Owing to the rise of privacy concerns in the 21st Century, self destructive messages have gained popularity. Snapchat is one such photo messaging platform, and has become the third most popular app among millennials.
A number of ephemeral messaging apps have been seen after Snapchat caught up, Facebook too plunged into this area with its ‘Slingshot’ app. But how long will this trend really last? While there’s still time to get that answer, a Denmark based startup has introduced self destructing email in a service called GhostMail.
GhostMail is a web based military grade encrypted secure email & chat provider. It is a cyber security company, specializing in secure and private encrypted communications. The company claims that users can select the duration of till when will the email sent by them will exist in the recipient’s inbox.
The website offers free registration for interested users. Some of its features are as follows:
- Self Destructive Emails- The sender can choose to activate the self destruction feature, which will destroy the email once it has been read by the receiver.
- Two Factor Login- This feature requires the user to login using a mobile device in conjunction to the users primary password. The second password verification step reduces the risk of unauthorized access.
- Incognito mode- Users can sign up with any username without giving any personal details.
- Bunker Protected- The servers are placed in a high-tech Swedish nuclear bunker 30 meters under bedrock.
- High Frequency Erasing- Company’s HFE algorithm is constantly deleting emails, data and information from the servers.
Although Ghostmail is relatively a new concept, there are certain challenges which question the necessity and its usability spectrum. For example, the authentication of secure data elopes when we see the possibility of taking a print of the mail or a screenshot of the same.
Further to the aforementioned mentioned loophole, the incognito feature makes the technology even more vulnerable to misuse, especially by anti-social elements like terrorists, insurgents etc. Also, this feature opens a gateway for secret organizations which are involved in manipulating classified Government information. While the concept is certainly interesting, its use-cases and security still need to evolve for it to be worth pursuing.