Feeds

This SMS will self-destruct in 40 seconds

StealthText

Designing a Defense for Mobile Applications

A UK developer has come up with a "self-destruct" text messaging service it hopes will prove a hit with both businessmen dealing with sensitive information and celebrity love cheats. StealthText from Staellium UK is positioned as a means to give a sender control over text messages they send instead of relying on a recipient to delete it, something Rebecca Loos conspicuously failed to do with messages from David Beckham, resulting in much embarrassment for the metrosexual football icon last year.

StealthText deletes SMS messages 40 seconds after they are read, a technology Staellium compares to the destruction of instructions played by agents in the Mission Impossible TV series and movies. Users of the service need to have a WAP-enabled mobile phone though only those sending texts need to download a StealthText applet. Message bundles cost £5 for 10 secure messages and the service is only available to users of UK SIM cards. Users can sign-up by texting STEALTH to 80880.

Once a message has been sent, the recipient receives a text notification showing the sender’s name and providing a link to the message. Once opened, the message will disappear after around 40 seconds.

To comply with legal requirements, even after a message is deleted from the recipient's phone, the 'paper trail' and log stays on a secure server. To prevent abuse, the recipient has no access to the server. Recipients can reply with StealthTexts (after signing up to the service themselves), creating a private channel of two-way communication.

Carole Barnum, chief exec and co-founder of Staellium UK comments, "The ability to send a self-destruct message has massive benefits for people from all walks of life, from everyday mobile users, through to celebrities and business people, but this is just the start. In spring 2006 we will be launching new services such as self-destruct email, voice and picture messages, so ultimately no one will ever have to worry about their messages or pictures ending up in the wrong hands ever again."

Staellium UK plans to make its StealthText service available across Europe, in the US and Asia early next year. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Scotland's BIG question: Will independence cost me my broadband?
They can take our lives, but they'll never take our SPECTRUM
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
NBN Co adds apartments to FTTP rollout
Commercial trial locations to go live in September
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
What FTC lawsuit? T-Mobile US touts 10GB, $100 family-of-4 plan
Folks 'could use that money for more important things' says CEO Legere
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.