Personal information is valuable to not only scammers, hackers, and reporters, but also to marketers and their agents. The more detailed and specific the information, the more valuable it becomes. Internet browsing, emails, messaging and cloud stored data, are now the most valuable commodity and significant source of revenue for online services. Google, Yahoo, Microsoft, Facebook, and Twitter are the new Big Brothers in the collection of personal information. Since a consumer can be identified by the unique identity of the device used (Smartphones and Tablets increasingly the most common), the communications between individual consumers can contain valuable insights into preferences, demographics, and intent to purchase.
The messages that are sent and received (SMS/Text, Email, Instant Messaging) by the majority of consumers and many businesses are often only secured between the sender and receiver during the transmission phase. Once the messages are stored on intermediary servers they can be accessed and scanned by hosting service providers. If a consumer can gain control of their privacy by obfuscating these messages, they are then in a position to truly opt-in and out at will to marketing communication.
itizu is a solution to the increasing intrusion into the privacy of individuals and consumers. Giving back the control of communications, and the personal information contained within – what can be viewed, by who, and when.
With a very easy to use interface, itizu communications software allows the consumer/user of a device to add a layer of controlled privacy to their communications. The effect of the software is that it provides device level security, and protection and control of personal information contained in messages once they have left the device.
At a basic level this controls access to messages stored on devices, making them unavailable for viewing in the event that a device is outside the control of the user. But more importantly the user can obfuscate and encrypt messages stored on cloud services, such as Email, SMS, and Instant Messaging, inhibiting access to, and the use of, personal information.