This post will self-destruct in five minutes

Summary:The technique combines encryption and peer-to-peer technologies. A message encrypted with a public key is then timed to re-encrypt at a specific point, and then all copies run through the Vuze BitTorrent hash table.

Not really. But future posts might.

It's all thanks to a technology called Vanish, now being perfected at the University of Washington. Once made part of a Firefox plug-in, as planned, Vanish will let users not only set the destruction of messages, but erase every cached copy as well.

The technique combines encryption and peer-to-peer technologies. A message encrypted with a public key is then timed to re-encrypt at a specific point, and then all copies run through the Vuze BitTorrent hash table.

The current system supports time-out periods of 8-9 hours, although that can be adjusted.

The lead designer of Vanish is Tadayeshi Kohno, an assistant professor at the University of Washington. He was assisted by department chair Hank Levy, graduate student Roxana Geambasu, and undergraduate Amit Levy.

The technique, once perfected, could have wide application. Even someone with a warrant could not take back a Vanished message. Spies could send one another messages with full security, even against audit trails. So could corporate spies.

How will you use it?

This post was originally published on Smartplanet.com

Topics: Innovation

About

Dana Blankenhorn has been a business journalist since 1978, and has covered technology since 1982. He launched the Interactive Age Daily, the first daily coverage of the Internet to launch with a magazine, in September 1994.

zdnet_core.socialButton.googleLabel Contact Disclosure

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.