Menu

M2M FEATURE NEWS

This (Instant) Message Will Self-Destruct in Five Seconds

By Richard Grigonis April 17, 2008
This message will self-destruct in five seconds… became a household expression as a result of the famous 1960s TV series Mission Impossible. (It was, at a million dollars an episode, the most expensive TV series of its time.)
 
Decades later, when the hit series became a series of three successful movies, Mobilink debuted an innovation called G:i:30, which enabled subscribers to send self-destructing SMS (Short Message Service) messages. This service was done in association with the movie Mission Impossible III. Mobilink billed it thusly: “G:i:30 is So Secure — It Self Destructs.” The message automatically disappeared from the recipient’s phone 30 seconds after delivery.
 
In late 2005, a U.K. company, Staellium, took this idea quite seriously, and started up its StealthText service, available only in the U.K. Users could send incriminating text messages with aplomb, thanks to the service’s ability to obliterate the message after being read. Users had to download and install a small software client application that would run on a WAP-capable phone. (The recipient didn’t need to download any software client and would receive normal text containing a link to the actual message. Upon viewing the message, it disappeared after 40 seconds.)
 
Users could buy a bundle of 10 such self-destructing “time bomb” messages for £5.
 
And now, BigString Corporation today unveiled a new self-destructing instant messaging technology that enables users to send instant messages (IMs) that self-destruct after being sent. Additionally, IMs sent via BigString’s service cannot be copied, logged or screen-printed. BigString IM is a free advertising supported, service available at www.bigstring.com. It is available as a web version or as a free plug-in for AOL’s AIM.
 
The patent-pending technology leaves no trail or copy of the IM on any server once the message self-destructs. The time for self-destruction is set by the sender, and can be set to disappear in as little as a few seconds to over an hour. The sender can also choose a number of visual effects for the self-destruction. A message will disappear in real time simultaneously from both the sending and receiving IM screens.
 
“We have become so complacent about texting, chatting and gossiping online that we have forgotten that our conversations might be stored and archived forever. Just ask a politician like New York Governor David Paterson, a celebrity like Charlie Sheen, or the American Idol contestant whose private pictures were spread around the Internet against her will. That’s why we created an application that now gives consumers back their privacy and control,” said Darin Myman, President and CEO of BigString. He added that, “‘Going BigString’ gives you the ability to have a private and secure online conversation with the peace of mind that it will disappear at the exact time you chose.”
 
Recent surveys indicate that more than 70 percent of Internet users use some form of IMing with over 25 percent using a form of IM at work. “This makes the secure concept of ‘Going BigString,’ a natural for all those communicating in real time online,” stated Myman.
 
Richard Grigonis is Executive Editor of TMC’s IP Communications Group. To read more of Richard’s articles, please visit his columnist page.
 

Don’t forget to check out IoTevolutionworld’s White Paper Library, which provides a selection of in-depth information on relevant topics affecting the IP Communications industry. The library offers white papers, case studies and other documents which are free to registered users. Today’s featured white paper is Best Practices for Implementing a First Contact Resolution Program in the Contact Center brought to you by Enkata.

Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Executive Editor, IP Communications Group

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More