Explore the world's #1 largest database of ideas and innovations, with over 400,000 inspiring examples.
Uncover major shifts and emerging opportunities with our exclusive PRO research.
Trend Reports
Discover why 750 brands rely on our AI-powered Trend Reports to get better, faster insights.
Join over 200,000 subscribers who rely on our weekly newsletter to keep up with need-to-know trends and insights.
Join 20,000,000+ people getting better and faster with our New York Times Bestselling methods, best innovation books & keynote videos.
Get special access to premium content, topic tracking and customizable tools through our AI-powered Dashboard.
Learn how the Trend Hunter harnesses the power of artificial intelligence.
Enhance your innovation potential with a deeper understanding of your unique innovation archetype and how your organization benchmarks.
Accelerate innovation and ignite disruptive thinking with our award-winning programs and research.
Keynotes, Workshops & Webinars
Empower your team with the insights and frameworks they need to innovate better and faster.
Custom Research
Get fast, customized trend reports, presentations and deep dives 20x faster than traditional research.
Get started today with a free consultation, our self-serve tools, or a dedicated program.
Jeremy Gutsche
Ignite your event or virtual event with our CEO, a NY Times Bestselling Author and one of the top innovation keynote speakers.
Our Team of Speakers & Virtual Presenters
Inspire your group with our most popular speakers on innovation, trends, change and futurism.
Get in touch to learn more, ask a question or submit a tip.
About Us
Learn more about Trend Hunter and how we accelerate innovation.
Get answers to common questions about Trend Hunter.
Stay on the cutting-edge with the help of the Trend Hunter community.
Meet the team trusted by hundreds of leading businesses worldwide.
Find opportunities to accelerate your career with the #1 Trend Firm.
Grow your professional skillset in an award-winning workplace.
Catch up on noteworthy Trend Hunter news and media mentions.
Build a portfolio and put your trend-spotting abilities to the test.
Supercharge your marketing by partnering with Trend Hunter.
Visit your public portfolio and browse your past articles.
Add a Trend
Write up an article and showcase your trend-spotting skills.
My Trends
Edit your articles and see how they stack up on the leaderboards.
Edit your profile, connect your social media accounts, and more.
Add a trend, customize your dashboard, or track topics.
Future Festival
World Summit
Join the world's top innovators at our 3-Day Toronto event.
Virtual Events (NEW!)
Stream our World Summit content from the comfort of your home.
Innovation Events
Explore our 2020 tour dates and find the best city to inspire your team.
Custom Events
Host a custom innovation conference in your city that will inform and inspire.
Custom Training
Bring the Future Festival experience directly to your team with custom training packages.
Search our database of over 390,000 cutting edge ideas.

Stealth Message

Self Destructing Message Service

— April 13, 2007 — Tech
The following Stealth Message website is a secure messaging system designed for communicating sensitive and confidential information. It protects your privacy, allowing you to communicate in complete confidence with friends and colleagues.

Stealth Message does all of the following:

encrypts your private messages
stores encrypted messsages anonymously
allows you to set security options including self-destruct
automatically sends a message notification to recipients
prevents forwarding of messages
helps to prevent unwanted copying of messages
sends message notifications to your existing e-mail accounts
Stealth Message requires only that you and the receiver have access to e-mail and a browser.

All you need to do is make sure that you have agreed on a shared code to access messages sent through this system. Contact your friend or colleague prior to sending the message and agree on a secret code that only the two of you will share. You may always change it later. It is recommended you do this by telephone, in person, or through an alias e-mail address. The system does not issue you a new email address and allows you to use your existing e-mail accounts to receive messages.

The system works in a 3-step process.

1. You create your message, encrypt and store it.

2. Recipients are notified by e-mail that there is a confidential message for them stored on our servers.

3. Recipients click a link back to the Stealth Message site, enter a private code, and access the message.

Messages are untraceable, and there are multiple back-up security systems in place to ensure that the content of your messages can not be accessed except by legitimate recipients. Special options help prevent recipients from accidentally making copies, forwarding your messages, or allowing them to be seen by prying eyes.

Note: the technology is optimized for IE and Netscape browsers. Some Opera browsers experience a Javascript handling error that corrupts the encryption code. Some Mac operating systems may also experience problems.

Stealth Message...because you never know who's watching.