SlideShare a Scribd company logo
1 of 19
Download to read offline
Waterhouse:
secure e-mail for human beings
          Alex Lambert
          Steve Bezek
COGNITIVE WALKTHROUGH
Task: E-mail a friend


                                            I’ll start by typing Karen’s
                                            name in the “to” box, just
                                                  like I always have.

                             Drop down menu for autocomplete (as in Gmail)

                        Karrie Karahalios
                        <kkarahal@cs.uiuc.edu>
                                                                          Hey, after I installed
                                                                     Waterhouse, I started seeing
                        Nitin Karmarkar                              my Facebook friends’ pictures
                                                                      here. Cool! This lock is new,
                        <nitink@uw.edu>                              too…must have something to
                                                                            do with security.
                        Karen Chau
                        <karen@ageff.com>
Task: E-mail a friend


                                                                                                      After I chose Steve’s name,
                                                                                                       it added a lock icon. This
                                                                                                       must mean something is
                                                                                                                 secure.




                      Extra protection: Your message will be sent securely. Evil hackers won’t be able to intercept and read it. Learn more   X




 I guess this is an                                                                                    Ahh…this is what the lock
improvement over              Now I feel a lot better about                                           icon must mean. I hate evil
    usual e-mail.                sending my credit card                                                        hackers.
                               number to Steve. I always
                               hear stories about hackers
                              stealing credit cards online.
Task: E-mail a friend




            For extra protection, ask Jordan to use Waterhouse and add him as a Facebook friend. Learn more




                        I guess this message doesn’t have the
                           extra protection. If I were sending
                       something important, I might want the
                      extra protection. When that happens, I’ll
                                   click “Learn more”.
Task: Receive e-mail from a
           friend




                                                                      You can be confident
                                                                     that Steve Bezek really
                                                                       sent this message.

                                                                          Learn more

                     Hey, it’s Steve’s picture. Cool! Hey, I guess
                      he really sent this. Good to know, after
                       that Chancellor thing. I hate hackers.
Task: Receive e-mail from a
           friend




                                                                     You can be confident
                                                                   that Steve Bezek really
                                                                   sent this message, and
                                                                    that evil hackers can’t
                                                                            read it.

                        Hey, cool, Steve really sent this and            Learn more
                      hackers can’t read it. I feel better about
                                 using e-mail now.
HEURISTIC EVALUATION
Validity of system status
• We provide feedback through the familiar lock
  icon
• We update the “extra protection” message as
  the user chooses recipients
• There’s always a “learn more” link next to our
  UI text.
Match between system and the real
              world
• We never use terms like “encrypt”, “sign”,
  “private key”, “public key”, “RSA”, “1024-bit”, etc.
• We intentionally use colloquial terms like “evil
  hackers” and “extra protection” because they
  resonate with average users’ understanding of
  security
• Simple shorthand: when I see the sender’s
  picture, I know I can trust it
• Picture provides an important incentive outside
  of security benefits (which are likely boring to the
  average user)
User control and freedom
• No worse than conventional e-mail interface
• User can temporarily disable “extra
  protection” using the small “X” in the
  composition screen
• Easy to uninstall
  – Can gracefully degrade even if removed
    improperly: “if the recipient’s Waterhouse client
    hasn’t updated in x days, assume the user
    uninstalled it and ignore his public key (send
    without encryption)”
Consistency and standards
• Unobtrusive extension to e-mail interface
• Doesn’t disturb any existing workflows – just
  makes things better
Help users recognize, diagnose, and
          recover from errors
• Can gracefully degrade even if removed improperly: “if
  the recipient’s Waterhouse client hasn’t updated in x
  days, assume the user uninstalled it and ignore his public
  key (send without encryption)”
• If something fails (can’t reach Facebook), replace “extra
  protection” guarantee with a short message with a
  reasonable explanation
• If signature is missing or bogus, just don’t display the
  extra sender ID panel (in lieu of scary red error message,
  since experience shows the user won’t understand it and
  they can’t take corrective action anyway)
• (Possibility for error reporting to detect bugs in our
  client)
Error prevention
• Hard to make errors: can’t make (m)any
  choices
• Signing is automatic everywhere
• Address book and key list constantly refreshed
• Uses long-term credentials to access Facebook
• Graceful failure if recipient reads an encrypted
  message on non-Waterhouse client (“This
  secure message was sent using Waterhouse;
  please install...”)
Recognition above recall
• Only three things you can really do: send secure
  e-mail, uninstall, or change your Facebook
  account
• No menus
• No choices for security level: automatically sends
  with best security possible
• Minimal configuration options integrated with
  “Settings” UI for e-mail client
• Face recognition  security
   – (And it’s much quicker to recognize a face than to read
     a security statement and remember what it means)
Flexibility and efficiency of use
• It just works: automatically determines the
  best security options for your recipients
  – ALL outgoing messages are signed
  – No friendship: sign only
  – Encrypt iff the recipient has Waterhouse (public
    key in directory) and is a Facebook friend
• No accelerators needed; rides on existing
  composition UI
Aesthetic and minimalist design
• Incredibly simple design
  – “Why Johnny Can’t Encrypt” missed a key point:
    users shouldn’t have to use a dedicated security
    UI
  – Integrates into existing workflow
  – Looks just like existing e-mail client (e.g. Gmail)
• Secure by default
Help and documentation
• “Learn more” links for every Waterhouse
  message
• Help content will be written assuming that
  user doesn’t care about details
• Advanced technical details allow independent
  evaluation (important for tech-savvy early
  adopters)
Another benefit
“The societal benefit of building an
  infrastructure that protects well against
  passive attacks is that it makes it much harder
  to do undetected bulk monitoring of the
  population. It's a defense against police-
  states, not against policemen.”
John Gilmore, on the motivation for FreeS/WAN,
  his open-source IPsec implementation

More Related Content

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Evaluation and Walkthrough

  • 1. Waterhouse: secure e-mail for human beings Alex Lambert Steve Bezek
  • 3. Task: E-mail a friend I’ll start by typing Karen’s name in the “to” box, just like I always have. Drop down menu for autocomplete (as in Gmail) Karrie Karahalios <kkarahal@cs.uiuc.edu> Hey, after I installed Waterhouse, I started seeing Nitin Karmarkar my Facebook friends’ pictures here. Cool! This lock is new, <nitink@uw.edu> too…must have something to do with security. Karen Chau <karen@ageff.com>
  • 4. Task: E-mail a friend After I chose Steve’s name, it added a lock icon. This must mean something is secure. Extra protection: Your message will be sent securely. Evil hackers won’t be able to intercept and read it. Learn more X I guess this is an Ahh…this is what the lock improvement over Now I feel a lot better about icon must mean. I hate evil usual e-mail. sending my credit card hackers. number to Steve. I always hear stories about hackers stealing credit cards online.
  • 5. Task: E-mail a friend For extra protection, ask Jordan to use Waterhouse and add him as a Facebook friend. Learn more I guess this message doesn’t have the extra protection. If I were sending something important, I might want the extra protection. When that happens, I’ll click “Learn more”.
  • 6. Task: Receive e-mail from a friend You can be confident that Steve Bezek really sent this message. Learn more Hey, it’s Steve’s picture. Cool! Hey, I guess he really sent this. Good to know, after that Chancellor thing. I hate hackers.
  • 7. Task: Receive e-mail from a friend You can be confident that Steve Bezek really sent this message, and that evil hackers can’t read it. Hey, cool, Steve really sent this and Learn more hackers can’t read it. I feel better about using e-mail now.
  • 9. Validity of system status • We provide feedback through the familiar lock icon • We update the “extra protection” message as the user chooses recipients • There’s always a “learn more” link next to our UI text.
  • 10. Match between system and the real world • We never use terms like “encrypt”, “sign”, “private key”, “public key”, “RSA”, “1024-bit”, etc. • We intentionally use colloquial terms like “evil hackers” and “extra protection” because they resonate with average users’ understanding of security • Simple shorthand: when I see the sender’s picture, I know I can trust it • Picture provides an important incentive outside of security benefits (which are likely boring to the average user)
  • 11. User control and freedom • No worse than conventional e-mail interface • User can temporarily disable “extra protection” using the small “X” in the composition screen • Easy to uninstall – Can gracefully degrade even if removed improperly: “if the recipient’s Waterhouse client hasn’t updated in x days, assume the user uninstalled it and ignore his public key (send without encryption)”
  • 12. Consistency and standards • Unobtrusive extension to e-mail interface • Doesn’t disturb any existing workflows – just makes things better
  • 13. Help users recognize, diagnose, and recover from errors • Can gracefully degrade even if removed improperly: “if the recipient’s Waterhouse client hasn’t updated in x days, assume the user uninstalled it and ignore his public key (send without encryption)” • If something fails (can’t reach Facebook), replace “extra protection” guarantee with a short message with a reasonable explanation • If signature is missing or bogus, just don’t display the extra sender ID panel (in lieu of scary red error message, since experience shows the user won’t understand it and they can’t take corrective action anyway) • (Possibility for error reporting to detect bugs in our client)
  • 14. Error prevention • Hard to make errors: can’t make (m)any choices • Signing is automatic everywhere • Address book and key list constantly refreshed • Uses long-term credentials to access Facebook • Graceful failure if recipient reads an encrypted message on non-Waterhouse client (“This secure message was sent using Waterhouse; please install...”)
  • 15. Recognition above recall • Only three things you can really do: send secure e-mail, uninstall, or change your Facebook account • No menus • No choices for security level: automatically sends with best security possible • Minimal configuration options integrated with “Settings” UI for e-mail client • Face recognition  security – (And it’s much quicker to recognize a face than to read a security statement and remember what it means)
  • 16. Flexibility and efficiency of use • It just works: automatically determines the best security options for your recipients – ALL outgoing messages are signed – No friendship: sign only – Encrypt iff the recipient has Waterhouse (public key in directory) and is a Facebook friend • No accelerators needed; rides on existing composition UI
  • 17. Aesthetic and minimalist design • Incredibly simple design – “Why Johnny Can’t Encrypt” missed a key point: users shouldn’t have to use a dedicated security UI – Integrates into existing workflow – Looks just like existing e-mail client (e.g. Gmail) • Secure by default
  • 18. Help and documentation • “Learn more” links for every Waterhouse message • Help content will be written assuming that user doesn’t care about details • Advanced technical details allow independent evaluation (important for tech-savvy early adopters)
  • 19. Another benefit “The societal benefit of building an infrastructure that protects well against passive attacks is that it makes it much harder to do undetected bulk monitoring of the population. It's a defense against police- states, not against policemen.” John Gilmore, on the motivation for FreeS/WAN, his open-source IPsec implementation