:
Updates to WebApp and Desktop Clients (Win, Mac, Ubuntu)
Bug fixes:
- The link is shortened
- Could not send email invitation, so you can now invite all your friends!
- A bug that was preventing people from adding contacts is fixed
- other bugs
- Chrome / Firefox / Opera / Unseen desktop client compatible calling (important)
- We Added some more Emoji emoticons and dynamic emoticons
- Add Contact Dialog: add a default avatar for result contact when search Contact, this should make it easier.
- Enhanced file sharing encryption.  More
NOTE: If you have the desktop client, you will need to click on the Unseen Icon at the right top corner of Ubuntu or Mac to chose “Clear Cache”
You won’t need to download anything for this to take effect, just go to Profile, Clear the Cache, then logout and log back in again.

Unseen Premium

You can still get a great deal with Unseen Premium.  As you can see from our emails and from the performance of the site, things are starting to come along very nicely.  We’re delivering huge improvements in performance, features and security almost every week, we’ve got almost 35 engineers working on Unseen.
In the very near future, we will be moving to monthly pricing, so if you have been thinking about it, now might be the time to get a Lifetime Premium account.  Our Lifetime Premium account is the way you can help support development of this important project — we decided against using traditional Venture Capital to focus on providing our users and customers with the best security we could give them — so our funding comes from our team themselves and our customers.
If you choose Lifetime Premium, you’ll never get another bill from us for the basic services and it’s only $79, we think it’s going to be an incredible deal and you’ll be doing something good by supporting our project.
That’s it for this update.  Thanks for all your support of our important project.  Because of your kind words and suggestions, we’re making Unseen better almost every day.
Best Always,
The Unseen Team
Read more

Does True Randomness Exist?


Randomness is the basis of many aspects of cryptography.  It’s used as a key part of nearly all encryption algorithms to generate keys and many cryptographers will tell you privately that they don’t know if that’s where the major weakness is for cryptography, but they have their suspicions.  If that’s true, the lack of true “randomness” could be a major weakness in encryption.

Looking at our world, everything around us seems chaotic, random and jumbled.  But is it?  Car horns honk, static noise on the radio, people walking on the street, all of these things look random. However, science has discovered the existence of other dimensions that exist in micro-cosmic spaces which is why you can’t see them.  Scientists can’t see them either, but they have proven this mathematically.  If there’s math that demonstrates the existence of these hidden dimensions, couldn’t math also be used to “see” things in these higher dimensions?  That’s one principle of discovering the true nature of randomness, finding a mathematical relationship between the things that appear random and converting them into a much simpler formula that shows the true, underlying order to these things.  With the correct formula, you could see through the randomness and use that knowledge to “predict” with some precision a set of results that would remove some or all of the randomness from the equation.  Even narrowing down the possible solutions can make encryption a lot easier to break using today’s desktop computers, not to mention quantum computers.

Viewing things from a higher level, things that appear random and chaotic are actually very clear and well ordered.  Buddhism teaches this aspect of wisdom, from Sakyamuni through many enlightened people today, they’ll say things like “everything is very well ordered” and “nothing happens without reason”.   They are able to look into these other dimensions and when they do so without any intention, things are very clearly seen.

These observations by calm and rational minds point out something very important;  if nothing is truly random, where can you look to see the order?  People with abilities to “see” into other dimensions point out a way to break through “randomness” and to see the order.  You can learn more about that in this book, link: Zhuan Falun.  High level math and super and quantum computers can explore this area today and break through the “randomness”, which makes it possible to substantially lower the number of possible solutions to a cypher.  Not everyone working at Unseen.is is a cryptography expert, though we have a few who are expert in this domain.  However, most of the people at Unseen.is do meditate, so we understand this principle from another angle.

If high powered computing power available to various security agencies can “look into” or simulate other dimensions to see through “randomness”, breaking encryption is a much simpler task.  Then the issue becomes one of obfuscation, hiding things in plain sight.  ”I didn’t see it, but it was right in front of me” comes to mind.

Read more

The Four Kinds of Encryption


We’ve met some VERY interesting people in our journey with Unseen.is.  We’ve connected with active hackers, cryptographers, former contractors (not Edward Snowden, but people like him in some regards), technologists at the largest companies, etc.  People are all fascinated by what we’re trying to do — it’s really a work in progress, but it gets better every day.  The goal of course is to give people some real security for their valuable communications.

When we tell people “if it’s publicly available, it’s already cracked”, quite a few people don’t believe us.  That’s OK, you just haven’t had a chance to listen in on the conversations we’ve had with people in a position to know what’s really happening.  There is theory and then there’s reality.  We look at the results.

One person we’ve spoken to told us there were four kinds of encryption;

1.  Toy encryption.  This is stuff used by school kids and is so easy to break, it’s like a joke.  Sadly, some of this kind of very weak stuff is still in use where stronger crypto should be used.

2. Pretty Good Encryption.  This is allowed to be exported around the world and it’s all broken by the major security services who have distributed tools to other countries and probably by some of the largest criminal gangs, too.  It includes the standard encryption most people know about, i.e. RSA, AES, SSL, etc.

3.  High Quality Encryption.  These are less publicly known algorithms and they are used by the largest corporations and banks that need real security.  Export is strictly forbidden from the US, though local laws vary in different countries.  Not easy to find.

4. Weapon.  This is the highest grade and the security agencies consider this to be a weapon on par with atomic weapons and those kinds of secrets.  We’ve known a couple of people who were told to stop working in cryptography.  They either join the “team” or shut down.

Are “weapons” like this illegal?  Actually, isn’t that admitting that the pen is indeed mightier than the sword? Actually, how could something that’s purely defensive, like encryption, be used offensively like some kind of weapon? Isn’t that changing the definition to control the discussion and twist the meaning? That’s the sort of thing they used to do in the former Soviet Union under communism, turn the truth on its head purely for political gain and more power over people. We don’t see how encryption could ever be a “weapon”, it’s really just an envelope other people can’t open. So in that regard it’s more of a shield that can be used to protect your personal, owned by you information.

In the U.S., the first amendment lets you have freedom of speech and it doesn’t say how you have to speak.  People there are also allowed to own real weapons, quite a few people own and carry guns in the U.S.  We were told that you might win in court there, as none of these things are against the law in most places (from what our lawyers tell us) and they are all definitely legal in Iceland.  However, there is a point where things go “beyond the legal system” and extra-legal violence becomes reality.   Night time visitors carrying flashlights in the dark and that sort of thing.



Read more

Who is Funding Unseen.is?


One of our customers heard a rumor floating around last week that IBM had funded Unseen.is.  Actually, we have absolutely no corporate, government or venture capital financing.  We don’t believe it’s possible to serve two masters and for us, the users of our system are the reason we’re here.  Unseen.is has to-date been funded from these four sources, in no particular order:

  1. Profits from another web site we run, Before It’s News.  Many of the features we are building will be needed for this and other news web sites.  Censorship is going to be a big problem, we’re already seeing the first signs of that with degraded internet performance.  It’s also possible that tiered bandwidth service could make it difficult to connect with services that provide privacy.  Occasionally you might see references to Before It’s News from Unseen.is, like the email that went out inadvertently last week — we’re cleaning many of those up.
  2. You.  When you buy the premium service, you’re help us to defray costs and get to a positive business cycle sooner.  We especially treasure your feedback and good wishes for our team.
  3. Our team.  Everyone working here could make a more working at Big Internet Companies and some of our team members left jobs that pay a lot more to work here.  We have of course given them stock in the company.  Money is nice to have, but it’s not the main motivation of our team.
  4. My pocket.  I’ve had some successful companies in the past and can’t think of anything better to leave behind for everyone than a secure way to communicate privately.

To date, we’ve spent a bit over $1 million to develop the service.  If we had gone the venture capital (VC) route, we would have spent somewhere between $5-10 million to get where we are today.  We’d also have picked up some “partners” and while there are definitely good VC’s, we don’t think this kind of business can be built using this kind of money because of potential influence that might be exercised counter to the best interests of our users.  This is why we haven’t taken any VC money, not a penny.  However, there are other companies trying to build private and secure communications and they have decided to take VC money.  Here’s a bit of background on that process.

When you take VC money, you are going down a different path than the one Unseen.is is on.  While there are many successful companies that have taken VC money, there is an inherent conflict of interest with the VC’s, their investors and people who have influence over the VC’s and the goals of our company and the users we serve.  This isn’t to say anything bad about VC’s or the people who work there, there are definitely some good ones.  The group you take your funding from will change your priorities, that’s all.

The first round of VC funding is typically $5-10 million for a business like ours and VC’s almost never invest alone.  That’s not enough money for the company to become profitable, and they will never give you enough with your first round, they need to put $25-50 million to work on each deal they are in to make it worth their time.  A billion dollar fund will typically invest in only 20 companies because that will keep 2-3 partners busy full time.  Most of the large funds have several funds, they raise a new one every few years.  If you start with two VC’s and you are successful, you’ll end up with a constellation of them, they all want to put as much of their money to work in a good deal as possible.

VC funds are very lucrative to run.  The partner’s money makes up a small fraction of the fund, most of which comes from a list of several hundred pension funds, family offices (wealthy families like the Walton family of Walmart fame, or Michael Dell’s family, for example) and wealthy individuals.  Partners typically receive a 2% management fee per year, which can be higher for funds with a great track record, as well as 20% carried interest, which comes from the profits, once the investors are paid back their initial investment.  Many successful VC’s have accumulated fortunes of hundreds of millions or even a billion dollars and this money is typically run offshore from places like the Cayman Islands, where financial privacy and favorable tax laws are found.  The successful VC’s have made their investors rich, too, and helped to create some of the biggest companies in technology and in many ways, they do serve society in a positive way.

However, for a company that takes their money, VC’s have several places where they exercise control and have control exercised on them.  First, the VC’s themselves might have interests in other companies or relationships that they don’t want impaired.  This could be companies they are invested in at the same time (e.g. Yahoo and Google or Apple and Google) where there could be conflicts of interest.   Even companies related by interlocking directors can exert influence over certain companies.  Second, the investors in a fund also exert influence on a VC by threatening to withhold funding from a subsequent venture fund, as an extreme example.  This is usually unspoken, but tempers the VC’s behavior.  Lastly, some other businesses that a VC has an interest in might be regulated by various entities, who would then have influence over the VC.  ”Nice TV station license you’ve got there, it would be a shame to see anything happen to it” comes to mind for those with government licenses.  There are many points of leverage.

Here’s an example, a fund that might invest in businesses in our category…In-Q-Tel and this is what it says on their front page (note: we haven’t received any funding from In-Q-Tel or any other venture capital fund and Unseen.is has nothing to do with the following companies or funds):

We identify, adapt, and deliver innovative technology solutions to support the missions of the Central Intelligence Agency and broader U.S. Intelligence Community.

Here’s a bit more about the intelligence agency partners In-Q-Tel has:

While CIA remains our primary partner, IQT has broadened its scope in recent years to support other agencies within the IC, such as the National Geospatial-Intelligence Agency (NGA), Defense Intelligence Agency (DIA), and Department of Homeland Security Science and Technology Directorate (DHS S&T). This expansion has allowed our partners to benefit from technology developments that are jointly funded, reducing risk and fostering better inter-agency information sharing and operations.

Our primary point of engagement with the IC is through the In-Q-Tel Interface Center (also known as the QIC), housed in the Central Intelligence Agency. Comprised of experienced CIA officers, the QIC provides a direct connection to the IC’s technology leaders and end users, ensuring our strategies and investments are on target. Each partner agency sponsors a similar team of interface staff tasked with helping to facilitate relevant technology deployment, transition, and acceptance within the respective agency.

If you’d to have a sponsor like this for your business, I’m certain they would be a great financial and strategic partner, they have a good track record and plenty of money and connections to other funds and they could probably get you a lucrative government contract while they are at it.  Here’s a list of some of the other funds and institutions In-Q-Tel is or has been affiliated or associated with (note: Unseen.is has no association with any of these institutions):

  • AT&T
  • Cisco
  • Federal Express
  • Greylock
  • IBM
  • Intel
  • Joint Chiefs of Staff
  • Kissinger and Associates
  • Kleiner Perkins
  • Netscape
  • Stanford University

This is an “A” list of connections by any measure and there are many other connections to all the other largest venture capital firms, such as Accel Parners (who were one of the main investors in Facebook).

Connections go beyond a particular fund, the world of VC’s is a very private club.  For example, Wickr, a company focused on private and secure communications for mobile devices received an investment of $9 million, as reported by Tech Crunch:

The investment was led by Alsop Louie Partners, a VC that has backed companies that include Twitch and Justin.tv. Last year the VC took a big swing towards privacy, raising a $100 million fund to back security companies. That has included a round of an undisclosed amount in cybersecurity startup DeviceAuthority.

Other backers include Thor Halvorssen, president of the Human Rights Foundation; Gilman Louie, former head of the C.I.A.’s venture arm In-Q-Tel; networking company Juniper; former counterterrorism tsar Richard A. Clarke; Eileen Burbidge of Passion Capital in London and other investors that are not being made public.

We’re not saying it’s bad to take money from these people; for some businesses, it makes perfect sense.  However, there are also advantages of not taking money from this kind of funding source.  It’s definitely more difficult and there are many things Unseen.is could upgrade and build faster if we had the resources from a $9 million funding round.  Increasing our tech team, building out more server capacity and secure data centers earlier in our development, promotion and marketing and other staffing could be improved — these things would definitely move things a lot faster.  However, the price of hardware, the ability to reach a huge market and the availability of opensource technology significantly lowers the amount of capital required to build this kind of business.  In the end, we think our users will be better served the way we are funding Unseen.is, with all the warts and wrinkles this involves.




Read more

Android Update + Introducing the IceCloud


This email was sent to Unseen members on 4/17/14


You are receiving this email because you signed up for Unseen.is for secure and private communications.
We’ve got a new Android app available for download and lots of other exciting news.  iPhone users, don’t worry, we have iOS in development and parts are already working in our lab.  Expect to see a beta version by the end of May.
Get the new Unseen Android App

Quite a few improvements have come out as well as a design update that we will be using throughout the family of Unseen applications and web sites.  Be sure to uninstall your old Android version before installing the new one.  We expect to have this version up on the Google Play store in the next couple of days, so you can get automatic updates in the future.   Keep in mind this is a beta, so you’ll might still find a few bugs, but this release is very solid.

Download the latest Android here:

Here are the release notes from our development team:
This version is a breakthrough and has a lot of changes:
1. A New Beautiful Design:

- Tabs on main screen: Contact list, Chat list, Call history
- Android 3.0 style
- Chat view redesign: Audio call button, video call button, current call button (when in call)
- Only 1 unseen account active, with Login, Logout functionality

- Search contacts and chats
You’ll soon start to see these designs flow into all the other Unseen apps.
2. We fixed the battery drain issue (nothing is worse than a drained battery!!)
3. Optimized performance:

- fixed issue: loading chats caused hanging
- fixed issue: too many offline messages caused hanging
4. Unread message display on chat list is now fixed

- offline messages + not viewed messages
5. You can now pull down chat view to get history message
6. New Emoticons and Share Button grid
- click on (+) to access Share button grid
- swipe to the right to access emoticons panel (note: this still is not working on Android 2.3)
       Everyone likes the Unseen emoticons!
7. Swipe chat view to access other active chats
8. Removed some useless settings and other items we’re not using with the new design
9. We have a new UI for inviting users to chat room
10. Added new language support: Traditional Chinese, more about language support below….


Send a file, take and send a photo or video    Video call with security from your Android
Language Support
We have an international crowd of like minded people using Unseen from just about every corner of the globe.  You believe people should have the right to freely communicate and also to do what’s right and so do we.  It’s nice to be able to use an app in your native language.

You’ve probably noticed we have support for several languages in our apps and web site;  English, Chinese and Vietnamese (in our apps).  If you have a language you’d like supported and are willing to translate a language file, we’d be happy to send you a couple of lifetime premium accounts to compensate you for your effort.  It’s usually no more than a few hours work and everyone who speaks that language will appreciate it.

Please contact support@unseen.is and we’ll get you the details.

Heartbeat OpenSSL Security Bug
Along with about 2/3 of the internet, we were affected by this bug and it was promptly fixed within several hours of the initial report of this problem.  If you are concerned about it, you can change your password, but you will lose all your old conversations.  Please note, we also use NTRU encryption inside the SSL, so problems with SSL have very little effect on Unseen users.  SSL does have a cute padlock in your browser, however.

The IceCloud

Right now, we’re running on five dedicated servers in Iceland.  That’s about to change, as we added ten new very powerful servers last month, running special cloud software.  They are almost ready to go into service and we’ll be deploying them as our own cloud, the IceCloud!
Based in Iceland, the IceCloud will give us the ability to offer more free email storage, as well as expand our encrypted storage options for all premium members.  This cloud will have the equivalent of over 300 servers and about 240 terrabytes of online storage.  It’s a remarkable setup and will give our users many capabilities.  It also allows us to serve up to 2 million people, so get ready to see things ramp up.

Groups, Discounts and our Affiliate Program

We welcome large groups and we’re developing tools to automate the process of bringing them onto Unseen and we also offer bulk discounts.  If you’d like to earn money from Unseen, we’ve got an affiliate program that will give your colleagues a discount and pay you a commission.  Please contact support@unseen.is

Upgrade Your Account to Premium Today

Xg86zxBIf you’ve been holding back, now might be the time to make the move to premium.  You get more storage, 2GB for premium users instead of 25MB for those with a free account.  You also get the ability to generate and keep your private key yourself, instead of on our servers.  Once the cloud is fully functional, premium members will have other storage features free members don’t get.  You’ll also get the ability to do larger groups (5+) with audio conferencing.

Read more

Heartbeat Heartbleed Security Patch this AM


We patched the OpenSSL on the Unseen.is site this morning for the Heartbeat Heartbleed security vulnerability.  There haven’t been any reported issues, though the original report of what can be done with this vulnerability is potentially serious.  Here’s a run down on the things that were broken with this bug, which affected about 2/3 of the internet:

 When the bug is exploited the attacker can retrieve memory (up to 64kb) from the remote system. This memory may contain usernames, passwords, keys or other useful information that enables bigger attacks. An attacker may for example be able to retrieve the keys and secrets used to encrypt traffic and then intercept and read the communications of all other users of that service. There are all kinds of variations that might be possible based on the ability to read this memory. 64kb may not seem like a great deal of data, but of course the attacker can connect repeatedly and progressively collect more information. This is a serious problem indeed.


Read more

Email Can’t Be Completely Private or Secure


People ask us this question every day.  Can you make my (name of big name email service) email account secure?  A better question to ask is if any email can ever truly be private or secure.

Our opinion is email can NEVER be completely private and secure — that’s because of the way email was designed and operates and it’s been that way for more than 30 years.  When you send an email, you are actually sending a text message from your computer to another server, an email server somewhere on the internet that can be read by anyone along the way.  In the trusting world of the early internet, most people were kind and trustworthy, so this wasn’t a problem.  Gentlemen (and gentlewomen) don’t read other gentlemen’s email.  Unfortunately, the internet has slid down along with society.

How Email Works

When you send an email, there is an entire system of email servers on the internet, run by many different people you don’t know, that move your email from your computer to your recipient going between many different places along the way.  Here’s a diagram (below) of what this network looks like.  On the left are your desktop, mobile and laptop that send email.  All the way to the right is your recipient, a desktop computer.  As you can see, the email travels through many different servers to get from the sender to the recipient.  Note: I’m simplifying things a bit here.

It makes a number of hops through various servers on the way from sender to recipient, going through a number of servers, a “cloud” (in this example) and it’s almost guaranteed to go through at least one Spy Server (or hidden switch) that will make a copy of your email.  We’re not even talking about major commercial services here like Yahoo, Hotmail, or Gmail, etc.  Those service duplicate and scan all mail going through their systems.  Document retention is out of your control and depending on their privacy policy, they can give it to others under various circumstances.

We know personally that email has been gathered since 1997 at nearly all major ISPs in data rooms run by the NSA.  If you are outside the US, you should assume that your government’s security services are doing the same thing.  There’s a lot of valuable business and political information available in all that email, and it’s guaranteed to be intercepted and saved.  You won’t know anything about it because it’s transparent to you. (unless it gets blocked or censored)


Because email is just a plain text format, anyone along the way can read it.  Newer servers now encrypt the email contents between the servers, but not every server supports this, which makes it of limited value.  Even if it’s encrypted, you don’t control the key and it’s usually SSL encryption (that we believe is broken), so that encryption isn’t worth very much.  There’s no telling what kind of servers you are going through and it’s not uncommon to go through 15-30 different email servers before your message gets to your recipient.  It’s just not secure because there is no control over the end-to-end transmission of your message.  It’s difficult for the sender to know the receiver got the email, unless they reply to it.

Email is Like a Postcard

When you send an email, the sender and receiver plus time and date is all out in the open.  Even if your message is encrypted, this “header” information is there for anyone to see, here’s an example:

Return-path: <panamaslj2@zaprosto.ru>
Envelope-to: radio@beforeitsnews.com,
Delivery-date: Wed, 19 Mar 2014 17:44:10 -0400
Received: from [] (port=17051)
	by mx02.safemail.is with esmtp (Exim 4.82)
	(envelope-from <panamaslj2@zaprosto.ru>)
	id 1WQOHQ-0005kN-L4; Wed, 19 Mar 2014 17:44:09 -0400
Message-ID: <01cf43de$0a33c780$da457eb2@zaprosto.ru>
From: =?koi8-r?B?IvPQydLJxM/OIg==?= <panamaslj2@zaprosto.ru>
To: <abuse@beforeitsnews.com>
Subject: =?koi8-r?B?7sHU1dLBzNjO2cUg0NLPxNXL1NkgySDLz9PNxdTJy8Eu?=
Date: Thu, 20 Mar 2014 01:45:15 +0400
MIME-Version: 1.0
Content-Type: text/plain;
Content-Transfer-Encoding: 8bit
X-Priority: 3
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook Express 5.50.4927.1200
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4927.1200
X-Spam-Status: No, score=
X-Spam-Flag: NO

There’s actually quite a bit of valuable information in the header, you can connect who is talking to whom and when, just like the “meta-data” from a phone call and so on.  People will know who you are doing business with or communicating with.  Let’s say you are visiting a psychiatrist or a cancer doctor, or buying some long term food to store in your home, or maybe staying at a hotel in another city or attending a rally to protest something.  That’s all recorded FOREVER and even if the message is very strongly encrypted all this information is out in the open.  It’s very valuable marketing data and also could be useful to spies.

Email Can be Blocked and Censored

Think about it, if someone can read all the information in the header, they can potentially block emails from that person to you or even change the content of the files.  We’ve actually seen this happen numerous times with Before It’s News, where we receive many sensitive emails from people who are whistle-blowers and human rights activists.  We’ve tested this and seen that certain mail gets through and other mail doesn’t.  It depend on the sender, receiver, subject and contents of the message.  You don’t miss what you don’t see.

Our Future Solution Will Use Very Strong Encryption and Anti-blocking Technology

We think the solution to this problem is to gradually stop using email altogether.  Our real time messaging will be redesigned in the future to provide an email like service and provide a gateway that will be backwards compatible with today’s email.  It will look and feel like email, but it will be real time and not go through the email network infrastructure that is widely known to be compromised.  You’ll still be able to communicate with people who use email, but they will receive messages from you on a secure web page.

We’ll still offer the best encryption possible with our standard email service, but we will be recommending that people migrate to the real time messaging as we develop more email like functionality.  The encryption is extremely strong, and there are many features like message retraction or destruction and receipt of delivery and reading.  It’s also a lot faster because it’s designed to be real time, like a phone call or chat, not delayed like an email.


Read more