Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy

Self-Shredding E-Mail 210

yoink! writes: "I just read an article on CNN.com describing a self-shredding e-mail system. With all the persistent e-mail documents gathered by the Government in the MS Anti-Trust case, and the massive shredding of paper documents by parties in the Enron fiasco, it's no wonder people have been looking for an electronic solution to a material problem solved years ago with some cutting tools, a motor, and a garbage bag." One of the companies highlighted here was called Disappearing, Inc. when it was mentioned a few years ago, but now several others have joined the fray.
This discussion has been archived. No new comments can be posted.

Self-Shredding E-Mail

Comments Filter:
  • It might end at computer shredding software it doesn't like. ;)
  • Common sense? (Score:4, Insightful)

    by Em Emalb ( 452530 ) <ememalb@gmaPARISil.com minus city> on Monday February 18, 2002 @10:42AM (#3026346) Homepage Journal
    How bout not sending anything that could get you in trouble? Common sense should prevail here. But in the wake on Enron, I am sure they will do well.

    One thing I did not see in the article, what happens if the person on the other end saves the email as an attachment, or saves it? I doubt it would be able to "shred" that. This is a very niche market item imo. Once again, DON'T SEND IT IF IT COULD GET YOU IN TROUBLE.

    • Re:Common sense? (Score:5, Interesting)

      by sql*kitten ( 1359 ) on Monday February 18, 2002 @10:55AM (#3026407)
      How bout not sending anything that could get you in trouble? Common sense should prevail here. But in the wake on Enron, I am sure they will do well.

      There's a scene in Cryptonomicon in which Avi (I think) explains that important discussions have to take place between only two people at a time, so there is plausible deniability and nothing to subpoena.

      This is why, even when email, videoconferencing and even faxes are widespread, nothing will ever replace face to face meetings for serious business.
      • "Two people can keep a secret... but only if one of them is dead"
      • Re:Common sense? (Score:3, Interesting)

        by Rogerborg ( 306625 )
        • that important discussions have to take place between only two people at a time, so there is plausible deniability and nothing to subpoena

        Here's an anecdote to back that up. I used to work for a company that did CGI, mostly for games. They were informed by a man-who-knew-a-man that Paramount needed some CGI for a some Star Trek game. Tiny problem:

        • Paramount are savagely protective of their IP.
        • They are pathologically opposed to licensing any reproduction of their IP, in even the most limited form. They especially do not want to give even temporary licenses to little "wannabe" subcontractors.
        • To protect their trademarks, they have to be seen to be prosecuting any violations.

        So, farcically, the whole thing was carried out by cryptic phone calls (from home numbers, more often than not) or face to face. No email, nothing in writing, no hard requirements, no direct references to any contract, expressed or implied, on the phone, in case the other side was recording it. Paramount needed plausible deniability that they even knew my employer was producing this stuff, as they would have to be seen to prosecute them, even though they (as represented by a middle manager) were informally soliciting the work.

        So my employer put about a man year of work into producing a test sequence based on a guess of what Paramount might want (made for some happy animators, mind you), then it was taken by hand to Paramount to be viewed by a mid level peon, without even so much as a record of the appointment or meeting.

        My employer lost the "bid". It was made clear to them (face to face) that they should under no circumstances account for the work as being to do with Paramount or Star Trek. They gambled a man year of work, lost, and then had to scam their own shareholders by cooking the books to cover it up.

        With my hand on my heart, this is the honest truth. It's probably not even the whole truth, I only heard the stuff that got filtered through our bid manager.

        So, yes, even legitimate businesses have a desire for self destructing messages. I won't say a "need", because the whole process was a farce. But just because it's dumb doesn't mean they aren't begging for it like a drunk soaped up cheerleader in a post-football shower (sorry, I just needed to get the bad taste out of my head).

    • Re:Common sense? (Score:2, Insightful)

      by lawyamike ( 199551 )
      In most cases, one is not able to contemplate whether the content of an e-mail will cause trouble for the sender.

      Sure, there are easy cases: Bill Gates should not have sent e-mails about destroying Netscape, and all corporate officials should receive training in which buzzwords will always set off antitrust alarm bells.

      That said, what about the cubicle monkey who sends pricing information that is unwittingly the focus of a Patman Act claim? Or the secretary who sends along an agenda and participants at a meeting between competitors? The point is, almost anything can be identified as worrisome ex poste. An auto-shredding system -- properly implemented -- is a good fail-safe.

    • Yet again, someone with little real-world experience reduces this to a simple moral issue. The comment of "If you don't send anything incriminating, you have nothing to fear" demonstrates only that the speaker has never been on the receiving end of a subpoena.

      I'll say it once more, in simple language, for everyone who hasn't been in this situation, so pay attention.

      A document retention policy (with document destruction schedules) is necessary even for a company that adheres strictly to the moral "up-and-up" to prevent lawsuits from inflicting huge cost and manpower burdens. For example, let's assume that you keep your records forever, so you have five year's worth of emails. Let's also assume that you don't have anything incriminating in these emails. Someone presses a sexual harassment lawsuit against you and subpoenas all of your email records relating to the lawsuit. Now, even though you didn't do or say anything wrong, you (not they) get to pay your IT person to dig through every email sent by every employee for five years (and an attorney to sit with him/her, fending off the plaintiff's attorney, who will also insist on sitting with him/her) just to prove that there's nothing there that relates to the lawsuit. Sounds expensive, doesn't it? With a retention policy that says email is to be destroyed after six months, you can answer the judge by saying, "our policy for email includes destruction after six months, so we have no records farther back than that" and thereby limit the scope of a subpoena (and the time and money spent fulfilling it). There are other reasons, including taking comments out of context and such, but as you can see, even companies with a perfectly sterling record benefit from such policies.

      Virg
  • I think that instead of devising ways to destroy damaging emails that you send we should instead focus on not sending damaging emails. Bill Gates sent out memos that the DOJ is now using against him. That'll teach him. If you have something that important to say it's probably best said in person.
    • Re:Lessons Learned (Score:4, Insightful)

      by rarose ( 36450 ) <rob@robamy.cIIIom minus threevowels> on Monday February 18, 2002 @11:56AM (#3026677)
      My very first manager at my first real corporate job drilled into my head that you assume every email you write will be published in the paper... if you aren't comfortable with that then it shouldn't be said in email. It's a rule that's served me well...
    • instead of devising ways to destroy damaging emails that you send we should instead focus on not sending damaging emails.
      Especially since there is no way to prevent it. The article glibly talks about "disabling screen capture" -- how? Maybe on some closed proprietary systems you can; but if I'm on Unix, I can always grab a screendump using xwd (if on X11) or script (if using a plain text connection). They're being blinded by the paradigm of Windows, which is that the displaying program is completely responsible for printing/saving etc.

      How easily they forget the fundamental axiom of copy protection: if the user can see it, the user can record/copy/save it.

      I could just point a camera at the screen and take a picture....

  • It won't work... (Score:3, Insightful)

    by jnievele ( 469461 ) <juergen@nieveler.web@de> on Monday February 18, 2002 @10:45AM (#3026363) Homepage
    People still will be able to print out messages, or make screenshots of their MUA - ESPECIALLY when they know that the mail is going to self-destruct. So these expensive systems still won't guarantee against a copy surviving (especially if it's something hot that could be used to blackmail somebody, such as the order to shred all records...).

    In short: Why waste money on a system that prevents Email from getting read by Law-enforcement-officers? Why not simply do nothing illegal? ;-)
    • Sure it'll work. I'm just look at Adobe - you can protect PDF documents from being copied, printed, used in other applications... er... wait a minute. Nevermind.

    • by InsaneGeek ( 175763 ) <slashdot@insaneg ... BSDcom minus bsd> on Monday February 18, 2002 @11:15AM (#3026501) Homepage
      You need to look at what this is targeted at. It's not really for hiding anything illegal, most large companies would have used some form of crypto (having used PGP's Outlook plugin, you can't get much easier). But more for everyday things that really appear harmless, that come back and bite you. Best example off the top of my head:

      Microsoft subpoenaed Netscape for all those internal message board documents, saying how much better IE was than Netscape. Nothing illegal, but would have been great to be killed automatically, look at how much damage *legal* posts did.

      Now, someone actually subpoenaing a couple emails of printed off is probably very little of a concern, when compared to possibly gigs & gigs of emails laying around that can be subpoenaed and gone through, that would not only include the couple of printed emails already, but possibly even more.

      I look at it like security, just because the only truely safe system from network hackers is a unplugged system, doesn't mean I shouldn't throw in the towel and not secure the systems that are plugged in.
      • You need to look at what this is targeted at. It's not really for hiding anything illegal, most large companies would have used some form of crypto (having used PGP's Outlook plugin, you can't get much easier).
        Most large organizations handle the illegal stuff face-to-face among a limited group, usually off-site (there's a reason for all those "athletic club" memberships you know). It never gets put on paper.

        sPh

      • I do tech support in a legal department. I find that on average 15% of the users have a pst that's a gig. Of that 15%, 33% are over 2 gigs. It's a given that everyone has an email storage problem because the average number of people that delete incomming mail after being read is less that 5%.

        shredding is a very legit concern. So many things are effected by storing email besides the 'bad' emails....increased storage, support, backup, etc....costs.
    • In a properly DRM enabled OS *Cough* such options simply won't be available for that particular window. In B2 OSes, covert channels (Whereby you copy information you are not entitled to copy) has always been a major issue and channels as esoteric as conveying information by varying processor load have been developed and presumably defended against. The difference in the past is that the machine has been a centrally administered box where it could be assumed that the administrator was a trusted party. In the new DRM paradigm, the administrator is considered a hostile entity not to be allowed full access to the hardware he purchased.
    • fill up your companys toner cartridges with disappearing ink. problem solved.

      Maybe i need to sell that idea to Dissapearing Inc. anyone reading this that works for that company? just don't want them to pay me with bills that were printed after the treasury starts using those toner cartridges. ;)

  • Outlook (Score:3, Funny)

    by Orre ( 452514 ) on Monday February 18, 2002 @10:47AM (#3026375) Homepage Journal
    Why not use outlook. It does that whenever it wants on my Unverity (randomly).
  • Snake Oil ? (Score:3, Insightful)

    by CaptainZapp ( 182233 ) on Monday February 18, 2002 @10:48AM (#3026380) Homepage
    I'm sure many corporate bigwigs would sure be happy, if some of their e-mails sent/received might have self destructed. (Kenny Boy and his Anderson crownies come to mind).

    I fear however that they might be in for a surprise when the apparently "self shredded" messages pop up at all those likely and unlikely places like backup tapes, swap files, printouts and the like.

    It's probably safer to employ a clean and transparent corporate culture, then getting kicked in the but by embarassing messages popping up on ol' backup tapes.

  • You give someone info, they have that info. Who cares for "remote cryptography keys" if you can keep the key. Or simply take a screenshot of the message.

    I see a point in digital shredding, and it's to not leak information by human mistake. But then if they're willingly keeping the info safe and not trying to copy it, wouldn't sending a URL suffice? When the document isn't needed anymore, you change the URL content to "Not here anymore, sorry."
  • by phil_atk ( 545228 ) on Monday February 18, 2002 @10:49AM (#3026386)
    Document destruction is very topical at the moment - but the question must ultimately be whether it is possible to destroy digital documents as easily as their paper counterparts?

    With a traditional document (esp. in the case of sensitive items) versioning is kept to a minimum, and hence the total destruction of a 'mail chain' would be possible. With digital documents it is too easy for multiple versions to exist - using the email example you could have multiple vendors and multiple sysadmins with mailbox backups, many of which could be unknown to the individuals concerned.

    With digital documents there will always be an tension between the desire to be able to fix a system that breaks (using backups) and to digitally shred sensitive items. This will probably mean that there will never be as much certainty with digital shredding as traditional shredding.

    • I have been looking at the Authentica [www.authentica-security]. It appears to me that Authentica's product (prominently mentioned in the article) has a lot of powerful access control features that address the issues in the above email, but offer no protection against a court-ordered review of email. In particular, Bill Gates can't use such systems to protect himself from legal review. Backups do not defeat the system because the emails are encrypted and can only be viewed using a secure viewer. According to a review:
      On the viewer side, recipients need Authentica's plug-in to Netscape and Microsoft browsers for viewing protected content....Authentica's plug-in...decrypts into protected memory, so that recipients never have direct access to decrypted content.
      The "mail chain" is not destroyed, but instead is made more explicit. Again, from the review:
      The "recall" name also refers to the user's ability to see what's been done with a specific piece of content. The system keeps a complete audit trail of all access and changes to rights and permissions.
      The person in charge of granting rights can apparently change them anytime in the future to either "unshred" a message or make an existing message unreadable even in the viewers mailbox:
      The person granting rights can change-and even revoke-privileges after content has been delivered.
      What I conclude from this is that even if the system works as designed (a big if), it is at most useful for protecting your documents against people who cannot influence the "person granting rights". In particular, this wouldn't seem to protect documents in a court fight. The judge could require that the person granting rights unshred the document and cough up the audit chain to see exactly who viewed it and when.
  • Honest men (Score:3, Insightful)

    by xenocide2 ( 231786 ) on Monday February 18, 2002 @10:50AM (#3026390) Homepage
    have nothing to hide. I don't think shareholders would see an email shredder as good news. Sure, you've reduced "liability," but you could further reduce it by having a higher set of moral codes. If I was a shareholder, I'd probably dump the company if news that the company needed to protect itself from itself.

    Its too bad that company execs won't see things that way. I guess the most valuable thing then to have as an investor is the list of Dissapearing, Inc's clients.
    • Re:Honest men (Score:3, Insightful)

      by zangdesign ( 462534 )
      Then explain why we have cryptography, steganography, spy agencies, wiretaps, etc.

      That's the same horsecrap argument right-wing Republicans have been using for years.
    • Re:Honest men (Score:5, Insightful)

      by Carmody ( 128723 ) <slashdot AT dougshaw DOT com> on Monday February 18, 2002 @11:14AM (#3026498) Homepage Journal
      "Honest men have nothing to hide."

      Not only is this statement false; it is dangerous.

      If an honest man comes up with a new, beautiful, invention, shouldn't he hide it until the patent forms come out?

      If an honest man writes a personal email to an honest woman, thanking her in detail for the honest sex they had last night, would he be suddenly dishonest if he didn't want those details accessible to any snoop a few years later?

      If an honest man writes an email to his honest colleague, and makes some honest fun about the way that his honest customer dresses, just the way that colleagues often jest and jape, is it that big a stretch that he wouldn't want that email to surface years later in some lawsuit?

      If you are living your life in such a way that you never write or say anything that you would like to keep private, I wouldn't call you "honest," I would probably call you "bland." And I don't believe that being bland is a virtue to which we should aspire.

      • I think you're missing the point. Privacy is one thing. Hiding your lawbreaking behavior from the government and your shareholders is a whole different ballgame.

        The real dangerous thing is the way many people advocate privacy while their intent is to shield criminal activity. That is what causes "if you're not a criminal, you've got nothing to hide" mentality in law-n-order types.
      • My apologies for using an overblunt quote. I mean that if you desire to hide something, the first step in hiding it is not publishing it. In all these things you have mentioned, the thing one desires to 'cover up' are actions, not thoughts. As for patents, some will argue that they're a bad thing nowadays; I will simply mention that 'patent pending' is an important phrase to inventors. How honest are these people that desire to hide their actions? Is there something wrong with them? It appears so. You can be honest without being "bland," it just takes more courage than these hypothetical examples apparently exhibit(Although I ponder the kind of man that thanks the woman the day after, in an email, no less).

        Perhaps a better phrasing would be "Men of honor are not afraid of the truth." But then, they say that men of honor are horribly out of fashion these days.

    • Erm, how about your latest, not yet patented invention?
      Or salary details? Or pretty much anything sensitive?

      Admittedly you'd be best off not sending these bits of information, but if you have to then you'd best protect it.

      On the other hand I for one can see no possible way a self shred system can work. Once you have information, it's yours. The original may be wiped, but you can use a screenshot, saved copy, hexeditor, memory dump etc etc
    • Honest men have nothing to hide...
      I try avoid being a toady for big corporate interests, even when they are signing my paycheck. However, this statement ignores three basic facts: (a) in the United States, anyone can be sued at any time for anything (b) in the United States, anyone can be indicted at any time for anything a District Attorney thinks it worthwhile to indict him for (and I guarantee that even you, Mr. Honest, broke 50-100 federal laws already this morning) (c) a good lawyer can take any conversation, even the most innocent, and twist it into evidence of a sinister conspiracy.

      (b) and (c) are the most dangerous when combined, because the usual Fed tactic is to bring a massive prosecution against someone, use that prosecution to dig up charges of "obstruction of justice", then actually convict on the "obstruction" charges. And absolutely anything you say can be twisted into evidence of "obstruction".

      So it is not so black and white as you would have it appear.

      sPh

      • As for point A, theres this thing called "countersuit for frivilous lawsuits." It allows you to sue the plantiff when the suit is obviously wrong, and a waste of everyone's time involved.

        And for B, I guarantee, you Mr. Conspiracy Theorist, that I have not broken 50-100 laws this morning, unless Congress has passed a law against skipping breakfast. We (at least I presume you do as well) live in the United States of America, not Communist Russia, where anything worth doing was illegal.

        Nobody said that honor was an easy task. But if the DA wants you proscecuted so bad that he is going to stoop to interpretations and gray area misrepresentation, there's nothing that will stop him from proscecuting you. Your best hope is compliance, unless you happened to have actually broken some laws.
        • Re:Honest men (Score:4, Insightful)

          by sphealey ( 2855 ) on Monday February 18, 2002 @01:58PM (#3027392)
          And for B, I guarantee, you Mr. Conspiracy Theorist, that I have not broken 50-100 laws this morning, unless Congress has passed a law against skipping breakfast. We (at least I presume you do as well) live in the United States of America, not Communist Russia, where anything worth doing was illegal
          I don't go in for conspiracy theories much, myself. Although there clearly are powerful groups of people in the world who enjoy power/money for its own sake.

          As for your comment about not breaking any federal laws, clearly you haven't read the US Code (or the Federal Register, since the Supreme Court ruled that administrative regulations have the force of law) lately. Flush the leftover pills from a prescription down the toilet and and the question is not if you have broken FDA and EPA regulations but how many. ill you be prosecuted for that? Probably not - unless someone decides you have something they need. What's that? One of the customers for your database consultancy is the local mosque? Hmmm...

          Before you flame back, please spend a few hours at your local library scanning through a couple weeks' Federal Registers.

          To you other points: countersuits are a nice idea, unless you are facing an opponent with 100,000 times your resources. Then you are screwed, because even if you win your $10,000 award will not cover your $500,000 in legal fees. And it is nice to think that the feds only go after "bad guys", but the definition of "bad guy" can change quite rapidly. Just ask Mr. Ashcroft.

          sPh

    • Re:Honest men (Score:3, Insightful)

      by mpe ( 36238 )
      ...have nothing to hide.

      Not even from the dishonest?
    • Re:Honest men (Score:4, Insightful)

      by edp ( 171151 ) on Monday February 18, 2002 @12:41PM (#3026956) Homepage

      "Honest men have nothing to hide."

      The most obvious and American counterexample to that is the voting booth. It has a privacy curtain, and I bet you use it.

      Honest people have things to hide from dishonest people. Hiding your vote protects you from being threatened or rewarded for your vote. Hiding your business plans prevents your competitor from beating you to the punch. Hiding your homework prevents other students from cheating. Hiding your phone number prevents some telemarketers from bothering you. Hiding your home address prevents customers from bothering you after business hours. Hiding an embarrassing (but ethical) hobby provides enjoyment of life while protecting from harassment. Hiding your religion protects you from persecution.

      • Voting booth. That's the point.
        Even if everybody knows how I will vote, I close the curtain, vote, and do not tell anyone how I voted. As much to protect my neighbor's right to a secret ballot as anything.
        Honest men hide things to discourage the snoops. The snoops can cause a lot of mischief for honest people.
        Trust me. (Always trust me. ???) Sounds like the beginning of a con.
    • Excellent! what's you address so I can come over and look throught your dresser drawers.. Better yet what's you IP address and your Root password so I can look around in your computer.. and while we are at it, you bank account numbers and credit card numbers.

      IF you have nothing to hide, you have no problem giving up this information.

      do you see the point now?

    • Honest men have nothing to hide. I don't think shareholders would see an email shredder as good news. Sure, you've reduced "liability," but you could further reduce it by having a higher set of moral codes.

      xenocide2, what's your social security number, mother's maiden name, and which credit cards do you carry? Can you give me their numbers, or do you have something to hide? How about your home address, and phone number? Passwords to computer accounts? A list of all your purchases, including those you made in cash, over the last year? A list of all the web pages you've hit, ever? Your income history, and tax returns, for the last 7 years (you know the IRS wants you to keep those for that long, right?) All school transcripts?

      Why don't you post those all to slashdot, as proof that you're an honest man, and that you're following your set of "moral codes."
  • by SomethingOrOther ( 521702 ) on Monday February 18, 2002 @10:50AM (#3026394) Homepage

    When encrypting a message with PGP you can use the -m option (or sellect the 'secure viewer' if you are using one of the windoze versions) Doing this prevents the recipiant from saving a plain text version on their disks

    No, it isn't as good as "shreading" and there are ways to cercumvent this if the recipiant was so incliend, but it is a good substitute providing you trust the recipiant.

    If you dont trust the recipiant then WTF are you doing sending them such an e-mail in the first place!

    • The trouble with PGP is: Once it becomes so widespread that the government has to fear loss of face in front of a court, other countries will do the same as the UK: Pass a law that requires you to hand over the key, or else...

      Besides, with PGP you still can't control if the RECIPIENTS of the mail keep it - the point of these new systems was to delete the mail after you sent it.
      • The trouble with PGP is: Once it becomes so widespread that the government has to fear loss of face in front of a court, other countries will do the same as the UK: Pass a law that requires you to hand over the key, or else...

        IANAL, but in the US, if the message is part of an investigation, they could get a warrant requiring you to turn over the key. No new law needed.
      • Deniable encryption is the subject of the "rubberhose" project [rubberhose.org]

        From the website (for the lazy or bandwidth impaired):

        Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation. Rubberhose differs from conventional disk encryption systems in that it has an advanced modular architecture, self-test suite, is more secure, portable, utilises information hiding (steganography / deniable cryptography), works with any file system and has source freely available. Currently supported ciphers are DES, 3DES, IDEA, RC5, RC6, Blowfish, Twofish and CAST.

        Currently alpha, but has a cool graphic, cool idea and cool name :)

    • /me chortles.

      'man xwd' Enjoy.

      Wanna buy a bridge?
    • by CatherineCornelius ( 543166 ) <tonysidaway@gmail.com> on Monday February 18, 2002 @11:05AM (#3026462) Journal
      When encrypting a message with PGP you can use the -m option (or sellect the 'secure viewer' if you are using one of the windoze versions)

      Doing this prevents the recipiant from saving a plain text version on their disks

      I hope nobody reading this will rely on "pgp -m" for security--it's just a convenience that tries to ensure that your recipient doesn't do something insecure such as saving plaintext to disk, but if he wants to he can probably still do that with a couple of keypresses.

    • Doing this prevents the recipiant from saving a plain text version on their disks

      ...providing you trust the recipiant.

      If I trust the recipient, all I need do is write "Please to not save a plain-text version of this document." Which, essentially, is all that this option can do - ask. Not prevent.

    • When encrypting a message with PGP you can use the -m option (or sellect the 'secure viewer' if you are using one of the windoze versions) Doing this prevents the recipiant from saving a plain text version on their disks

      This basically asuming that the recipient is using a known "cypher machine". Which is only viable in a closed environment where there is no way for the end user to change software or install their own. (Which rules out even thinking about using Windows.)
    • Doing this prevents the recipiant from saving a plain text version on their disks

      Surely this is a joke.

      Anyone who trusts someone else's computer to obey their wishes, is going to be the owner of my next bridge.

  • Still corporations and individuals fail to understand a simple rule: Whatever you can see, you can store and copy. They failed to understand that with copy-prevention mechanisms, and the fail to understand it here. No crypto will help prevent seeing something that you already saw.

    And no, hardware protection still can't help. In the worst case - take a camcorder and tape your screen contents. They can't overcome that!
    • by David Price ( 1200 ) on Monday February 18, 2002 @12:19PM (#3026825)
      This is absolutely true. However, these systems are not at all designed to foil the presumed intent of the recipient to copy the content (as DRM systems for copyrighted entertainment content are). They're designed to give a level of automatic prevention against inadvertent copying.

      Consider, as an example: I run a business in which sensitive information is bandied about by internal corporate e-mail. In order to keep a whole variety of bad things from happening to that information (subpoenas years later, inadvertent forwarding to somebody who shouldn't see it, proprietary information being leaked by cast-off hardware), I enact an electronic document destruction policy; one year after an internal e-mail is sent, it is destroyed. I mandate use of one of these self-shredding systems to help enforce my policy.

      Now I haven't really helped anything from a strict can-it-be-done standpoint: a whistle-blowing employee can still take the aforementioned camcorder and set it up; a sysadmin who's for some reason obsessed with archiving all his mail can probably download a crack for the system in question. These issues are pushed into the realm of policy, but the number of such issues that have to be dealt with strictly by policy means decreases by an order of magnitude. What I have really accomplished is to drastically reduce the probability that something will happen that nobody in the organization intended.
  • "Authentica and other companies make online shredding systems that scramble e-mail messages and limit access to the software key needed to decrypt them. To make messages "disappear," access to the key is withdrawn after a given time"

    Ok, so the first time they need to review a document that is now "expired" they start copying the documents to their local harddisks for review or putting the information into databases and refering to them in memos. Nobody has time to scower a whole corporate network for copies of documents which should not have been copied so this is still not really a solution.

  • by Anonymous Coward

    Even if the self-shredding software disables printing, copying and screen-capture functions, nothing will stop a determined person from photographing the screen or jotting down the information by hand.


    I can see it now. Interns' job descriptions will now include handwriting received email in addition to coffee-fetching, photocopying, and (in the case of Washingtonians) sexual favors...

  • The way I see it, (I'm not employed in a corporation, but I have received a few "confidential" emails) the (L)users can/will undermine this by simply hitting Print. Now you are back to square 1, having to manually shred a physical document. Yeah, forwarding emails all over the place is convenient, but there will always be someone who is militantly "anti-computer" and prints out hard copies of everything they get.

    I kinda see the point behind this, they are playing off of Enron, milking that scandal du jour for all it's worth. I bet the scandal next month will have something to do with Linux and those pesky "h4ck3rs", right on time to push the SSSCA through.
  • like mentioned, one shouldnt send anything that will make you look bad later.
    instead you should say it in person, and make sure the guy isn't wiretapped. then if you want to later _totally_ remove this message you said to him from existence(provided that he doesnt tell anyone), just dump him in the canal with heavy duty boots.
    you just cant remove mails from all the machines they might get into..
  • Yeah, whatever. (Score:5, Informative)

    by Cerebus ( 10185 ) on Monday February 18, 2002 @10:58AM (#3026425) Homepage
    "Self-expiring" email schemes work essentially the same way: a trusted key authority generates and stores encryption keys for any and all email. Reading an email requires authentication to the key authority, which either returns the key or decrypts the email. After a preset time, the key authority purges the encryption key, after which the email encrypted with that key is theoretically unreadable.

    These schemes have several practical problems and weaknesses:

    1) These are closed email systems. Composing, sending, receiving and reading all protected email *must* take place within the system. Communication outside the system typically involves a web-based email solution-- you don't actually send the email, you send a URL to a server that hosts the email for the recipient, and a one-time authenticator to access it.

    2) There is no protection for email that is removed from the system. Screen captures, saving as text, etc. all remove the email from the "expiry" system, rendering it moot.

    3) The key authority is a central point of failure. Reading any protected email requires that the key authority be online and available, and that it's keystore be intact. Any interruption in this services makes *all* email hosted by that service unavailable-- and this is (conceivably) all email in your enterprise.

    4) If the key store is ever archived-- a typical response to worries about (3), above-- the archived keys can be used to access old mail that has otherwise "expired," or "shredded." There is nothing in the application of the encryption that prevents an archived key from being used past its valid date, should it be recovered from a backup or recovered forensically the key server's storage.

    Just some thoughts.

    • Re:Yeah, whatever. (Score:3, Insightful)

      by GooberToo ( 74388 )
      And if you use this system for which law enforcement access is required whereby the emails are no longer available will you now be charged with interference of an investigation? Dustruction of evidence? Failure to co-operate in an investigation?

      I doubt there is currently much a legal-leg to stand here to prevent your self from being raked over one way or another.

      Please keep in mind, I'm not a lawyer, however, these seem like the obvious paths law enforcemet would go to ensure these systems don't prohibit their ability to investigate.
    • >"Self-expiring" email schemes work essentially the same way: a trusted key authority generates and stores encryption keys for any and all email.
      >Reading an email requires authentication to the key authority, which either returns the key or decrypts the email. After a preset time, the key authority
      >purges the encryption key, after which the email encrypted with that key is theoretically unreadable.

      Now one must ask, is the encryption key truly purged, or merely taken offline? If the former, at what point does the FBI require that the keys NOT be purged, and be merely taken offline? Or for that matter, what about system backups that retain keys? You've got to backup your keys, in case of a true system failure, because unexpired messages MUST be read. But you then need to take care to purge backups of keyspace appropriately, as well.

      And those are one two more points of failure, as well as the others people are mentioning.

      Honesty is simpler.
    • Your second point is the nastiest. However, it seems to me that this weakness could be mitigated to some extent. The key authority could strip off the real message authentication and substitute its own. I.e., it would say, effectively, "I certify that Joe Shmoe indeed sent this message, but you will have to take my word for it." Furthermore, it could then shred it's own authentication after the expiry date. Although someone might have a screen capture of the email, both Joe Shmoe and the key authority could plausibly deny that it was real.
  • Does anyone have information on how this idea works?

    Okay, you have a remote encryption key (Me to keyserver: "Please make this key publicly available until 5/5/2002") which you can use to decrypt documents for a while.

    But what is to stop people taking a copy of this key, or of the decrypted message? Do you have to run a "trusted software" reader to view the message?

    Either way, it sounds like the equivalent of sending a Yahoo card - "Click here to view your message, which we will store for 3 months"

    But then, screenshots are still admissable in court.
  • copy protection? (Score:2, Insightful)

    by Mr. Slippery ( 47854 )
    These digital-rights management tools work much like copy-protection systems being developed for music, movies and e-books

    And we all know how overwhelmingly successful those have been at preventing copying...

    The old bromide that "information wants to be free" is not just a statement about copyright. It's a statement about privacy as well - whether you want it to spread or not, once you set information in a digital form and send it to someone else, controlling it becomes well-nigh impossible.

  • by JohnPM ( 163131 )
    Can I just go ahead and point out the obvious here. Self-shredding email or whatever you want to call it can only work with the consent of the recipient, which goes completely against the tone of the CNN article:

    Senders can destroy messages either remotely or automatically, without a recipient's consent or cooperation.

    Just like the whole digital-rights management problem, eventually you have to give access to the message to your recipient and they can store a copy. If it's displayed on your screen then even the most recalcitrant software can be bypassed with a screen-shot or at absolute worst, a photograph of your monitor.

    All these schemes can do is make it less convenient to store the email you receive. Even so, the receiving software could be dissasembled (DeCSS style) and you could create tools that would store the plain-text like a normal email client.
    • by Tenebrious1 ( 530949 ) on Monday February 18, 2002 @11:47AM (#3026638) Homepage
      Maybe for personal email. But a corporate email system is the property of the company. Anything you create on corporate time becomes the property of the company. An email you send to your co-worker does not become the "property" of the co-worker. It's still part of the corporate network and is still the property (and responsibility) of the company. Thus they have every right to "shred" the message.

      They have every right to tell you not to print it out and save it; but of course that's what people will do if they know the messages will be deleted after a certain time. I print out and save messages to cover my own ass.

      Which brings up a point. I print out the stuff with full headers, with message ID and info when it was sent; however, does it really serve a purpose? I remembered thinking that while watching "Clear and Present Danger", when Harrison Ford prints out a memo and shoves it into the other director's face saying something like "here's the proof". What good is my printout if I don't have server logs to back up that the message was actually sent to me? What good is a backup of the server logs if I can't prove it wasn't tampered by myself? I know my boss will believe me if I used it as proof to protect my ass, but would a jury? Am I just wasting trees?

      • Anything you create on corporate time becomes the property of the company.

        Sorry for taking this a bit out of context, but I don't want to accept this "the company pay you, therefore they owe you". If I spent time at work composing a love poem for my girl friend, the company is perfectly entiteled to tell me off, for not doing my work. They are not entiteled to my poem.

        They have every right to tell you not to print it out.

        Normally yes, you will have to comply with company policy - however if the company engages in criminal behaviour, their rights have just ended. Collecting evidence about that is normally perfectly lawful, if it's not in you jurisdiction, I think it ought to be. I believe the US has "whistle-blower" laws too, though.

        You're making a very good point about the proof issue, unless the email is PGP-signed (or something similar) it's not a terribly good proof. However, looking at a text it's sometimes possible to associate it with a writer anyway e.g. looking for typical spelling mistakes, a certain style of writing, etc. Basically there are signs which could be used to prove that you faked the email, so if those can't be found it increases your credibility. So it might help somewhat.

      • What good is a backup of the server logs if I can't prove it wasn't tampered by myself? I know my boss will believe me if I used it as proof to protect my ass, but would a jury? Am I just wasting trees?

        So far as I understand these expiring-email systems, the presence of a message will still show up in the server logs, at least for a while. That "presence of a message" log will be pretty convincing to a jury, as it at least proves that you didn't make the message up yourself.

        On backups of server logs, the only thing I could recommend would be to have both yourself and a cow-orker PGP sign the logs at the same time -- then they have to prove a consipiracy between the two of you to alter the logs, which will probably harder than throwing just your credibility into question.

        If you have shell access to the server in question (I.E. are high-enough up that you can do most anything to the server), try writing something that would take a hash (md5sum or so) of the logs in question (while they're still on the server, and thus unalterable to you) and mail the sum (along with a timestamp, a sum of the program itself, and a sum of something that proves it's not in a chroot jail -- all to prove that the program hasn't been tampered with) to both yourself and a trusted external data repository that you can't alter [Again, a friend comes in handy here].

  • by jd142 ( 129673 ) on Monday February 18, 2002 @11:14AM (#3026499) Homepage
    Back in the distant mists of time, when we had cc:mail in house, messages were deleted from the server after 15 days. Since it was not pop3 and all messages were kept right on the server instead of downloaded to your hard drive, it meant that after 15 days it was gone for good. In theory, backups were made. But the person in charge of cc:mail and the backups had . . . issues with the backup, so itwas hit and miss anyway.

    If people wanted to keep a message, they did what every one using these e-mail shredders will do: either print it directly or copy and paste it into word and print it from there.

    • We still do this, just to keep the mail system managable. Without it, everyone keeps everying for a really long time.
    • Back in the distant mists of time, when we had cc:mail in house, messages were deleted from the server after 15 days. Since it was not pop3 and all messages were kept right on the server instead of downloaded to your hard drive, it meant that after 15 days it was gone for good
      cc:Mail's "Archive" function could be redirected to a floppy disk, where is would store the messages in a more-or-less plaintext format. Can't remember offhand if the Administrator could disable the Archive function though.

      cc:Mail was a nice program - simple, easy to use, did exactly what it was designed to do and no more. Too bad it is gone.

      sPh

  • A lot more companies are probably going to be switching to AIM (and similar) to conduct business to avoid a lot of this mess.

    Something that allows you to communicate, but without keeping records. No evidence, no worry, I suspect will be a requirement for future messaging systems.
    • In which case, I can automatically make chats logs of all my conversations.

      Provided AOL actually lets me get into the system of course....
    • Open up Preferences and click on IM, then click Automatically Save IM Sessions to Log File.

      You were saying?

      • Macintosh AIM logs. PC version has a Save option for each individual chat.
      • ircle logs.
      • BitchX logs.
      • mIRC logs.
      • pIRCh logs.
      • And in programs that dont have a log or save feature, theres always select, copy, paste.
      Need I say more?
  • by Shuh ( 13578 ) on Monday February 18, 2002 @11:54AM (#3026669) Journal
    Steps to self-shredding e-mail:
    1. Get your "@enron.com" account...
    2. Use account.
  • Spyware (Score:3, Interesting)

    by Registered Coward v2 ( 447531 ) on Monday February 18, 2002 @11:59AM (#3026698)
    I wonder how this stuff interacts with spyware that logs keystrokes, viewed screens, email, etc.

    Of course, talk about being hoisted by one's own petard:

    Company X installs spyware on its machines - "to protect itself"; and the results wind up as evidence in a court trial, including "shredded" emails. Concievably, Company Y could send the email, and have it recovered from X.
  • I can just imagine that this will likely be the _first_ Microsoft security initiative, again for those big coporate players.

    Automatic document shredding, unless specifically marked with the archive bit set to 1

    It would sety a new standard for microsoft reliability.

  • Problems... (Score:2, Interesting)

    by pozar ( 54229 )
    The issue that there are holes in the system have been well known for years. All of these systems are designed so that their use was assumed to be between "friendly" parties. Such as within a corporate environment. This is the case with snail mail, or any form of hard copy paperwork.

    The problem was, how does one create a system to help with document retention policies that a company creates? Up until companies like Omniva, there wasn't a software process to handle electronic documents where you can say "I don't have that document as it has been destroyed through our retention process".

    BTW... These products are not just for large companies like Microsoft. Individuals can benefit through it. Email to your tax accountant would be examples of mail that you may want to disappear after you file your returns. A number of great example on how folks have gotten screwed by electronic documents can be found in Jeffrey Rosen's book, "The Unwanted Gaze : The Destruction of Privacy in America" [amazon.com].

  • by D_Fresh ( 90926 ) <slashdot AT dougalexander DOT com> on Monday February 18, 2002 @12:20PM (#3026837) Journal
    From a security standpoint, this is great, but from a historical perspective, this is an archivist's nightmare. How do you write a biography of a famous figure of the information age without their email to go through? (I know, insert MS trial email joke here.) How many current biographies of presidents, CEOs, entertainers, etc. are based on their mounds of personal correspondence squirreled away in six million shoeboxes in the family archives? With self-destructing email, the possibility of finding such a treasure trove in email form just got even smaller than it already was.
  • Just use an encrypted filesystem and make sure you can trust the people you're emailing. Self-shredding documents will only work better if you're sending to someone you can't trust that doesn't know anything about computers.
  • by sharkey ( 16670 ) on Monday February 18, 2002 @01:07PM (#3027100)
    describing a self-shredding e-mail system.

    Been out for years, described here. [microsoft.com] You can even get a demo version!
  • by Ukab the Great ( 87152 ) on Monday February 18, 2002 @01:13PM (#3027137)
    Self-shredding e-mail is cool. But messages that kill themselves if they contain the strings "Get Out of Debt" or "Penis Enlargment" would really kick ass.
  • I'm surprised CNN managed to get fooled by such obvious nonsense. They claim "Senders can destroy messages either remotely or automatically, without a recipient's consent or cooperation." This is nonsense.

    A fundamental law of information sharing is this: if I can read (or watch or listen to) it once, I can read (etc) it forever. I have the message, and I have all of the keys necessary to view it. All I have to do is keep them. Even simpler, I can copy and paste text out of the document, or I can just print it. Faced with the knowledge that all of your e-mail will be deleted after N days, you are much more likely to print anything of lasting value.

    For the recipient to choose not to copy, print, or keep the message, he is cooperating with you. There is no way to prevent re-readability when the recipient is untrusted. Period. Saying otherwise is like claiming to have discovered perpetual motion.

    I titled the post "(Mostly) smoke and mirrors" because a self-deleting e-mail system works unless the recipient specifically subverts it. In a normal e-mail system, messages are saved forever unless specifically deleted. So the marginal improvement is one of default behavior, not one of security.

    --Patrick

  • They've been pushing this crap for years, and it is still crap: It fails to stand up to an y reasonable threat model.
    • If it is truly meant to make incriminating e-mail disappear, it will fail. Recipients of incriminating e-mail are likely to make durable storage copies, with a camera if nothing else. The crypto software cannot possibly prevent this.
    • If it is only meant to make casual e-mail disappear, then it is a great deal of fuss for something that can be handled by simpler means, such as corporate policy, leaving e-mail on mail server spools, and having the system administrators delete it.
    Crispin
    ----
    Crispin Cowan, Ph.D.
    Chief Scientist, WireX Communications, Inc. [wirex.com]
    Immunix: [immunix.org] Security Hardened Linux Distribution
    Available for purchase [wirex.com]
  • first, the already-hammered screenshot effect. Some systems (infraworks comes to mind) disable various features (cut, copy, paste, screenshots, etc) in the filesystem (which restricts it to Windoze) (but doesn't address the person with a video-out card recording on a VCR, or photos of the screen, etc.

    Secondly, this means that the private keys to your documents are stored on a server accessible via a website! Boggle! Have we not learned anything about the general security of most web services? And even presuming it has technical security, how secure is their identification scheme? Passwords, mostly, with no out-of-band ID system. Hi, I'm Santy Claus. My password is 122502 .

    Sigh. All these wonderful sounding ideas, and me without my cluestick.
  • Maybe saving all traffic through a mail server is a good thing. This could prevent someone from forging a mail or a reply. It's not hard to craft a mail message. The mail servers at my last company were all screwed up IMHO. They used HP Openmail servers with Outlook clients. You could craft emails to look like anyone from the company to anyone at the company with absolutely no tracking from the client end. All you had to do was send an Internet email with a From: header that someone in the company had, like some_user@company.com. When it got to our mail servers, it would recognized the From: field as an internal user, attach all the associated Openmail routing stuff, remove the SMPT stuff and send it to the specified recipient. Result? A forged email that appears in every instance to have come from an employee at the company, to an employee at the company and sent internally (no indication that it was sent from the internet and sent via SMTP). You could send mail from one supervisor to another explaining how you thought they sucked and no one would know the difference, we had >50000 employees so you could find other useful things to do with it. Hell, I don't even work there anymore, have no access to their network and I could still send mails between employees. I never got involved with our Openmail setup but I assume that it was configured that way by our headquarters and not the default behavior. I for one would like to think that logging and backing up of email would prevent someone from getting away with this or being blamed for something they did not do.
  • A better way to do it is to have a system where all the emails are anonymous - and at the end of the message a one time SSL url (possibly javascript) that would allow the recipient to verify it once against it's md5 sum. This way it wouldn't matter what the email said, because anybody could have faked it. Only the person who checked knows for sure if it's real.

I'm always looking for a new idea that will be more productive than its cost. -- David Rockefeller

Working...