Automattic-owned Beeper is releasing redesigned desktop and iOS apps

[ad_1]

WordPress.com owner Automattic last year acquired the multi-service messaging app Beeper for $125 million and said it would merge it with Texts.com, an earlier acquisition in the same category. Now, Beeper is releasing the first set of redesigned apps for iOS and desktop in beta after the merger.

In a blog post, Beeper said that it built the desktop app using Texts.com app’s foundation, and the iOS app from scratch. The company added that the new set of apps are faster and less battery hungry.

On X, Texts.com founder Kishan Bagaria said that while users can still use the old app, eventually the company will provide an easy way to migrate to the new set of apps.

Currently, the app uses Beeper Cloud to store messages and credentials for other services. In upcoming versions, all this data will be stored on-device. What’s more, the new apps will have on-device encryption for better privacy and security, and support multiple accounts associated with the same messaging service. Bagaria also mentioned that down the line, the Mac app will allow users to send and receive iMessages.

Beeper was founded by Eric Migicovsky, who was the founder of the Pebble smartwatch and a partner at Y-Combinator. After the acquisition, Migicovsky became the outfit’s head of messaging. However, last month Migicovsky announced that he is focused on building Pebble again.

[ad_2]

Source link

Related posts:

Stay Safe Online: Essential Tips for Safer Internet Day

Is Your Phone Your Best Friend or a Silent Spy?

Wipe Your Digital Footprints with Data Wipe Software

No, you’re not fired – but beware of job termination scams

DeceptiveDevelopment targets freelance developers

Fake job offers target coders with infostealers

Belarus-Linked Ghostwriter Uses Macropack-Obfuscated Excel Macros to Deploy Malware

LightSpy Expands to 100+ Commands, Increasing Control Over Windows, macOS, Linux, and Mobile

CISA Adds Microsoft and Zimbra Flaws to KEV Catalog Amid Active Exploitation

Malicious PyPI Package "automslc" Enables 104K+ Unauthorized Deezer Music Downloads

CERT-UA Warns of UAC-0173 Attacks Deploying DCRat to Compromise Ukrainian Notaries

Three Password Cracking Techniques and How to Defend Against Them

New Linux Malware ‘Auto-Color’ Grants Hackers Full Remote Access to Compromised Systems

SOC 3.0 - The Evolution of the SOC and How AI is Empowering Human Talent

Leaked Black Basta Chat Logs Reveal $107M Ransom Earnings and Internal Power Struggles

Microsoft: Russian-Linked Hackers Using 'Device Code Phishing' to Hijack Accounts

AI-Powered Social Engineering: Ancillary Tools and Techniques

Lazarus Group Deploys Marstech1 JavaScript Implant in Targeted Developer Attacks

New “whoAMI” Attack Exploits AWS AMI Name Confusion for Remote Code Execution

Android's New Feature Blocks Fraudsters from Sideloading Apps During Calls

New Golang-Based Backdoor Uses Telegram Bot API for Evasive C2 Operations

⚡ THN Weekly Recap: Google Secrets Stolen, Windows Hack, New Crypto Scams and More

CISO's Expert Guide To CTEM And Why It Matters

South Korea Suspends DeepSeek AI Downloads Over Privacy Violations

Microsoft Uncovers New XCSSET macOS Malware Variant with Advanced Obfuscation Tactics

Cybercriminals Exploit Onerror Event in Image Tags to Deploy Payment Skimmers

New Xerox Printer Flaws Could Let Attackers Capture Windows Active Directory Credentials

Winnti APT41 Targets Japanese Firms in RevivalStone Cyber Espionage Campaign

Juniper Session Smart Routers Vulnerability Could Let Attackers Bypass Authentication

Debunking the AI Hype: Inside Real Hacker Tactics

See also  AI-Powered Deception is a Menace to Our Societies

Leave a Reply

Your email address will not be published. Required fields are marked *