Encrypted messaging - Private and no tracking
===================
Privacy Disadvantages of Text Messaging and Email
-------------------------------------------------
Cell towers are used to pass on text messages and hosting computers are
used to pass on email. Both leave a trail that can be used by others to
read your message and be aware of the connection between the sender and
the receiver. Voice telephone conversations can be overheard and leave
a trail also.
Privacy Provided by Notes2
--------------------------
For most people, there is no private way to communicate. Now there is
using Notes2.
There will be no track on the senders computer
There will be no tracking since nothing has been sent
The receiver read the note directly from the Notes2 server then it
disappeared from his computer
Instructions
------------
Create a note and save it - creates the note id
Encrypt it - using a password of your choosing
Contact the receiver (The receiver need not be a Notes2 user)
Use any manner (text message, email, telephone etc) and give him/her the
id # and the password and these instructions:
Go to a browser connected to the internet
In the address bar type
notes2.com
Click the Go button on cell phone or Return key on computer
The Add Note screen will appear
Click the Passwords button
Enter the id # - click Submit button
Enter the password - Click Submit button
The note in clear text will appear
Receiver can respond at bottom of screen
When receiver leaves or refreshes the screen the note will disappear
The note will remain encrypted on the senders database
Future Communication
--------------------
Once a receiver has received a message and learned the procedure, the
sender need only transmit the id# and password. In fact if the two
agree upon a password, then only the id # needs be transmitted.
If Receiver Wants to Initiate Communication
-------------------------------------------
Become a Notes2 user. Free Trial User available for 30 days.
Updated 7jul19 jdr