Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

5/6/2010
11:01 AM
Keith Ferrell
Keith Ferrell
Commentary
50%
50%

VaporStream Takes E-mail "Off The Record"

Not every e-mail needs to be part of the permanent record -- which is the point VaporStream is making with 256-bit encrypted "vanishing" e-mail service. Could be just what the doctor ordered for dealing with e-mail overload -- although more than a few divorce lawyers and tabloid headline writers might disagree.

Not every e-mail needs to be part of the permanent record -- which is the point VaporStream is making with 256-bit encrypted "vanishing" e-mail service. Could be just what the doctor ordered for dealing with e-mail overload -- although more than a few divorce lawyers and tabloid headline writers might disagree.The pitch VaporStream is making for its e-mail service is that business communications need to be fast, secure and confidential -- but not necessarily permanent. And the relative permanence of traditional e-mail (not to mention the ease with which they are copied, forwarded, shared -- increases the risks that confidential information will leak, that compliance regulations will be violated, that companies may be embarrassed by content intended for one set of eyes only.

Not to mention the expense and headaches of dealing with, managing, organizing and archiving huge volumes of e-mail.

The company's "Electronic Conversation" approach shifts e-mail to privileged, encrypted communication between authorized sender and authorized recipient -- and no one else. Like traditional e-mail, the message remains in a queue until read. Unlike traditional e-mail, the mail vanishes after reading.

The level of encryption satisfies HIPAA compliance requirements ( VaporStream notes that: "There is no HIPAA or other legal requirement for saving all communications!You don't have to keep everything"

VaporStream mail cannot be saved, cc'd, copied, forwarded or printed; message head and body are separated in transit; encryption and message reside in RAM.

Pricing for the service begins at $7.50 per month per customer, with enterprise-level pricing quotes available on request. A free trial is available (registration required).

Take a look at the service and let me know what you think. Like I said, I can't imagine divorce lawyers and tabloid scandal-hunters will be thrilled if VaporStream's approach catches on, and I can only imagine the potential for both abuses of the service and, potentially, official (on some level or other) insistence that disappearing e-mail "just isn't right."

It'll be fun to watch the developments -- and to see how much an impact vaporStream's approach has on our clotted e-mail queues.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 9/21/2020
Cybersecurity Bounces Back, but Talent Still Absent
Simone Petrella, Chief Executive Officer, CyberVista,  9/16/2020
Meet the Computer Scientist Who Helped Push for Paper Ballots
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Exactly
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24619
PUBLISHED: 2020-09-22
In mainwindow.cpp in Shotcut before 20.09.13, the upgrade check misuses TLS because of setPeerVerifyMode(QSslSocket::VerifyNone). A man-in-the-middle attacker could offer a spoofed download resource.
CVE-2020-8887
PUBLISHED: 2020-09-22
Telestream Tektronix Medius before 10.7.5 and Sentry before 10.7.5 have a SQL injection vulnerability allowing an unauthenticated attacker to dump database contents via the page parameter in a page=login request to index.php (aka the server login page).
CVE-2020-7734
PUBLISHED: 2020-09-22
All versions of package cabot are vulnerable to Cross-site Scripting (XSS) via the Endpoint column.
CVE-2020-6564
PUBLISHED: 2020-09-21
Inappropriate implementation in permissions in Google Chrome prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of a permission dialog via a crafted HTML page.
CVE-2020-6565
PUBLISHED: 2020-09-21
Inappropriate implementation in Omnibox in Google Chrome on iOS prior to 85.0.4183.83 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.