Completed
Long-term sources are common, with trust built over time, truly anonymous sources are rare.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Understanding and Designing for End Users' Security Expectations - Franziska Roesner - USENIX Enigma Conference - 2017
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Journalists can benefit from security tools...
- 3 but don't often use these tools in practice.
- 4 Interviews with Journalists
- 5 Choice of communication technology is often driven by the source - and many sources are not tech-savvy.
- 6 Long-term sources are common, with trust built over time, truly anonymous sources are rare.
- 7 Interviews with Journalistic Orgs
- 8 Journalists and organizational stakeholders share some concerns and perspectives but differ on others.
- 9 Tool Design and Prototype
- 10 Usable Encrypted Email?
- 11 Towards (More) Usable Encrypted Email
- 12 Our Tool: Confidante
- 13 Usability Study
- 14 Using Keybase for automated key management is promising: easy to use, many errors avoided.
- 15 Security concerns and usability challenges remain...
- 16 Journalists and lawyers have different operational constraints and different threat models.
- 17 Conclusion
- 18 Acknowledgements