Patent attributes
The disclosed computer-implemented method may include receiving an input from a user identifying specified persons that are to be included in a concealed list of persons. The specified persons may be unaware of their inclusion in the concealed list of persons. The method may also include generating the concealed list of persons and determining that a potential participant from the user's concealed list of persons has selected the user in a corresponding concealed list of persons that belongs to the potential participant and, in response to the determination, the method may include creating a private conversation instance that is unique to the user and the potential participant. The generated private conversation instance may include an interaction interface that allows the user and the potential participant to interact in a confidential manner. Various other methods, systems, and computer-readable media are also disclosed.