This article has an unclear citation style.November 2015) (Learn how and when to remove this template message)(
|Initial release||December 2012|
|Written in||Objective-C (iOS), Java (Android), C, .NET (Windows Phone)|
|Operating system||iOS, Android, Windows Phone|
|Available in||English, German, French, Spanish, Italian, Russian, Brazilian Portuguese, Polish, Rumantsch Grischun|
|Type||Encrypted instant messaging & voice calling|
AGPLv3 (Web client)
MIT (Communication protocol)
The software is based on the privacy by design principles and the service doesn't require users to provide a phone number or any other personally identifiable information: The Threema app can be used anonymously.
Threema is developed by the Swiss company Threema GmbH. The servers are located in Switzerland and the development is based in Pfäffikon SZ. As of April 2017, Threema had 4.5 million users. As of January 2019, the business version, Threema Work, was used by 3.000 companies and organizations.
Threema was founded in December 2012 by Manuel Kasper. The company was initially called Kasper Systems GmbH. Martin Blatter and Silvan Engeler were later recruited to develop an Android application that was released in early 2013.
In Summer 2013, the Snowden leaks helped create an interest in Threema, boosting the user numbers to the hundreds of thousands. When Facebook took over Whatsapp in February 2014, Threema got 200,000 new users, doubling its userbase in 24 hours. Around 80% percent of those new users came from Germany. By March 2014 Threema had 1.2 million users.
Threema uses a user ID, created after the initial app launch by a random generator, instead of requiring a linked email address or phone number to send messages. It is possible to find other users by phone number or e-mail address if the user allows the app to synchronize their address book. Linking a phone number or e-mail address to a Threema ID is optional. Hence, the service can be used anonymously. Users can verify the identity of their Threema contacts by scanning their QR code, when they meet physically. The QR code contains the public key of the user, which is cryptographically tied to the ID and will not change during the lifetime of the identity. Using this feature, the users can make sure they have the correct public key from their chat partners, which provides additional security against a Man-in-the-middle attack. Threema knows three levels of verification (trust levels of the contact's identity). The verification level of each contact is displayed in the Threema application as dots next to the corresponding contact.
Users can make voice calls and send text messages, multimedia, locations, voice messages and files of any type (up to 50 MB per file). It is also possible to create polls in personal or group chats. With Threema Web, a client for web browsers, Threema can be used from other devices like desktop computers. Threema optionally supports Android Wear smartwatch and Android Auto.
Threema Work: On May 25, 2016, Threema Work, a corporate version of Threema, was released. Threema Work offers extended administration and deployment capabilities. Threema Work is based on a yearly subscription model.
Threema Gateway: On March 20, 2015, Threema released a gateway for companies. Similar to an SMS gateway, businesses can use it to send messages to their users who have Threema installed. The code for the Threema Gateway SDK is open for developers and available on GitHub.
Threema Broadcast: On August 9, 2018, Threema released Threema Broadcast, a tool for top-down communication. Similar to emails in electronic newsletters, Threema messages can be sent to any number of feed subscribers, and the Threema Broadcast allows to create chatbots.
Since Threema's servers are located in Switzerland, they are subject to the Swiss federal law on data protection. The data center is ISO/IEC 27001-certified. Linking a phone number and/or e-mail address to a Threema ID is optional; when doing so, only checksum values (SHA-256 HMAC with a static key) of the e-mail address and/or phone number are sent to the server. Due to the small number of possible digit combinations of a telephone number, the phone number associated with a checksum could be determined by brute force. The transmitted data is TLS-secured. The address book data is kept only in the volatile memory of the server and is deleted immediately after synchronizing contacts. If a user chooses to link a phone number or e-mail address with their Threema ID, they can remove the phone number or e-mail address at any time. Should a user ever lose their device (and their private key), they can revoke their Threema ID if a revocation password for that ID has been set.
Groups are solely managed on users’ devices and group messages are sent to each recipient as an individual message, encrypted with the respective public key. Thus, group compositions are not exposed to the server.
On 9 March 2017 Threema was listed in the "Register of organizers of information dissemination in the Internet" operated by the Federal Service for Supervision of Communications, Information Technology and Mass Media of the Russian Federation.
In a response, a Threema spokesperson publicly stated: "We operate under Swiss law and are neither allowed nor willing to provide any information about our users to foreign authorities."
The entire communication via Threema is end-to-end encrypted. During the initial setup, the application generates a key pair and sends the public key to the server while keeping the private key on the user's device. The application then encrypts all messages and files that are sent to other Threema users with their respective public keys. Once a message is delivered successfully, it is immediately deleted from the servers.
The encryption process used by Threema is based on the open-source library NaCl library. Threema uses asymmetric ECC-based encryption, with 256-bit strength. Threema offers a "Validation Logging" feature that makes it possible to confirm that messages are end-to-end encrypted using the NaCl Networking and Cryptography library. In August 2015, Threema was subjected to an external security audit. Researchers from cnlab confirmed that Threema allows secure end-to-end encryption, and claimed that they were unable to identify any weaknesses in the implementation. Cnlab researchers also confirmed that Threema provides anonymity to its users and handles contacts and other user data as advertised.
Along with Cryptocat and Surespot, Threema was ranked first in a study evaluating the security and usability of instant messaging encryption software, conducted by the German PSW Group in June 2014.[unreliable source?]
As of November 2015[update], Threema has a score of 6 out of 7 points on the – now withdrawn – Electronic Frontier Foundation's "Secure Messaging Scorecard". It has received points for having communications encrypted in transit, having communications encrypted with keys the provider doesn't have access to (i.e. having end-to-end encryption), making it possible for users to independently verify their correspondent's identities, having past communications secure if the keys are stolen (i.e. implementing forward secrecy), having its security design well-documented and having completed an independent security audit. It is missing a point because its source code is not open to independent review (i.e. it is not open-source).
- Schurter, Daniel (13 December 2012). "Die Schweizer Antwort auf WhatsApp" [The Swiss answer to WhatsApp]. 20min.ch (in German). Retrieved 5 July 2014.
- "What's New - Threema". threema.chlanguage=en-us. Retrieved 2020-04-06.
- "What's New - Threema". threema.ch. Retrieved 2020-04-17.
- "End-User Software License Agreement". Threema GmbH. Retrieved 5 July 2014.
- "Threema Web on GitHub".
- "App Remote Protocol on GitHub".
- Happich, Julien (23 September 2014). "Privacy gains traction with secure messaging apps". Electronic Engineering Times Europe. Retrieved 21 December 2015.
- "Cryptography Whitepaper" (PDF).
- "FAQ – Privacy Protection".
- "What is a Threema ID?". threema.ch.
- "What features does Threema offer?". threema.ch.
- "Threema Web".
- "Threema". Google Play Store. Retrieved 5 July 2014.
- Swiss Confederation. "Swiss company registry entry for Threema GmbH". zefix.ch. Retrieved 5 July 2014.
- "Threema vs. Hoccer: Krypto-Messenger im Vergleich" (in German).
- "Verschlüsselte Botschaften".
- Metzler, Marco (28 June 2015). "Kryptografie-App Threema: Schweizer sorgen für Privatsphäre" [Cryptography app Threema: Swiss ensure privacy]. Neue Zürcher Zeitung (in German). Retrieved 8 October 2015.
- "Im Interview: Threema". Mailify (in German). 23 July 2014. Archived from the original on 2 August 2014. Retrieved 11 October 2015.
- Tanriverdi, Hakan. "Der Schlossherr". Der Freitag (in German). ISSN 0945-2095. Retrieved 11 October 2015.
- Price, Rob (18 June 2015). "Germany's most popular paid app is a secure messenger loved by millions — now it's taking on the US". Business Insider UK. Retrieved 11 October 2015.
- Dillet, Romain (21 February 2014). "Bye Bye, WhatsApp: Germans Switch To Threema For Privacy Reasons". TechCrunch.
- "Threema GmbH, Pfäffikon SZ". Shabex.ch. Retrieved 11 October 2015.
- "iOS-Highlights: Die besten Apps des Jahres" [The best apps of the year]. Focus (in German). 9 December 2014. Retrieved 1 March 2016.
- "Will my address book data be sent to your servers?". threema.ch. Retrieved 2 December 2014.[third-party source needed]
- "What is a Threema ID? - Threema". threema.ch.
- "How can I send a file?". threema.ch.
- Bordel, Stefan (12 January 2015). "Threema integriert Umfrage-Funktion" [Threema integrates survey function]. com! - Das Computer-Magazin (in German). Retrieved 12 October 2015.
- "Big Update for Android". threema.ch.
- "The messenger for organizations". work.threema.ch.
- "Pricing Threema Work".
- Iseli, Marc (28 September 2015). "US-Feldzug von Threema gerät ins Stocken" [US campaign of Threema is stalled]. Handelszeitung (in German). ISSN 1422-8971. Retrieved 12 October 2015.
- "Threema GmbH". GitHub. Retrieved 20 September 2017.
- "Broadcast Blog-Post".
- "Reference Sheet Privacy and Security" (PDF). threema.ch. p. 2.
- "Threema Cryptography Whitepaper" (PDF). threema.ch. p. 11.
- "Will my address book data be sent to your servers?". threema.ch.
- "How can I unlink my Threema ID from an email address or phone number?". threema.ch.
- "Revoke your ID". threema.ch.
- "Threema Cryptography Whitepaper" (PDF). threema.ch. p. 5.
- "Are messages encrypted when they are stored on my device?". threema.ch.
- "Transparency Report". threema.ch.
- "Threema GmbH". rublacklist.net (in Russian). Retrieved 20 September 2017.
- "Russia adds international messenger Threema to official registry". East-West Digital News. 16 Mar 2017. Retrieved 27 January 2018.
- "Threema Cryptography Whitepaper" (PDF). threema.ch. 14 September 2017.
- Zorz, Mirko (17 September 2014). "Secure mobile messaging with Threema". Help Net Security.
- "How long do messages stay in queue for delivery?". threema.ch. Retrieved 20 September 2017.
- "Threema Validation". threema.ch. Retrieved 20 September 2017.
- "External Audit". threema.ch. Retrieved 20 September 2017.
- "Security Review Threema: Security Statement" (PDF). threema.ch. 2 November 2015. Retrieved 20 September 2017.
- Schirrmacher, Dennis (3 November 2015). "Threema-Audit abgeschlossen: "Ende-zu-Ende-Verschlüsselung ohne Schwächen"" [Threema Audit Completed: "End-to-End Encryption Without Weakness"]. Heise.de (in German). Retrieved 21 December 2015.
- "WhatsApp und Alternativen: Datenschutz im Test" [WhatsApp and alternatives: data protection tested]. Stiftung Warentest (in German). 26 February 2014. Retrieved 1 March 2016.
- Heutger, Christian (13 June 2014). "Die Ergebnisse unseres großen Messenger-Tests" [The results of our great messenger test]. PSW Group (in German). Retrieved 26 June 2014.
- Buchta, Steve. "Connect App Awards 2014: Das sind die besten Apps des Jahres". Connect.de. Retrieved 20 September 2017.
- "Secure Messaging Scorecard. Which apps and tools actually keep your messages safe?". Electronic Frontier Foundation. 3 November 2015. Archived from the original on 14 April 2016. Retrieved 30 November 2015.