Understanding and Designing for End Users' Security Expectations - Franziska Roesner - USENIX Enigma Conference - 2017

Understanding and Designing for End Users' Security Expectations - Franziska Roesner - USENIX Enigma Conference - 2017

USENIX Enigma Conference via YouTube Direct link

Long-term sources are common, with trust built over time, truly anonymous sources are rare.

6 of 18

6 of 18

Long-term sources are common, with trust built over time, truly anonymous sources are rare.

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Understanding and Designing for End Users' Security Expectations - Franziska Roesner - USENIX Enigma Conference - 2017

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Journalists can benefit from security tools...
  3. 3 but don't often use these tools in practice.
  4. 4 Interviews with Journalists
  5. 5 Choice of communication technology is often driven by the source - and many sources are not tech-savvy.
  6. 6 Long-term sources are common, with trust built over time, truly anonymous sources are rare.
  7. 7 Interviews with Journalistic Orgs
  8. 8 Journalists and organizational stakeholders share some concerns and perspectives but differ on others.
  9. 9 Tool Design and Prototype
  10. 10 Usable Encrypted Email?
  11. 11 Towards (More) Usable Encrypted Email
  12. 12 Our Tool: Confidante
  13. 13 Usability Study
  14. 14 Using Keybase for automated key management is promising: easy to use, many errors avoided.
  15. 15 Security concerns and usability challenges remain...
  16. 16 Journalists and lawyers have different operational constraints and different threat models.
  17. 17 Conclusion
  18. 18 Acknowledgements

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.