bitpuf is better

Why is Bitpuf Better? Get v1.4 and See! (Hint: you control your content…)

5 Reasons bitpuf is Better

  1. bitpuf puts you in control.

Social networks and email providers retain your shared content and build detailed personal profiles. We know that some things need to be shared differently.

  1. With bitpuf, it’s all in one place.

Photos, files, instant messages… How many apps do you use to share your content?

  1. You leave no digital footprint.

Auto-erasing content keeps it off the record. Why archive it if you don’t need to?

  1. Beautiful design and simplicity matter.

You know it when you see it. Simplicity + ease of use = delight!

  1. Version 1.4 offers many improvements…

…and we’ll never stop looking for ways to make the experience even better.

Get v1.4

bitpuf on the App Store

bitpuf on Google Play

and let us know what you think!

Get bitpuf Version 1.3!

Happy New Year from all of us at bitpuf!

We’re launching into 2017 with a fresh look. Version 1.3 is now available and it makes bitpuf even simpler and more convenient.

What’s new for 2017? Powerful productivity and effortless exchange!

All Your Content, One View, Always Current

With images and files now displayed together, you present all of your content in a single gallery view.

This makes bitpuf perfect for visual work and projects that involve multiple content types. It’s all right there for you to see. And updates are reflected instantly.

No Account Needed

Viewers don’t need an account—they just tap a link to see your Clip! They can even send you comments.

Better Business with bitpuf

You probably know that bitpuf is great for sharing personal content like photos and videos.

But did you know that businesses and professionals like using bitpuf to exchange confidential documents, contracts, and other sensitive content like invoices, signed forms, tax or financial data?

Instant Delivery, No Digital Footprint

Most electronic exchanges leave digital footprints. In-person exchanges do not.

Using bitpuf, you get the benefits of both: it’s like having a sealed envelope hand-delivered instantly.

 
Control version dispersion
There’s nothing more frustrating and less efficient than trying to keep track of shared documents or files. When you are working with a team, bitpuf makes it simple‐-updates are reflected instantly so everyone will always be accessing the latest version.
version control collaboration editing revisions current content
All of your content in a single view
internal sharing security users usernames secure
Internal sharing for highest security
Keep content secure
When sharing with other bitpuf users, you maintain tight control over access. To view your content, viewers must login.
You can also share content via a link to make your content accessible without logging in.
It’s your choice.
Comment conveniently
There’s no need to switch to a messaging app to communicate. You can comment right in the bitpuf app.
in app comments replies reply single same view
In-app comments & replies in the same view
choose automate expiration date and time hour editable
Editable expiration settings–to the hour
Automate expiration
Of course, there’s no better way to keep your content secure than to make it go away after it’s reached its recipients.
With bitpuf, you can get very granular and set your expiration time down to the hour.
And once it’s gone, it’s gone.
We don’t archive.
Fish in a Tree Fish Differentiating data in digital biome classification

Fish Belong in the Sea: Differentiating Data in the Digital Biome

In biological ecosystems, organisms flourish in favorable environments and languish in unfavorable ones. Coral is suited for life in tropical waters not the desert. Different kinds of data also require different conditions to thrive.

As the data-driven economy matures, the forces shaping it are differentiating data (and by extension content) into more refined morphological branches, where particular species occupy the habitats (or market niches) with which they have co-evolved.

Intrinsic to this evolution is the systematic classification of the data being collected, manipulated, analyzed, bought and sold: health data (clinical, genetic, pharmacological), open data, personal data, scientific data, student data, financial data, systems data, metadata, audit data, business-critical data, sensor data, polling data.

In spite of this rich lexicon, too often we refer to data in generalized terms, as a vaguely homogeneous mass. This is a mistake.

Data is anything but uniform.

Fish Need Water

Derived from a variety of sources, used in innumerable applications, data requires disparate protection and maintenance routines to maximize its utility, protect its integrity, and honor its value.

Information system experts recognize that data is heterogeneous; they spend their days classifying it—doing so is critical to its preservation and security.

Recent polls demonstrate that the non-expert public also recognizes differences among data types in the digital biome, choosing, for example, to avoid interactions online that require disclosing personal information.

This is not the same, however, as fully grasping the logical next step.

Data that is not uniform—in terms of format, lifespan, value, vulnerability, etc.—should not be treated uniformly.

This is especially true where sensitive, private, personal data is concerned.

Plant, Animal, or Mineral?

Just as different species inhabit different ecosystem niches suited to their particular physical and behavioral traits, different data types will thrive or vitiate under different conditions.

Data itself takes multiple forms: words, numbers, pixels, coded content organized in a table or grid. Some data is highly complex; some is simple. It’s critical to be aware of all facets of a given body of data and to understand what constitutes favorable or unfavorable conditions.

This requires unraveling data attributes and evaluating them.

Metadata

Consider, for example, a digital image whose geo-location is embedded in its metadata. Though seemingly innocuous, when digital images are compiled and overlaid on a map, they can reveal more than you might think. Publically available images posted on social media have disclosed the precise addresses of pet owners and helped track down criminals.

Lifespan

When delivery to a recipient is all that’s needed or when time-sensitive data expires, archiving it doesn’t make sense. The distinction between permanent and impermanent content is of paramount importance given the volume of data we generate. Storing it might be cheap (in terms of dollars if not environmental impact), but managing and securing it all is not. Data that does need to be retained faces the challenges of digital preservation (such as long-term readability and bit rot).

Format

Incompatible files, “not supported on this device,” are frustrating. Some file types are so specialized that the data they contain is accessible only to those with an exclusive key. Computational biologists, for example, need proprietary bioinformatics tools to visualize in 3-D the interactions of drugs and their genetic targets.

Source and access

As with the shift from Linnaean classification to Phylogenetic nomenclature, our classification of data types will be fluid, adapting to outside forces of science, business, and culture. General categories today outline both the origins of and access to different types of data, including open data, restricted data (e.g., data subject to government regulations like COPPA, HIPAA, and Privacy Shield), proprietary data, and personal/sensitive/confidential/private data (e.g., PII, ePHI, genetic data, student data).

Co-Evolution, Symbiosis, and Habitats in the Information Ecosystem

Data itself is but one element of the information ecosystem. The expertise needed to do something useful with it embodies one of the forces driving the co-evolution of data and its market, prompting the wild growth of analytics and data visualization, influencing our behavior online, shifting the fulcrum of the adtech-adblocking seesaw, and tightening our focus on data protection.

Consider for example how these factors interact within the information ecosystem:

  • The proliferation of niche markets for analytics, defined, in part, by the questions being asked (SMEs, consumer products, biotech, medicine, travel, etc.)
  • The rising use of AI and algorithms to curate and filter
    • The relationship of technology and people in the information ecosystem can be a symbiotic one. Software algorithms have not eclipsed the need for human cognition in filtering, pattern recognition, and analytics. Intelligence analysts still outperform machines when it comes to intuition and inference and are instrumental in improving machine learning.
    • And while algorithms make information more discoverable in an environment of overload and can help separate signal from noise, they necessarily reflect the bias of their embedded assumptions.
  • The increased nuance in notions of privacy and the rise of data privacy expertise
    • As more and more sensitive data finds its way into the information ecosystem, and as regulations increasingly govern the use of that data, the demand for data privacy officers will reach 28,000 at a minimum in the coming years, according to the IAPP.
    • Distinctions between legitimate monitoring and surveillance have become subtler.
    • With consumers becoming less trusting and more reluctant to share their personal, browsing, and financial data, researchers continue to look for a balanced solution to the give-and-take of personalization and control, of public interest and privacy rights.
  • The concomitant differentiation of security risks
    • As with any ecosystem, parasites find ways to exploit available resources and feed off poorly protected data. Although hackers are often motivated by criminal intent, human error can also poke holes in data defenses.
    • Experts’ approach to data protection is based on a variety of factors: whether data is likely to be captured via the network or an endpoint; by an insider or outsider; whether an attack is designed to steal the data or to introduce ransomware; and whether there is an actual breach of cyber-defenses or a manipulation of vulnerabilities (e.g., breaches at the IRS where data was accessed “not through a forcible compromise of the computer systems, but by hackers who correctly answered security questions that should have only been answerable by the actual individual.”).

What’s in a Name?

To more fully understand the next life stage of this evolution, we need a taxonomic language and generally accepted classification criteria.

Big data is patently imprecise. “Big” describes a certain volume, but it implies nothing about wide-ranging sources and uses.

  • Software-analytics company SAS does refer to big data’s variability, to its velocity, variety, complexity, and its applicability to business decision-making, as does IBM.
  • Many claim that big data explains the “why” (though not always, as philosopher Michael Lynch points out in The Internet of Us); while small data explains the “what.”

Small data is an even more egregious misnomer: according to most definitions, there are vast quantities of it, yet there is no consensus on what it is.

  • Some say it is generated by the connected devices in the Internet of Things (i.e., specific attributes derived from sensors detecting current states like those in so-called smart cities), or that it derives from the digital breadcrumbs of our online lives used for both customer segmentation and personalized medicine, or the “lean data” processed from data streams to eliminate all but the relevant elements.
  • Others, like author Martin Lindstrom, say it is the subtle, detailed observations related to human behavior (such as what people around the world are eating) collected by people not machines.

If we imagine Data electronicum as the order, below this might be the families of big data and small data, which can themselves be divided into personal data and non-personal data, which in turn include myriad species each with numerous facets that define them.

Mapping out data types by classifying them might be construed merely as an exercise in content management. One might argue that nomenclature is nothing more than an abstraction. So why does data differentiation matter?

Bycatch or Targeted Breed?

It matters because we need to know what we are fishing for. Knowing what we are after affects the tools we use, the areas of the ocean we trawl, the season and time of day we cast our nets.

Protected Waters

Imagine concentric rings expanding outward from the singular point of our identities.

Data furthest from us might be historical data or data over which we have little or no control like roadway images or government records.

Closer in are things like health information and records of financial transactions, student records and HR files: these are held by fewer institutions but still beyond our reach.

Closest are those things that we can or might wish to control like personal photos, email, and text messages.

All of this data is nominally “ours.” It is, after all, about us. And it is often generated by us. But much of it is collected, shared, or stored unnecessarily, without our consent, or without a fair exchange.

Have you ever wondered why a weather app needs to check your location every 10 minutes? Or whether a photo-sharing app really needs access to the physical addresses, birthdays, and other notes recorded in your digital rolodex?

Unwanted Species

All of the bycatch in data collectors’ nets crowds out legitimate uses, exposes latent data to misuse, and expends resources unnecessarily.

Defining data with greater precision by citing attributes relevant to a specific use will help us control more and waste less.

Issues of controlling and protecting data and using it efficiently pivot on the value we assign to it. When we make decisions about collecting, retaining, and securing data, we must first appraise it and consider its utility, usability, ROI.

Some correlations are completely spurious. A lot of data is unstructured and difficult to decipher or inaccessible because of regulatory restrictions. And in some cases, its shelf life is too short to bother with.

Sometimes what we catch isn’t worth the bait.

No Fish in a Tree

You won’t find a tropical plant in the Arctic. Fish belong in water.

A retail coupon serves no purpose once it has expired. Genetic data doesn’t belong in the digital vault of an online bank.

We need to stop treating data as uniform and develop and implement tools and policies that allow us to act on distinctions appropriately by looking at all of the characteristics that define a given type of data.

Differentiating data can be a win-win: fewer resources, greater security, better ROI.

Image: junko | Pixabay

bitpuf blog harboring dark data

Are You Harboring Dark Data?

Dark Matters

We’ve all heard the refrain about poor data: garbage in, garbage out. A less well-recognized issue concerns data that is collected and stored but not used.

Many companies draw on only a fraction of the data they posses and often fail to derive anything useful from it. The explosion in data analytics will help redress this gap, enabling organizations to identify patterns, make predictions, and personalize products and services. The advanced analytics market is projected to grow to nearly $30B by 2019.

But data analytics rely on seeing the data that is being analyzed and some shades of big data are difficult to discern. Most organizations retain vast quantities of this darker stuff. Some estimate that as much as 90% of big data is so-called “dark data.” Though not always shady, it is not always a valuable resource either.

Hidden in the cloud or dark matter of cyberspace, either way the dark data you harbor can be an unseen force—for better or worse.

What is Dark Data and Why Does It Matter?

Dark data refers to data that is collected and stored, then neglected. It may include data of minimal value or great potential.

  1. Sometimes the term refers to data that is undetected and therefore unusable. Often this is simply a matter of unstructured information contained in text-heavy documents or files that are not tagged or annotated in any systematic way (imagine an encyclopedia without an index).

Email is a prime example. Though often archived as a matter of policy, it is unlikely to be cataloged in a content-management system. Because there are privacy laws specific to email, knowing where it resides and what it contains is paramount.

Undetected dark data might also include personal files, like music and video that employees store on company machines, or worse on unsanctioned cloud apps on third-party servers. The storage costs accumulate quickly.

According to a study of companies in the UK, “A typical midsize company with 500 terabytes of data wastes nearly a million pounds [$1.5 million] each year maintaining trivial files, including … personal photos stored by 57 percent of employees, personal ID and legal documents by 53 percent, as well as music, games and videos, stored by 45 percent, 43 percent and 29 percent respectively.”

  1. Other times “dark” implies dangerous, meaning that it exposes information systems to significant risks. This includes data that is redundant, obsolete, or trivial, also known as ROT (an apt acronym). When retained beyond its useful life, it remains vulnerable to misuse.
  1. On a less sinister note, dark data can also refer to data that is simply inaccessible. In some cases it holds promise but requires transformation first, either from an outdated digital format or from a non-digital one.

There is a treasure trove of information locked up in libraries, museums, and research collections: e.g., objects, photographs, even metadata in card catalogs. These are unequivocally worth preserving in digital form, contributing as they do to innovation and scholarship.

Got ROT? Deal with Your Databerg in Four Steps

Whether perceived as a business risk or potential asset, caring for this all of this data is a Herculean task.

“Databergs” threaten to rip a hole in information systems. ROT alone is projected to cost organizations $891B by 2020 in storage, migration, and security.

The intangible costs of data protection are equally significant. Trust is considered the “cornerstone of the digital economy,” yet the reputational and financial risks of data breaches are too often recognized after a hacking incident not before.

Minimizing these risks is essential. How?

  • First and foremost prevent unauthorized access.

Though no one wants to talk about it, most data breaches are the result of accidental or deliberate unauthorized access by employees. What to do? Training in data ethics and implementing and executing clear information governance policies.

  • Second, address digital decay and excise the rotten bits.

Data is delicate with a relatively short shelf-life: it must be periodically accessed and migrated to ensure its integrity.

Storage media can be unstable and prone to corruption or defect, but they must be readable in the future. File formats, especially proprietary formats, quickly become outdated, as the applications needed to view them become incompatible with current operating systems and devices.

  • Third, eliminate data that isn’t needed rather than storing it indefinitely, which is wasteful and risky if no one is monitoring it.

One person’s ROT might be another’s loot and it should be periodically purged. (Obsolescence and triviality make a strong case for temporary content–neverlasting as we like to call it!)

Notwithstanding the costs and risks of keeping data that holds no value, determining what to retain also has legal and cultural implications.

Culturally, we must ask: what will we commit to the digital record? Legally, we must comply with data protection and privacy regulations.

  • Finally, keep assets secure.

Cybersecurity today must protect not only the data itself, but the data used to authenticate access to it (biometrics both physical and behavioral hold promise in some applications but can also be stolen for nefarious use).

Dark Data Checklist

In the simplest terms, any approach to caring for dark data will involve:

  • Identifying it—locating it, classifying it, etc.
  • Ensuring appropriate access, now and in the future, in terms of both authorization and integrity
  • Evaluating it and eliminating what isn’t needed, e.g., ROT, unrecoverable, and sensitive data
  • Protecting what is kept

And this will mean addressing some rotten habits:

  • Hoarding data
  • Misusing the corporate cloud and third-party storage apps
  • Failing to differentiate between valuable data and ROT
  • Failing to annotate data when it is captured or created
  • Racking up storage costs and leaving a huge environmental footprint

Keeping Private Data in the Dark

With nearly every move we make online generating a steady stream of digital bits, dark data touches all of us.

We can support the use of data in research where it contributes to the common good while also holding data brokers accountable (especially when they sell health data without our specific consent).

And we can support the use of personal data to customize an offer when it benefits all parties involved.

But we must insist that possessing and using sensitive data conveys a big responsibility. To help ensure that it is well protected and treated ethically, organizations should focus on obtaining transparent consent, collecting only what is needed, selecting what’s valuable, and eliminating the rest.

We at bitpuf have chosen not to collect your data, because we believe in keeping your personal information in the dark, off the record, in a word private.

If you believe privacy matters…

Sign up for bitpuf!

 

Image source: Pixabay

5 privacy trends for 2016 big data ad blocking personal data

5 Privacy Trends for 2016: a battle for big data, bandwidth, and ad blocking

As we look ahead to the coming year, our eyes are inevitably drawn to the digital landscape and the billions of personal data points that map its contours.

Nearly every what-to-watch-in-2016 list refers to data privacy. And nearly every one points to a significant shift in the balance of control over personal data: tipping away from AdTech and toward consumers.

To relinquish or control, that is the question

People are bristling at the unbridled collection and use of data about their behavior online, their every move through physical space, and literally thousands of facets of their “persona” (up to 4,000 data points on a single user—one journalist asks whether he could come up with that many data points on his spouse!).

And we consumers are footing the bill: the frenetic pop-ups and “vexing videos” that plague our mobile screens have voracious appetites for bandwidth, sometimes consuming more than the content itself.

Cross-device tracking using digital fingerprinting represents a particularly egregious invasion of personal space.

Yet consumer opinion remains divided, largely along generational and cultural lines, about the risks and benefits of permitting data collection.

Some, especially “digital natives,” are accustomed to letting their private lives spill out in full view of the online public. (Though cybersecurity specialists predict that Millennials will take a closer look at privacy.) Many others shrink from the spotlight, wondering what really lies behind the glow.

Of course, there is no immutable law of information technology declaring that we must relinquish our personal data and privacy in order to participate as digital citizens. We can demand control.

Blocking, faking, refusing

Has data-driven personalization reached its limit? It certainly has met its match in ad-blocking technology and consumers’ evasive strategies.

  • Symantec’s State of Privacy 2015 finds that 33% of consumers in the UK provide fake data and 53% avoid posting personal data online.
  • A Pew Research Center study shows that 24% of American Internet users provide inaccurate information about themselves and 57% have refused to provide information irrelevant to the transaction at hand.
  • The dizzying rise of ad-blocking software (198 million active ad blockers globally including 34% of 16-24 year olds using the Internet) illustrates our collective frustration with increasingly intrusive advertising strategies.

Big data is bittersweet

Big data has many worthwhile and legitimate uses but the anonymization of personal data is notoriously difficult and the data collected often far exceeds what is needed for a given service or transaction, for example:

  • identifying individuals based on retail transactions (as few as 4 data points provided 90% accuracy!)
  • seeking excessive permissions (up to 235 permissions, the average Android app seeks 5)

Forks in the road: what can we do?

We can choose more palatable paths through the digital world. Consider these 5 alternatives:

  • Matching content to channel: Differentiate content types and select communication channels that are aligned with their attributes: e.g., broadcast public content; choose user-to-user or authenticated access for private content; delete temporary content when it becomes irrelevant; archive permanent content for posterity.
  • Managing our own personal-data: Ask users to define the privacy parameters of their online presence based on the context of what is being served (e.g., search results, e-retail, social content, branded content, academic research, professional content, etc.). Researchers in EdTech have already taken steps down this path granting students greater control over what personal data is displayed on a given page. They call it “sovereign source identity.”
  • Re-defining regulatory frameworks: Support national and international laws that promote more transparent terms of service, explicit opt-in, the right-to-be-forgotten, and what law professor Lawrence Lessig calls systems that draw on personal data for “single-use purposes.”
  • Favoring private-by-design: Appeal to consumers by offering inherently private, secure devices like ReVault’s wearable data storage, Purism’s laptop, or the Blackphone 2.
  • Data minimization: Do not collect sensitive information if it isn’t needed for a given service and delete it once it is no longer relevant. Store personal data locally rather than in the cloud. (Data minimization will be critical for the Internet of Things.)
  • Permission-based advertising: Encourage permission marketing rather than interruption marketing. The former is not a new idea but it may enjoy a renaissance. Rather than pushing intrusive ads to consumers, marketers and advertisers may offer them something in exchange for their attention or action.

All of these options implicitly treat personal data as a monetizeable asset. Given that we are the source of this in-demand resource, shouldn’t we exercise our right to determine its value and the conditions of its exchange?

Shouldn’t we demand more than the simple convenience that data controllers point to as the current trade-off? (An Annenberg School for Communication survey reveals that most Americans don’t buy this “tradeoff fallacy” anyway.)

More bandits, more breaches

As we explore these options, cybercriminals will continue to test our systems’ vulnerabilities relentlessly and will penetrate inadequate defenses. The incidence of data breaches continues to increase (780 in the U.S. in 2015), as does the sophistication of the attacks. Those seeking unauthorized access to personal data are devising increasingly subtle ploys. Social-engineering fraud preys on our gullibility and turns our socially-shared information against us.

Leaky connections

The profusion of connected devices spawned by the Internet of Things (IoT) will expose still more of our data to additional “controllers” and attacks. The Gartner Group estimates that the number of connected things will reach 25 billion by 2020.

And the range of entities seeking to use information about our behavior and demographic data keeps expanding: note the granularity of voter profiling in the current U.S. presidential race. Psycho-graphic, behavioral microtargeting is providing candidates’ campaigns with detailed information gleaned from voters’ “Like” patterns on social media.

As with any data stored in the cloud, these records can be leaked. A researcher was able to access 191 million voting records from one database a few weeks ago and an additional 56 million records from another.

New rules of the road

We can all expect to be rated on our data-ethics performance and our reliability vis-à-vis privacy and security. Driven by both consumer pressure and the risks of cybercrime, businesses will continue to adapt by creating new roles (chief privacy officer), adopting new regulations, developing new privacy-enhancing technologies (so-called PETs), and implementing new policies and training, all addressing data security and data ethics. The economic and reputational risks of failing to do so could be crippling.

So who says privacy is dead? 93% of Americans feel that it is important to control who can get information about them and 90% feel it’s important to control what information is collected. Those numbers unequivocally refute any claim to privacy’s demise. To ignore them is akin to junk food marketers asserting that healthy eating is dead.

Privacy will be dead when we digital citizens give it up. Nothing indicates that moment is near.


Read additional perspectives on what to expect in the privacy space in 2016:

  • Mary Meehan writing about consumer culture in Forbes
  • Christos K. Dimitriadis writing about cyber-risk trends in TechInsider
  • Victor Pineiro writing about social-media marketing trends in AdAge
  • Global design firm Fjord predicts: “big data will get some manners.” Let’s hope they are correct.

Photo credit: Russell Johnson

Try bitpuf!

bitpuf blackboard blog 5 types of content that shouldn't live forever

5 Types of Content that Shouldn’t Last Forever

Message in a bottle

Journalist John Markoff recently reported on a potential breakthrough in storage technology that could make it possible to store all the world’s data on synthetic DNA. It would fit in 12 wine bottles.

The Library of Congress holds more than 160 million items in 470 languages stored on approximately 838 miles of bookshelves: works of literature, scientific data, presidential papers, sheet music, rare manuscripts and maps…there are so many things worth preserving and archiving.

But there are even more that are not: grocery lists, casual emails and text messages, social media posts, telephone conversations, memos, homework assignments, doodles…Think about what it takes to store all the content produced by a single person in one year!

Digital is different

While we must file away important documents in a safe place—a signed original, for example—we do not want multiple digital copies stored indefinitely elsewhere. Yet that is precisely what happens when we share content using email and many file-sharing services.

Often, we cannot take the steps we’d like to protect sensitive information: deleting a file after it’s delivered digitally isn’t always the same as shredding its physical equivalent. In many cases, once we’ve sent it, its fate is out of our control.

And then there’s all of the not-worth-saving stuff that clutters our digital lives.

We’ve become digital hoarders

In transitioning to the digital world, we have failed to apply the same selectivity that drives our behavior in sorting through our physical materials. When was the last time you culled outdated files from your computer or old messages from your inbox? If we were to retain every piece of paper that passes through our lives, we’d be buried in it.

Here are 5 distinctly un-storage-worthy kinds of digital content.

1. Every photo ever taken

Today’s mobile phones produce fantastic, high-quality images and it’s very tempting to tap the screen. So much easier than working with manual focus cameras, cellulose film, the developing process, and leather-bound albums.

There’s a powerful impulse to capture a scene, a moment, a memorable event, to create a visual reminder, to save ourselves the time and effort of writing something down. Few of us enjoy the task of selecting, deleting, transferring, and uploading these digital images. But just because we can keep all of this stuff, doesn’t mean we should.

2. Casual communications

R u home yet? We need more milk. Are we still on for 1?

Once uttered, these exchanges lose all of their value. Digital advertisers might want to know that you have run out of milk or where you are at 1:00. But what further value do the messages bring you?

3. Time-sensitive content

A coupon expires after a certain date, a reminder is pointless after the fact, an invitation no longer needed following an event. Keeping these around wastes energy and space.

4. Confidential material

The convenience of electronic delivery is one of the great universal upsides of information technology. Just don’t forget the downsides: data breaches, identity fraud, lack of privacy control. When you email a copy of your 1099 to your accountant, or SMS a password to your spouse, you usually lose the ability to “shred” these digitally.

5. Private information

Who hasn’t expressed a private thought in an email to a friend? Maybe we’ve disclosed things that we’d prefer to be forgotten. The spoken word is ephemeral and more easily left behind. Our digital trifles follow us around.

We need to be more discerning with our digital content, to distinguish what we share by its intended lifespan and its vulnerability once it leaves our fingertips.

For neverlasting content, there’s always bitpuf.

Photo credit: dolphfyn / Fotolia
 

Try bitpuf!
 

bitpuf for Professional Use

bitpuf for Professionals

Are you capturing the value of bitpuf in your professional work?

bitpuf offers an easy-to-use, secure platform for sharing content, from images and videos to confidential documents.

Attorneys, accountants, investment advisors, doctors, engineers, realtors, and designers exchange files with clients, patients, and colleagues every day. Often these documents contain sensitive information (e.g., tax, financial, or medical data, business IP, contracts). How do you ensure that they remain secure? How much time do you spend managing the whole exchange?

We’ve highlighted below some of the business benefits of the bitpuf platform. Have a look and discover for yourself its simplicity, security, convenience, and control.

 Secure and Private

  • Encryption of all content, both in transit and at rest
  • No advertisements, no cookies
  • No personal information requested, collected or shared
  • No need to send anything through email–easy, direct user-to-user sharing
  • Content is always deleted, never archived

Easy to Use

  • Nothing to install or manage
  • No password management
  • Flexible access from any device: desktop, laptop, iOS & Android
  • Logical organization of content into Clips
  • All files, images, videos, text, and comments are visible and accessible from a single Clip

Instant Monitoring

  • Automated notification to acknowledge receipt (Clip has been viewed)
  • Automated alert to recipients for new Clips
  • Ability to comment on and reply to a Clip’s contents instantly

Efficient Workflow

  • Revisions and updates are pushed, even after a Clip has been shared (content is always current)
  • Highly specific auto-expiration can be set to the hour, e.g., tomorrow at 5:00 pm
  • Ability to share with multiple users while protecting one-to-one conversations

 
Get started!
 
For more information, contact us at inquiry@bitpuf.com.

Photo credit: Sergey Nivens / Fotolia

bitpuf blog privacy private conversation

Privacy is not what you think

Privacy is not about hiding. Secrecy is.

Privacy is about setting boundaries and making distinctions; it’s about asserting the right to control what is personal.

Privacy is:

  • trusting the postal service to deliver mail, unopened
  • having a conversation, unrecorded
  • shredding bank statements
  • asking permission, not presuming it

Unfortunately, digital privacy usually has it the other way around.

Recent research, reported by Gavin O’Malley of MediaPost, “tested 110 of the most popular Android and iOS apps on the market to see which ones shared personal, behavioral, and location data with third parties…a whopping 73% of Android apps shared personal information, such as email address with third parties, while 47% of iOS apps shared geo-coordinates and other location data,” very often without notifying users or asking for their permission.

Given the fierce debates surrounding data protection and consumer rights, it’s clear that balancing the risks and benefits of monitoring behavior, compiling dossiers, and storing data will not be easy.

bitpuf was designed to protect users’ privacy, to minimize these risks, and to create value around trust.

bitpuf does not use location or other tracking, cookies, photo tagging, or facial recognition. We ask for users’ email at sign up but nothing else. All content is fully encrypted, both in transit and “at rest.” And nothing is archived. We see privacy as an inherent right not an opting out of intrusive data collection.

Our policy is transparency because we believe privacy matters. We know that many of you share this view.

Wondering what privacy looks like on bitpuf? See for yourself!

Photo credit: nd3000 / Fotolia
 

Get started!
 

bitpuf blog neverlasting content no digital footprint

Introducing… Neverlasting content

Somewhere along our path through the digital age, we stopped distinguishing between content that we’d like to record, save, and archive and content that should disappear. We stopped recognizing the benefits of impermanence: privacy, security, and simplicity. There are many reasons for making digital content ephemeral—perhaps it is casual or short-lived, sensitive or confidential.

In the real world, we can hand off a document to our attorney, accountant, or doctor; we can have conversations, share photos, or exchange information selectively and quietly, in the moment and not beyond.

We’ve largely lost this kind of interaction in the online world, but not because it isn’t still valuable. With so much of the digital economy fueled by the highly targeted ads aimed at us, personal data has become the resource sine qua non.

Nearly every interaction we engage in online becomes part of a record. But is everything we do online worth capturing and analyzing? Surely it is not. Are we aware that we’re providing this raw material? Often we are not.

bitpuf was founded with a vision to recreate these ephemeral exchanges, to provide a secure channel for delivery, and to respect the privacy of personal data. We’re all for the convenience and pleasure of sharing online. We just believe in giving you the right to control your privacy and to choose whether your content will last forever.

bitpuf it!

Photo credit: Silroby / Fotolia