SlideShare a Scribd company logo
1 of 27
Why Johnny Can’t
Blow the Whistle:
Identifying and Reducing Usability
Issues in Anonymity Systems
Greg Norcie
Jim Blythe
Kelly Caine
L Jean Camp

February 23rd, 2014, NDSS Workshop on Usable Security
Outline
• Tor
o What is Tor?
o What is the Tor Browser Bundle (TBB)?
o Why usability is important for the TBB?
• Study 1: Identifying usability issues
• Study 2: Reducing usability issues
• Discussion of results
• Conclusions / Future work
2
Q: What is Tor and how does it work?
• Anonymity service
utilizing onion routing
technology
• 3 hops between Alice and
Bob per circuit
• Encrypted in transit, but
enters/exits in plaintext.
3

Illustration courtesy Tor Project.org
Q: What is Tor and how does it work?
• Anonymity service
utilizing onion routing
technology
• 3 hops between Alice and
Bob per circuit
• Encrypted in transit, but
enters/exits in plaintext.
4

Illustration courtesy Tor Project.org
Q: What is Tor and how does it work?
• Anonymity service
utilizing onion routing
technology
• 3 hops between Alice and
Bob per circuit
• Encrypted in transit, but
enters/exits in plaintext.
5

Illustration courtesy Tor Project.org
Q: What is the Tor Browser Bundle?
• TBB presented previously disparate tools in one simple GUI.
o Firefox (browser) + Vidalia (Proxy managment) + Tor
• Additional security features/changes to system defaults to
prevent information leakage.
o Redirecting to DuckDuckGo
o NoScript blocks certain attacks
o No Flash
• As of TBB 3.0, Vidalia has been dropped
o See http://tinyurl.com/noVidalia
6

* https://blog.torproject.org/blog/announcing-tor-browser-bundle-30alpha1
Q: Why a Browser Bundle?
• Integrated solutions tend to be more usable. [1]
• TBB presents previously disparate, command line
tools in one relatively simple GUI.
• Additional security features/changes to system
defaults to prevent information leakage in usable
manner.
– Too many settings to toggle manually

7

[1] J. Clark, P. Van Oorschot, and C. Adams. Usability of Anonymous Web Browsing:
An Examination of Tor Interfaces and Deployability. In Proceedings of the 3rd
Symposium on Usable Privacy and Security, pages 41–51. ACM, 2007.
Q: Why does usability matter?
• “Anonymity Loves Company”1
• More users = higher anonymity
• Thus, increasing # of users increases
anonymity
• Thus, increasing usability increases
anonymity.

8

[1] R. Dingledine and N. Mathewson. Anonymity Loves Company: Usability and the
Network Effect. In Proceedings of the Fifth Workshop on the Economics of Information
Security (WEIS 2006), Cambridge, UK, June, 2006.
Study 1 Goals:
• Improve TBB usability – find specific solutions
• Derive general design heuristics

9
Laboratory Think Aloud Study
• 25 students downloaded, installed Tor Browser
Bundle 2.2.35-7.1 for Windows
-22/25 male, 20/25 in 18-25 bracket
• Instructed to write down any “stop points” as they
occur + prompted afterwards to elaborate on
their exit survey.
• Responses used to create a list of specific
usability issues (and solutions)
• From specific issues, derives general heuristics
10
Analysis Process
1. Sort free responses into individual issues.
2. Generate list of mutually exclusive
categories.
3. Two coders independently categorize.[1]
4. Derive set of Tor specific Issues.
5. Derive set of general heuristics.

11

[1] J. L. Fleiss and J. Cohen. The Equivalence of Weighted Kappa and the
Intraclass Correlation Coefficient as Measures of Reliability. Educational and
Psychological Measurement, 33(3):613–619, 1973.
Initial Results - Categories
Category

N

%

Long Launch Time 13

40.6

Browsing Delay

6

18.8

Window
Discriminability

4

12.5

Archive Confusion

4

12.5

Icon Salience

3

9.4

Security Measure
Confusion

3

9.4

Download Clarity

3

9.4

TOTAL

36

12
Initial Results - Categories
Category

N

%

Long Launch Time 13

40.6

Browsing Delay

6

18.8

Window
Discriminability

4

12.5

Archive Confusion

4

12.5

Icon Salience

3

9.4

Security Measure
Confusion

3

9.4

Download Clarity

3

9.4

TOTAL

36

13
Discussion of Study 1 results
• We found that “long launch time”, “window
discriminability”, and “browsing delay” made up a
majority (56%) of reported issues.
• Moving on we will spend a few slides detailing
these issues
- (along with out proposed solutions)
• For discussion of other issues, see full paper.

14
Issue: Long Launch Time
• “The user noticed a lag
between clicking the icon
to start the Tor Browser
Bundle, and the TBB
window opening.”
• Proposed Solution: Alter
Vidalia so lag between two
is shorter
15
Issue: Window Discriminability
• “User wasn’t sure which
window was TBB and which
was a normal browser.”
• Solution 1: Custom logo.
• Solution 2: Alter Firefox
chrome via theme
• (Solution 2 later scrapped per
Roger’s suggestion since it
could out users)

16
Issue: Browsing Delay
• “Browsing through the TBB had a noticable lag.”
• Since security is a primary task, TBB users may
be willing to tolerate latency if informed
• Ex: Users in coffeeshops don’t expect the same
speeds as at home.
• Explain to users that delays are normal, and they
can adjust expectations.
-Perhaps via message in installer
17
Changes made for 2nd Study
• TBB now has it’s own
custom icon
• Lag between Vidalia
launch and TBB opening
has been greatly reduced
• Custom coded extension
warns users that delays
are to be expected when
lag >10s occurs
18
Results of Changes – Big Picture
# Reporting “No Problems” almost doubles
14
12
10
8

Study 1
Study 2

6
4
2
0

Study 1
19

Study 2
Results of Changes – Detailed Look
14

12

10

8

Study 1

6

Study 2
4

2

0

Long Launch Browsing Delay
Window
Time*
Discriminability*

20

Archive
Confusion*

Icon Salience

Security
Measure
Confusion*

Download
Clarity*
Summary of change results:
• Long Launch Time, Window Discriminability
dramatically reduced reduced (p <.001)
• Browsing delay reduced 5% (From 24% to 19%)
but this was not statistically significant
• Usability issues in extension could have
hampered experiment.
o 44% of users complained about excessive
popups
21
Heuristics for anonymity systems
1. Installation precedes operation.
2. Ensure users are aware of trade offs.
3. Say why, not how.

22
Installation Precedes Operation
• Again, anonymity loves company.
• If the user gets confused during installation, then
the usability of our user interface is irrelevant.
• We can’t control the OS, but we can make our
download page and installer as clear as possible.

23
Say Why, Not How
• Explain why a security measure was taken.
• Provide jargon free explanations
• Allow experts to drill down to detailed information

24
Ensure Users are Aware of Trade Offs
• User’s expectations are a bigger issue than
Tor’s speed
o Most users don’t try to watch Netflix at
an internet café
• When using Tor, security is a primary task
• Set reasonable expectations, users will be
happy.
25
Summary
• Contributions
o Described a set of specific Tor issues
o Described design heuristics for all 1/N
anonymity systems
• Potential future work
o Determine best parameters for Delay Detector
– how long is too long?
o Focus more on how to design warnings in
browser (Ex: unencrypted warning)
26
Acknowledgements:
• Coauthors
• Reviewers
• Department of Homeland Security under contract
number N66001-12-C-0137
• Also many thanks to the Tor Project

27

More Related Content

Similar to Why Johnny Can't Blow the Whistle

Siegel - keynote presentation, 18 may 2013
Siegel  - keynote presentation, 18 may 2013Siegel  - keynote presentation, 18 may 2013
Siegel - keynote presentation, 18 may 2013NeilSiegelslideshare
 
Towards an Agile approach to building application profiles
Towards an Agile approach to building application profilesTowards an Agile approach to building application profiles
Towards an Agile approach to building application profilesPaul Walk
 
Mark Lubeck's Work Samples
Mark Lubeck's Work SamplesMark Lubeck's Work Samples
Mark Lubeck's Work Samplesmrl1756
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxNoreen Whysel
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...NETWAYS
 
6 Things to Consider when Digitalizing a Laboratory
6 Things to Consider when Digitalizing a Laboratory6 Things to Consider when Digitalizing a Laboratory
6 Things to Consider when Digitalizing a LaboratoryTilen Kranjc
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm HereChristopher Grayson
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecuritySherif Mansour
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Cloud Security Alliance Lviv Chapter
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidSteve Branam
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009dnomura
 
From hello world to goodbye code
From hello world to goodbye codeFrom hello world to goodbye code
From hello world to goodbye codeKim Moir
 
WebRTC Standards overview.
WebRTC Standards overview.WebRTC Standards overview.
WebRTC Standards overview.Tim Panton
 
Practical usability - Making your apps better
Practical usability - Making your apps betterPractical usability - Making your apps better
Practical usability - Making your apps betterRiaan Cornelius
 

Similar to Why Johnny Can't Blow the Whistle (20)

Siegel - keynote presentation, 18 may 2013
Siegel  - keynote presentation, 18 may 2013Siegel  - keynote presentation, 18 may 2013
Siegel - keynote presentation, 18 may 2013
 
Free Net
Free NetFree Net
Free Net
 
Towards an Agile approach to building application profiles
Towards an Agile approach to building application profilesTowards an Agile approach to building application profiles
Towards an Agile approach to building application profiles
 
Mark Lubeck's Work Samples
Mark Lubeck's Work SamplesMark Lubeck's Work Samples
Mark Lubeck's Work Samples
 
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptxIAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
IAC22 Safe Tech Audit Presentation Noreen Whysel.pptx
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
stackconf 2021 | First hand experience: How Nextcloud stayed productive durin...
 
6 Things to Consider when Digitalizing a Laboratory
6 Things to Consider when Digitalizing a Laboratory6 Things to Consider when Digitalizing a Laboratory
6 Things to Consider when Digitalizing a Laboratory
 
Started In Security Now I'm Here
Started In Security Now I'm HereStarted In Security Now I'm Here
Started In Security Now I'm Here
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
Iurii Garasym - Cloud Security Alliance Now in Ukraine. Mission, Opportunitie...
 
Hci final presentation
Hci final presentationHci final presentation
Hci final presentation
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
The I in Internet of Things: Implications for the Global Open Internet
The I in Internet of Things: Implications for the Global Open InternetThe I in Internet of Things: Implications for the Global Open Internet
The I in Internet of Things: Implications for the Global Open Internet
 
EventLogging Workshop
EventLogging WorkshopEventLogging Workshop
EventLogging Workshop
 
Nomura UCCSC 2009
Nomura UCCSC 2009Nomura UCCSC 2009
Nomura UCCSC 2009
 
From hello world to goodbye code
From hello world to goodbye codeFrom hello world to goodbye code
From hello world to goodbye code
 
WebRTC Standards overview.
WebRTC Standards overview.WebRTC Standards overview.
WebRTC Standards overview.
 
Practical usability - Making your apps better
Practical usability - Making your apps betterPractical usability - Making your apps better
Practical usability - Making your apps better
 

Recently uploaded

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Why Johnny Can't Blow the Whistle

  • 1. Why Johnny Can’t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems Greg Norcie Jim Blythe Kelly Caine L Jean Camp February 23rd, 2014, NDSS Workshop on Usable Security
  • 2. Outline • Tor o What is Tor? o What is the Tor Browser Bundle (TBB)? o Why usability is important for the TBB? • Study 1: Identifying usability issues • Study 2: Reducing usability issues • Discussion of results • Conclusions / Future work 2
  • 3. Q: What is Tor and how does it work? • Anonymity service utilizing onion routing technology • 3 hops between Alice and Bob per circuit • Encrypted in transit, but enters/exits in plaintext. 3 Illustration courtesy Tor Project.org
  • 4. Q: What is Tor and how does it work? • Anonymity service utilizing onion routing technology • 3 hops between Alice and Bob per circuit • Encrypted in transit, but enters/exits in plaintext. 4 Illustration courtesy Tor Project.org
  • 5. Q: What is Tor and how does it work? • Anonymity service utilizing onion routing technology • 3 hops between Alice and Bob per circuit • Encrypted in transit, but enters/exits in plaintext. 5 Illustration courtesy Tor Project.org
  • 6. Q: What is the Tor Browser Bundle? • TBB presented previously disparate tools in one simple GUI. o Firefox (browser) + Vidalia (Proxy managment) + Tor • Additional security features/changes to system defaults to prevent information leakage. o Redirecting to DuckDuckGo o NoScript blocks certain attacks o No Flash • As of TBB 3.0, Vidalia has been dropped o See http://tinyurl.com/noVidalia 6 * https://blog.torproject.org/blog/announcing-tor-browser-bundle-30alpha1
  • 7. Q: Why a Browser Bundle? • Integrated solutions tend to be more usable. [1] • TBB presents previously disparate, command line tools in one relatively simple GUI. • Additional security features/changes to system defaults to prevent information leakage in usable manner. – Too many settings to toggle manually 7 [1] J. Clark, P. Van Oorschot, and C. Adams. Usability of Anonymous Web Browsing: An Examination of Tor Interfaces and Deployability. In Proceedings of the 3rd Symposium on Usable Privacy and Security, pages 41–51. ACM, 2007.
  • 8. Q: Why does usability matter? • “Anonymity Loves Company”1 • More users = higher anonymity • Thus, increasing # of users increases anonymity • Thus, increasing usability increases anonymity. 8 [1] R. Dingledine and N. Mathewson. Anonymity Loves Company: Usability and the Network Effect. In Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK, June, 2006.
  • 9. Study 1 Goals: • Improve TBB usability – find specific solutions • Derive general design heuristics 9
  • 10. Laboratory Think Aloud Study • 25 students downloaded, installed Tor Browser Bundle 2.2.35-7.1 for Windows -22/25 male, 20/25 in 18-25 bracket • Instructed to write down any “stop points” as they occur + prompted afterwards to elaborate on their exit survey. • Responses used to create a list of specific usability issues (and solutions) • From specific issues, derives general heuristics 10
  • 11. Analysis Process 1. Sort free responses into individual issues. 2. Generate list of mutually exclusive categories. 3. Two coders independently categorize.[1] 4. Derive set of Tor specific Issues. 5. Derive set of general heuristics. 11 [1] J. L. Fleiss and J. Cohen. The Equivalence of Weighted Kappa and the Intraclass Correlation Coefficient as Measures of Reliability. Educational and Psychological Measurement, 33(3):613–619, 1973.
  • 12. Initial Results - Categories Category N % Long Launch Time 13 40.6 Browsing Delay 6 18.8 Window Discriminability 4 12.5 Archive Confusion 4 12.5 Icon Salience 3 9.4 Security Measure Confusion 3 9.4 Download Clarity 3 9.4 TOTAL 36 12
  • 13. Initial Results - Categories Category N % Long Launch Time 13 40.6 Browsing Delay 6 18.8 Window Discriminability 4 12.5 Archive Confusion 4 12.5 Icon Salience 3 9.4 Security Measure Confusion 3 9.4 Download Clarity 3 9.4 TOTAL 36 13
  • 14. Discussion of Study 1 results • We found that “long launch time”, “window discriminability”, and “browsing delay” made up a majority (56%) of reported issues. • Moving on we will spend a few slides detailing these issues - (along with out proposed solutions) • For discussion of other issues, see full paper. 14
  • 15. Issue: Long Launch Time • “The user noticed a lag between clicking the icon to start the Tor Browser Bundle, and the TBB window opening.” • Proposed Solution: Alter Vidalia so lag between two is shorter 15
  • 16. Issue: Window Discriminability • “User wasn’t sure which window was TBB and which was a normal browser.” • Solution 1: Custom logo. • Solution 2: Alter Firefox chrome via theme • (Solution 2 later scrapped per Roger’s suggestion since it could out users) 16
  • 17. Issue: Browsing Delay • “Browsing through the TBB had a noticable lag.” • Since security is a primary task, TBB users may be willing to tolerate latency if informed • Ex: Users in coffeeshops don’t expect the same speeds as at home. • Explain to users that delays are normal, and they can adjust expectations. -Perhaps via message in installer 17
  • 18. Changes made for 2nd Study • TBB now has it’s own custom icon • Lag between Vidalia launch and TBB opening has been greatly reduced • Custom coded extension warns users that delays are to be expected when lag >10s occurs 18
  • 19. Results of Changes – Big Picture # Reporting “No Problems” almost doubles 14 12 10 8 Study 1 Study 2 6 4 2 0 Study 1 19 Study 2
  • 20. Results of Changes – Detailed Look 14 12 10 8 Study 1 6 Study 2 4 2 0 Long Launch Browsing Delay Window Time* Discriminability* 20 Archive Confusion* Icon Salience Security Measure Confusion* Download Clarity*
  • 21. Summary of change results: • Long Launch Time, Window Discriminability dramatically reduced reduced (p <.001) • Browsing delay reduced 5% (From 24% to 19%) but this was not statistically significant • Usability issues in extension could have hampered experiment. o 44% of users complained about excessive popups 21
  • 22. Heuristics for anonymity systems 1. Installation precedes operation. 2. Ensure users are aware of trade offs. 3. Say why, not how. 22
  • 23. Installation Precedes Operation • Again, anonymity loves company. • If the user gets confused during installation, then the usability of our user interface is irrelevant. • We can’t control the OS, but we can make our download page and installer as clear as possible. 23
  • 24. Say Why, Not How • Explain why a security measure was taken. • Provide jargon free explanations • Allow experts to drill down to detailed information 24
  • 25. Ensure Users are Aware of Trade Offs • User’s expectations are a bigger issue than Tor’s speed o Most users don’t try to watch Netflix at an internet café • When using Tor, security is a primary task • Set reasonable expectations, users will be happy. 25
  • 26. Summary • Contributions o Described a set of specific Tor issues o Described design heuristics for all 1/N anonymity systems • Potential future work o Determine best parameters for Delay Detector – how long is too long? o Focus more on how to design warnings in browser (Ex: unencrypted warning) 26
  • 27. Acknowledgements: • Coauthors • Reviewers • Department of Homeland Security under contract number N66001-12-C-0137 • Also many thanks to the Tor Project 27

Editor's Notes

  1. We pick a random path to our destination…We set up an entry node for all our connections then Tor distributes this to different transit nodes which distributes to different exit nodes. But the entry stays the same. Or we pick a bridge or hidden directory service that connects us to an entry nodeNote that data is only encrypted during transit…Exit nodes transmit in the clear
  2. We pick a random path to our destination…NO we set up an entry node for all our connections then Tor distributes this to different transit nodes which distributes to different exit nodes. But the entry stays the same. Or we pick a bridge or hidden directory service that connects us to an entry nodeNote that data is only encrypted during transit…Exit nodes transmit in the clear
  3. We pick a random path to our destination…NO we set up an entry node for all our connections then Tor distributes this to different transit nodes which distributes to different exit nodes. But the entry stays the same. Or we pick a bridge or hidden directory service that connects us to an entry nodeNote that data is only encrypted during transit…Exit nodes transmit in the clear
  4. Original research showed Torpark most usableAdditional features: Ex turning off javascript
  5. Original research showed Torpark most usableAdditional features: Ex turning off javascript
  6. In next slides we will detail our participant demographics, followed by our experimental procedure.
  7. Next slide we’ll describe how, then discuss these in detail
  8. Next slide we’ll describe how, then discuss these in detail
  9. (23/41)Won’t go into all the issues due to time
  10. Latency != speed
  11. N = 25 in study 1, n = 27 in study 225% and 44%
  12. We will detail on next slides
  13. Examples: Javascript, DuckDuckGo
  14. When not