Our Blog

New article:
Say No to Mass Surveillance

There are always new attempts by governments to systematically monitor Internet users for no reason. However, mass surveillance is not only unsuitable for fighting crime, it is also completely incompatible with democratic principles and poses a considerable threat to data security.

Read more
Laptop displaying chat messages with a magnifying glass revealing binary code
Threema Private

Threema 2.0 for Desktop (Beta) Is Now Open Source

The source code of Threema’s new desktop app is now publicly accessible. Consequently, the app is also covered by Threema’s bug bounty program. However, bounty hunters shouldn’t get too excited: the new desktop app has already undergone a thorough security audit, and it passed a recent bug bounty challenge.

Two-tier green drip cake with red berries, black and white layers, and three blue-striped candles
Threema Private

Twelve Years of Seriously Secure Messaging

Exactly twelve years ago today, on 12/12/2012, the first Threema version was published in Apple’s App Store, laying the foundation for secure and privacy-friendly mobile communication.

Isometric graphic of a central server linked to monitors by robot icons and interlocking gear symbols
Threema Work

Unlock the Full Potential of Instant Messaging Through Automation

Instant messaging is incredibly useful, and it’s hard to imagine the modern workplace without it. But there’s more: Threema Work and Threema OnPrem can be integrated into third-party systems, and thanks to versatile APIs, process automation is a piece of cake. This opens up possibilities that go far beyond mere mobile communication.

Smartphone screen with team avatars labeled Design and Marketing, featuring a pop-up highlighting the Illustrator
Threema Work

Job Title and Department in Threema Work

Threema Work introduces a useful new feature: Administrators can now specify a job title and department for each employee. This way, it’s immediately apparent whether a contact is John Smith from accounting or the other John Smith from the operations team. On top of that, the user management in the management cockpit now supports bulk editing.

Illustration of a server protected by a shield with padlocks and secure message icons
Threema Work

Total Data Sovereignty Thanks to On-Premises Messaging

Cloud services are incredibly popular, and for good reason. The “Software as a Service” model offers various advantages. However, there’s a flip side. When it comes to security, data protection, and legal compliance, self-hosted solutions are clearly ahead of the game. In this blog post, we’ll explore the benefits of total data sovereignty and shed some light on the risks associated with certain cloud services.

Hand holds smartphone displaying Apostrophy’ branded Threema secure messaging app screen
Threema Private

Partnership with Apostrophy: Win a Privacy Phone

Like Threema, Apostrophy is a Swiss company that puts privacy first, doesn’t collect user data, and opposes to Big Tech’s ad-driven business model. Now, the two companies team up to facilitate secure and privacy-compliant mobile communication.

Threema Private

It’s Time to Enforce the DMA

Together with Epic Games, Proton, and various other companies, we urge the European Parliament to not let Apple’s and Google’s circumvention of the Digital Markets Act (DMA) slide.

Three user avatars labeled 'Zurich Office' connect to a smartphone chat view labeled 'Zurich Office' on blue background
Threema Work

Manage Groups and Distribution Lists Automatically

Good news for Threema Work administrators: With the latest Threema Work and Threema Broadcast update, centrally managed groups and distribution lists can be automatically created and managed based on tags. This significantly reduces the administrative workload.

Laptop with red screen showing broken unlocked padlock beside smartphone displaying shield, lock icon and chat bubble
Threema Work

The Importance of an Out-of-Band Communication Tool

Email, collaboration tool, chat app, telephone: digital infrastructures in companies are becoming increasingly complex. Furthermore, the fact that the number of cyberattacks continues to grow makes having a reliable out-of-band communication tool increasingly urgent – especially in light of the EU’s NIS2 Directive, which is to be transposed into national law by October 17, 2024. The regulation obligates operators of critical infrastructures to ensure communication and business continuity in the event of a cyberattack. Whitepaper About Business Continuity Learn in our free whitepaper how companies can safeguard their existence in the event of a crisis thanks to solid business continuity management, and find out which steps are necessary to resume operations as quickly as possible. Download the whitepaper

Follow us

Threema

Made in Switzerland © 2025 Threema GmbH.