Not exactly about books, but it’s New Years Day and the pickins are slim. (See also, Slim Pickens)
MANY MYSTERY AND spy movies are based on the premise that you can send messages that self-destruct, but you don’t need to be an international secret agent to do the same with your own texts.
In fact, most popular chat apps now include some kind of disappearing message feature—which means that if you don’t want a permanent record of your conversation, you don’t have to have one. In fact, encrypted messaging app Signal made its disappearing message feature the default.
While it’s handy to have chat archives to look back on for sentimental and practical reasons (recipes, addresses, instructions, and more), there are other times you’d rather nothing was saved. Here’s what to do.
There is a caveat here for all of these apps, in that the people you’re communicating with can take screenshots of what you’ve said—or, if screenshots are blocked, they can take a photo of the screen with another device. Some of them promise to notify you if your messages have been screenshotted or downloaded, but there’s always a workaround. That’s something to bear in mind when choosing who to chat with and how much to share.
The disappearing messages feature in Signal is an option for every conversation you have, and now it’s available by default or by an individual conversation: You can switch between disappearing messages and permanent messages at any time in any thread. To do this, tap the top banner in any thread, then pick Disappearing messages.
You can choose anywhere from one second to four weeks for your messages to stick around after they’ve been viewed (or choose Off to disable the feature). You can even set a custom timer—you could tell a message to be gone in 60 seconds. An alert appears in the chat whenever you’ve changed this setting, and anything you send from then on follows the rules you’ve set.
To set a default expiry time for messages in all your chats, open the main app settings page and choose Privacy and Default timer for new chats (under Disappearing messages). This applies to every chat you initiate from then on, not to the existing conversations on your phone.
. . . .
Instagram has now gone way beyond photo-sharing to cover Snapchat-style stories, direct messaging, and more. The direct messaging component lets you send photos and videos that stay on record or disappear once they’ve been viewed, though text always stays in place.
Head to your conversation list in the Instagram app, then open the thread that you want to send the disappearing message to (tap the compose icon, top right, if you can’t see it). Tap the camera icon on the left of the compose box and capture the photo or video you want to send.
Down at the bottom of the screen, you’ll then see various options for what you’re sending: View once, Allow replay (which is really view twice), and Keep in chat. Pick whichever you prefer before confirming with the Send button.
Link to the rest at Wired
Security by obscurity is far from a foolproof solution, but if PG were planning to send a bunch of secret messages, he would be inclined to set up a bunch of free email addresses for the purposes of both sending and receiving secret messages.
PG and his secret correspondent would each write their secret message offline, then encrypt the message offline using one of many open-source encryptions programs then send the message to one of the free email addresses.
PG would identify each free email address with a common name like Jim or Becky and provide his correspondent with the list.
In each encrypted email, PG and his online correspondent would mention one of the names in an offhand manner like, “I think Jim might be interested in seeing this.” The friend’s name (or the name of the last friend mentioned in the email) would identify the next email box to be used to send/receive the next encrypted message.
A variation on this system might involve setting up several free email addresses to automatically forward messages to other free email addresses.
Using both US-based email services as well as non-US email services would make tracking messages even more difficult.
Every couple of weeks, PG would create an entirely different set of free email addresses and send the encrypted list to his correspondent. PG might also be inclined to send out encrypted garbage to a whole bunch of email addresses that weren’t his intended recipient.
If PG and his correspondent were able to use computers at various locations and connecting to different Internet Service Providers, more obscurity would result. Throw a VPN with multiple nodes in multiple countries and rotating VPN locations increases the complexity of interception.
PG is informed that large government agencies are capable of cracking a great many encryption algorithms. One reason why PG would be inclined to use open-source encryption is that the source code is available for all to see for debugging and security-checking purposes. This doesn’t mean that open-source encryption can’t be cracked, but with many eyes watching (unlike the situation with encryption software than is not open-source) any cracking weaknesses in the open-source system are probably more susceptible discovery than a black-box encryption program.
Again, PG understands that a super-duper-mega-encryption system created by geniuses is the single best way to communicate confidentially, but demonstrating that such a system is uncrackable is quite difficult, perhaps even impossible.
PG expects that some of the visitors to TPV are far more fluent on this topic than he is and is happy to hear critiques, comments, etc., from one and all.