GeekITDown Computer Services

  • Home
  • Contact GeekITDown
  • GeekITDown Reviews
  • Checkout
  • Cart
© 2022 | GeekITDown. All rights reserved.
Call Us
352-366-1316
Sign in

Sign in

GeekITDown Computer Services & Technology Solutions
0
  • Home
  • Reviews
  • Blog
  • Services
  • Contact
GeekITDown Computer Services & Technology Solutions

Burn Note Messages Self Destruct To Maintain Privacy

Home / Blog / Cloud Computing / Burn Note Messages Self Destruct To Maintain Privacy
By chief_geek

Burn Note

This message will self destruct in 3..2..1.! At least that’s the premise of Burn Note, a cloud based message service that sends messages between parties and deletes them after they’re read.

Burner Messages

Each message sent through Burn Note can be read only once. After which the message is deleted and essentially burned out of existence. Similar to burner phones where they can be discarded after single use, Burn Note messages are definitely deleted after a single read.

Notes are deleted either manually by the recipient or immediately upon navigation away from the message page. Senders have the option to set a timer on messages to further control the burn time. Burn Notes which go unread are automatically discarded after 72 hours.


Features

Burn Note is clearly meant as a security tool for sending sensitive and secure information between parties. To that end, other features are in place to ensure Burn Note remains as secret and secure as possible.

Short Phrases for example, makes copying and pasting of message contents impossible and makes taking screenshots of the message unbelievably troublesome, especially if the message has a short timer. Messages are broken down into snippets which appear individually on screen and rotate in order, every couple seconds.

The Spyglass feature hides the message entirely. Recipients can view the note by clicking and dragging a simulated flashlight across the screen to reveal the contents of the message.

Senders also have the option of placing their own password on the message for added security. Pending messages are stored encrypted on Burn Note servers and communication with Burn Note is done through 256 bit SSL encryption.

For the exceptionally security conscious, Burn Note provides detailed technical information about their storage and encryption methods on their website. Burn Note seems to have every angle covered aside from screen recording which is somewhat out of their control.

Summary

While not everyone will need Burn Note services, there is certainly a need for it. The internet is a wild west environment with unknowns around every corner. Sending information can be a somewhat unnerving process, but through Burn Note users can feel confident every precaution is being taken to protect their message data.

Aside from the obvious sharing of information between parties, we found this cloud tool to be somewhat fun which is hard to accomplish when utilizing security measures. Burn Note is great for spies or friends who just want to have a private undocumented conversation.

Nifty Websites Collection Burn Note

Visit Burn Note

If you enjoyed or found this article useful, please show us some support by liking us on Facebook or by sharing us on your favorite social website. Thanks!

Make Your Website Part Of The Nifty Collection

21
Like this post
  • Previous PostBrand Recognition Logos From GraphicSprings
  • Next PostTask Management From Wunderlist Syncs Everywhere

Related Posts

How To Create Microsoft Office Documents In The Cloud

Evernote Advanced Tips Unleash Your Inner Elephant

How To Setup A Catch-all Email Address

App Roundup: Toy Story Live Wallpaper

1 Comment

  1. Nifty Websites Collection [October 22, 2012] | GeekITDown
    Reply
    3 January 2014
    Reply

Leave a Reply (Cancel reply)

Your email address will not be published. Required fields are marked *

*
*

Services

Business Tech Services

Dedicated Backup Services

Home Computer Repairs & Services

Website Design

Information

352.366.1316

GeekITDown on Google

Stay Connected

© 2023 | Website by GeekITDown

Copy