I wasn't able to readily find a "show it to me," but the Enterprise page has a vimeo so I'd guess it's similar enough to the non-Entetprise versions: <a href="https://wickr.com/wickr-how-to-enterprise-end-user-features/" rel="nofollow">https://wickr.com/wickr-how-to-enterprise-end-user-features/</a><p>The Pro page <<a href="https://wickr.com/pro/" rel="nofollow">https://wickr.com/pro/</a>> has a comparison PDF showing how it stacks up against Signal, Slack, WhatsApp, etc <a href="https://wickr.com/wp-content/uploads/2021/01/Wickr-Pro-1.pdf" rel="nofollow">https://wickr.com/wp-content/uploads/2021/01/Wickr-Pro-1.pdf</a>
From the Product Page [0]: "AWS Wickr encrypts every message, call, and file with a proprietary, 256-bit end-to-end encryption (E2EE) protocol. No one but intended recipients can decrypt them, reducing the risk of person-in-the-middle (PitM) attacks."<p>Why do we need proprietary protocols for this?!<p>[0] <a href="https://aws.amazon.com/wickr/" rel="nofollow">https://aws.amazon.com/wickr/</a>
"Now even AWS can decrypt your data."<p>Even if AWS is served a warrant? Excuse me if I choose to wait and see on this one, especially when there are better zero-knowledge solutions (like wire.com) out there.