Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Communications Security

This Text Message Will Self Destruct 233

mwilliamson writes "Silicon.com is reporting that Staellium UK (cell provider) has created a protocol in which text messages disappear after 40 seconds. This, of course, relies on the implementation of the protocol in the device used to display the message. They're touting a future roll out for photos as well, and service in the US."
This discussion has been archived. No new comments can be posted.

This Text Message Will Self Destruct

Comments Filter:
  • One more reason... (Score:5, Insightful)

    by Gruneun ( 261463 ) on Monday December 12, 2005 @03:13PM (#14240521)
    As if the average person wasn't already running under the assumption that they were somehow anonmyous in their electronic communications. Frankly, I wouldn't knowingly buy a phone that implemented this protocol and didn't allow it to be toggled.
  • Oh, goodie ... (Score:5, Insightful)

    by kitzilla ( 266382 ) <paperfrogNO@SPAMgmail.com> on Monday December 12, 2005 @03:15PM (#14240535) Homepage Journal
    ... a new messaging protocol demanding my IMMEDIATE response. I don't have enough electronic intrusion from my cellphone and email already. This is great. My boss will love it.

    Text messaging reduced to the level of that arcade game where alligators poke up through holes, and you have to hit them on the head before they disappear. Maybe I can try this while driving, just to make it more interesting.

  • by Kjella ( 173770 ) on Monday December 12, 2005 @03:17PM (#14240550) Homepage
    FWIW, I just can't imagine that people are SMS'ing proprietary information. If its private and confidential, keep it on paper (preferably typed with a typewriter). Digital information will always be too insecure.

    While it should be kept under lock and key, have you any idea how much sensitive information is stored digitally? I think you would find that going back to a paper-based society (we're talking pre-1970s terminals here, people) would be very cumbersome. Just keep a sense of proportion, I mean we have your average consumer desktop (hereby referred as 'zombie') and we have the Pentagon's server with the nuclear launch codes. Somewhere in between you should find appropriate security for your digital information.
  • by dada21 ( 163177 ) * <adam.dada@gmail.com> on Monday December 12, 2005 @03:17PM (#14240558) Homepage Journal
    I guess I shouldn't be surprised at the ineptitude of general humanity. What is the point of having any passwords if people don't keep them at least minimally protected? Sheesh!

    The only thing I use SMS for is contacting my employees that overslept, communicating with friends, using Google for SMS and looking up prices (froogle etc). Sending proprietary information using a text messaging service is crazy.
  • by billybob2 ( 755512 ) on Monday December 12, 2005 @03:21PM (#14240586)
    Richard Stallman correctly predicted this was going to happen as a result of of DRM, also known as Digital Restrictions Management, Treacherous Computing, or Handcuffware. To quote from his essay "Can you trust your computer? [gnu.org]":

    ...There are plans to use the same facility for email and documents--resulting in email that disappears in two weeks, or documents that can only be read on the computers in one company.

    Imagine if you get an email from your boss telling you to do something that you think is risky; a month later, when it backfires, you can't use the email to show that the decision was not yours. "Getting it in writing" doesn't protect you when the order is written in disappearing ink.

    Imagine if you get an email from your boss stating a policy that is illegal or morally outrageous, such as to shred your company's audit documents, or to allow a dangerous threat to your country to move forward unchecked. Today you can send this to a reporter and expose the activity. With treacherous computing, the reporter won't be able to read the document; her computer will refuse to obey her. Treacherous computing becomes a paradise for corruption...
  • I predict (Score:5, Insightful)

    by this great guy ( 922511 ) on Monday December 12, 2005 @03:25PM (#14240625)

    I predict:

    • bad implementations which will only delete the message's metadata instead of the data itself (which will remain visible in the memory chip, and forensic investigations will be able to recover deleted text messages)
    • hacked phone firmwares that will violate the protocol by allowing users to prevent the deletion
    • people who will think this technology is secure but will realize later how easy it is to circumvent

    From my personal point of view this "auto descruction" feature should only be seen as a convenience where phones autodelete messages to keep enough free memory space.

  • by metlin ( 258108 ) on Monday December 12, 2005 @03:29PM (#14240660) Journal
    Am sure almost every article on Slashdot was "reported" elsewhere beforehand.

    That is not the point. Some of us simply don't have the time to check a million other websites, instead we use Slashdot and a handful few others that can filter out stuff of interest.

    Maybe if you subscribed to a couple of hundred tech-blogs, you might end up knowing half the headlines on Slashdot. But it's much easier to just read it on Slashdot, in one place, when I can be sure that it will eventually show up.

    It was a couple of days late. So what? By the time the service would be available, it would be more than a few days later.

    I do not understand this obsession with, "Oooh, I saw this on $foo 32 minutes and 23 seconds ago. Slashdot is SLOWWWWWWWWWWW."

    Big deal. Some of us don't really care, as long as we hear about it somehow. Slashdot is primarily a forum, if you are a news junkie, look at other sources.

    *shakes head*
  • by Shakrai ( 717556 ) on Monday December 12, 2005 @03:36PM (#14240713) Journal

    Just as governement agencies can request your telephone records if you call someone with a death threat (now, in complete secrecy, whether or not you've violated the law), it's hard to imagine them not being able to acquire the same kind of information from the service responsible for routing them.

    So the protocol would force the message to be deleted off the headset but the network would retain a copy? Kinda defeats the purpose of the security doesn't it?

    Do the cell networks even keep a copy of normal SMS traffic? Or do they just log the fact that an SMS message was sent for billing purposes (like normal phone records -- they don't log the call itself)? Do they even keep a record of who you send messages to or just a running count?

  • by Mr_Silver ( 213637 ) on Monday December 12, 2005 @03:41PM (#14240749)
    There is already support in the protocol for text messages which are never saved in the users inbox. These are generally called "flash sms" and, whilst not being quite the same, work close enough, are supported in the majority of handsets and is here today.

    Whilst I don't doubt that this kind of functionality has the potential to be good and bad - anything which requires support from the majority of vendors before it can be used will fail unless there is a significantly compelling reason to have it (eg. T9).

    I don't see this as being quite in the same league as T9 though.

  • Re:How appropriate (Score:3, Insightful)

    by TubeSteak ( 669689 ) on Monday December 12, 2005 @03:41PM (#14240750) Journal
    Once a message has been sent, the recipient receives a text notification showing the sender's name and providing a link to the message.

    I don't think they actually send you the text message. My guess would be that it's stored on their server (better have a WAP data plan) and they just tell you it's there.

    The whole "40 seconds" thing is most definitely a lie. I'm sure England has data-retention laws specifying a minimum length the company must hold the message contents. (hint hint, just because you delete your voicemail, doesn't mean it's gone)

    But... if they use a "private" flag & it relies on cooperation from clients, then it is broken.
  • by aardvarkjoe ( 156801 ) on Monday December 12, 2005 @04:00PM (#14240906)
    To prevent this, call the following number from your cell phone: 888-382-1222. It is the National DO NOT CALL list. It will only take a minute of your time. It blocks your number for five (5) years.
    Although the do not call list helped for a little while, all of the companies get around it now by "taking surveys" -- generally, their survey consists of saying "Do you want to buy overpriced product X?" Until the "do not call" really means "do not call," these lists aren't going to do anything. Of course, you should sign up anyway, so that you can at least file complaints when they call you.

    Until then, I recommend that everyone at least attempt to waste as much of the telemarketer's time as possible. Act interested without agreeing to anything, and ask lots of questions. Sure, it's a pain, but I would bet that if even five or ten percent of people did it, telemarketing would become so unprofitable that they would at least have to change their tactics.

  • by abulafia ( 7826 ) on Monday December 12, 2005 @04:56PM (#14241376)
    So, someone sends me one of these messages. That means I have 40 seconds to pull out my other phone and take a picture of the message.

    Anyone depending on this for any real "security" is an idiot.

  • by karstux ( 681641 ) on Monday December 12, 2005 @06:00PM (#14241953) Homepage
    Why not set up internal Jabber and/or IRC servers? If you can give (and demonstrate) a reasonable alternative to ICQ etc., and present your concerns along with that, surely your opinion will be weighing much more heavily.

An authority is a person who can tell you more about something than you really care to know.

Working...