Whatever reliable method of information transmission you are using, if you want to stay sufficiently secured, it is better to use several ways of data transmission disrupting its continuity. For instance, if you need to send a combination of a password and login, you should use one communication channel to send your login and choose a different one when sending a password.
This is where one-time-use notes come into play. Privnote is one of the most popular services of this kind to date.
Privnote allows users to send one-time-use notes that self-destruct after being read. Using Privnote is very easy: you create a note, receive a link for one-time reading and send it to the recipient.
Though Privnote is an old and recognized service, we will not trust it with all the information we have, its sole task is to break the information chain. Thus Privnote is kept out of the information chain, also removing your message from the correspondence.
Take a closer look at the link, it consists of the address of the website/note’s identifier#user’s decryption key. A user’s decryption key is stored in the link in the form of anchor. Anchor is the part of URL that follows the crosshatch # character in the link and is never sent to the server (RFC by URL http://www.faqs.org/rfcs/rfc1808.html, Section 2.4.1). Browser doesn’t send this part of the link, and server doesn’t receive it, as a result, the decryption key is kept on user’s computer until he or she wishes otherwise. In theory, Privnote’s owners are unable to decrypt your note.
Interview widget: Do you use one-time-use note services?
Let me show how Privnote can be used in more detail. Suppose, you want to send a person’s phone number and some information without leaving any traces of this data in your correspondence.
You send the recipient the following “Don’t forget to call me tomorrow https://privnote.com/9qn1wkwq#Kuz62vdzL Ivan.”
When clicking the link, the recipient sees the note.
Or suppose, you need to send confidential data to enable connection to the server. You can use the instant messaging service Telegram to send the port, IP address and login and Privnote – to send the password.
You send the following “126.96.36.199 port 17893 login root password https://privnote.com/9qn1wkwq#Kuz62vdzL".
Even if someone else snoops on your correspondence, it will be revealed at once since the recipient won’t be able to access the one-time-use note that has been read before.
If malicious intruders access your correspondence, for instance, if your device gets stolen, they won’t be able to recover its content fully as a Privnote note self-destructs immediately after being read.
Privnote is very popular with blackmailers since the evidence and incriminating material self-destruct after being read. The perpetrators would use URL shortening services like Bitly to make sure the correspondence doesn’t contain even the links to Privnote.
The shortened link is afterward removed through the service where it was created, and as a result, the victim is left only with an ineffective link of the URL shortening service. There is very little chance that police will consider this kind of evidence.
TipDisrupt the continuity of information using one-time-use notes by Privnote or analogous services.
For added security, Privnote allows you to protect your notes with a password by enabling this option in the settings when you create your message. Use an alternate method to transmit the password to your note, for instance, by phone. If you are sending it along with the rest of the message, you basically render your password useless. Make sure to add this tool to the bookmarks of your browser and start using it.<