Our Blog

New article:
“I have nothing to hide”: Why Privacy Matters

Does this statement make your hair stand on end? Unfortunately, the “nothing to hide” argument has persisted for far too long and often prevents any constructive discussion about privacy protection on the Internet. It’s high time to debunk it.

Read more
Illustration of a person hiding their face behind an open book with the phrase “I have nothing to hide” above them, while cartoon eyes surround them as if watching.
Two smartphones showing a four-person video call interface with red end-call and green microphone icons
Threema Work

Threema Work for iOS Adds Group-Call Support

Group calls become available across the board, unleashing their full potential and allowing all Threema Work users to conduct end-to-end encrypted voice and video calls in group chats.

Two angled smartphones display a four-person video call with diverse cartoon avatars
Threema Private

End-to-End Encrypted Group Calls for Everybody!

Group calls become available across the board, unleashing their full potential and allowing all Threema users to conduct end-to-end encrypted voice and video calls in group chats.

Threema Private

Pay Threema’s Android App with Cash and Remain Anonymous

Threema Private

Threema for iOS: Chat on the Computer Without a Connection to the Smartphone

Starting today, Threema’s innovative new desktop app is available to all iOS users as a stable beta version that can be used as a daily driver.

Isometric illustration of a storefront with GDPR shield, legal icon, warning sign, chat bubbles and server
Threema Work

New EU Regulations Aim to Strengthen Cyber Resilience

At the end of 2022, the European Union launched a set of regulations (NIS2, DORA, and CER) that aim to reduce vulnerabilities for cyberattacks in organizations and strengthen the physical resilience of critical entities. The scope of the new legal framework is wide-ranging and imposes profound changes on organizations. Webinar About NIS2, DORA, and CER In our webinar on the subject, Rodrigo López Crespo, Criminal and Cybersecurity Lawyer at Monereo Meyer Abogados, and Miguel Rodríguez, Chief Revenue Officer at Threema, talk about business communication in view of the NIS2, DORA, and CER regulations. The webinar is available as an on-demand recording. Watch now

Isometric illustration of stacked books, an open book, and shields with legal paragraph and medical cross symbols
Threema Work

What the New Federal Act on Data Protection Means for Swiss Companies

Isometric server tower surrounded by chat bubbles showing text and masked passwords on blue background
Threema Work

Threema Gateway: Send and Receive Threema Messages via Your Own Software

Wouldn’t it be great to receive error messages or automated notifications conveniently as a text message? Threema Gateway allows you to set up such integration and automation processes.

Monitor displaying Threema Work Beta business chat interface on blue desktop background
Threema Work

Threema Work 5.4 for iOS: Test the Upcoming Desktop App

Chalk-style blackboard blueprint of a padlock with 'Ibex' label and measurement lines
Threema Private

Security Proof of Threema’s Communication Protocol

When it comes to cryptographic protocols, a formal security proof is the ultimate hallmark of quality. German researchers now provide such a proof for the Ibex protocol, confirming that Threema’s security is based on a rock-solid foundation.

Follow us

Threema

Made in Switzerland © 2025 Threema GmbH.