Our Blog

Hand holding a smartphone with a chat app, connected to a server interface, both protected by shield icons with a key symbol.
Threema Work

Protected Data Even if a Device Is Lost

For companies with the highest security requirements, Threema OnPrem offers a sophisticated new feature: thanks to DualLock, chats are now protected even if a mobile device is lost or stolen.

Smartphone displaying a chat conversation with text, voice message, image, and location, featuring the new Liquid Glass design.
Threema Private

Liquid Glass and a More Modern UI in Threema for iOS

New design, redesigned workflows, and additional features: Threema 7.1 for iOS offers more than just Liquid Glass.

Speech bubbles with exclamation and question marks on a green background with Easter eggs.
Threema Private

Get the Message? Of Ghosting, Dry Texting, and Left on Read

Have you ever heard someone say they were “ghosted” and had no idea what it means? Or are you unsure what “dry texting” and being “left on read” is? In this blog post, we explain some common Internet slang terms and concepts relating to instant messaging.

iPhone screen showing a message that screenshots are disabled by the administrator, with a large red X over a sample screenshot and the label “Prevent Screenshots on iOS.”
Threema Work

Prevent Screenshots in Threema Work

Business communication belongs in secure channels, not in the photo gallery of personal smartphones. With the latest update of Threema Work and Threema OnPrem for iOS, screenshots of chat histories can now be prevented.

Illustration of a Zero Trust security model with a central lock labeled “Zero Trust,” connected to icons representing databases, users, identity, cloud, devices, and network.
Threema Work

Zero Trust: Rethinking Security in a Connected World

Today’s digital environments are more connected and distributed than ever. Traditional security models built around a trusted network perimeter are no longer sufficient. As cloud services, remote work, and mobile devices blur the boundaries of corporate networks, a new guiding principle has emerged: Zero Trust.

Hand holding a keyring with a key and the Threema icon.
Threema Private

Why There’s No Such Thing as a Threema User Account

Several recent news reports have sparked discussion in the IT community and raised questions among some of our users. One topic is the view that paid online services are incompatible with anonymity – and therefore with strong data protection. Another is the risk of user accounts being hijacked through identity spoofing, which current events have brought back into focus.

Illustration of a quantum computer’s dilution refrigerator with stacked golden platforms and glowing purple rings representing qubits.
Threema Private

Threema and IBM Research: Collaboration for a Quantum-Secure Future

We are joining forces with IBM’s renowned research division to implement post-quantum cryptography in Threema. This collaboration will further strengthen Threema’s exceptional security standards, ensuring that our communication solutions are prepared for future threat scenarios.

Hand holding a smartphone with a settings menu, surrounded by contact avatars.
Threema Private

Recommend Threema Work and Earn a Reward

Do you use the Threema Private app and know professionals who might be interested in a secure business messenger? Recommend Threema Work and earn a bonus!

Illustration of a power plant with wind turbines and solar panels next to the Axpo and Threema logos.
Threema Work

Axpo Systems and Threema: Enhancing Data Security in the Energy Sector

As part of the critical infrastructure, the energy sector has special requirements for secure information and data exchange. With “REVIVE,” Axpo Systems provides a crisis management platform specifically developed for this sector. Threema OnPrem serves as the central communication module.

Follow us

Threema

Made in Switzerland © 2026 Threema GmbH.