Abstract: Stealth and counter messaging, in some embodiments in the context of social networking sites, is disclosed. A first user may provide a first, counter-message along with a second, stealth message. When posting the first message, its corresponding identifier as set by the social networking site is recorded in a linked relationship to the second message. When an authorized second user retrieves the first message from the social networking site, its identifier is queried to determine whether there is a corresponding second message. After locating the identifier for the first message, the associated second message is retrieved and transmitted to the second user.