SlideShare a Scribd company logo
Waterhouse:
secure e-mail for human beings
          Alex Lambert
          Steve Bezek
COGNITIVE WALKTHROUGH
Task: E-mail a friend


                                            I’ll start by typing Karen’s
                                            name in the “to” box, just
                                                  like I always have.

                             Drop down menu for autocomplete (as in Gmail)

                        Karrie Karahalios
                        <kkarahal@cs.uiuc.edu>
                                                                          Hey, after I installed
                                                                     Waterhouse, I started seeing
                        Nitin Karmarkar                              my Facebook friends’ pictures
                                                                      here. Cool! This lock is new,
                        <nitink@uw.edu>                              too…must have something to
                                                                            do with security.
                        Karen Chau
                        <karen@ageff.com>
Task: E-mail a friend


                                                                                                      After I chose Steve’s name,
                                                                                                       it added a lock icon. This
                                                                                                       must mean something is
                                                                                                                 secure.




                      Extra protection: Your message will be sent securely. Evil hackers won’t be able to intercept and read it. Learn more   X




 I guess this is an                                                                                    Ahh…this is what the lock
improvement over              Now I feel a lot better about                                           icon must mean. I hate evil
    usual e-mail.                sending my credit card                                                        hackers.
                               number to Steve. I always
                               hear stories about hackers
                              stealing credit cards online.
Task: E-mail a friend




            For extra protection, ask Jordan to use Waterhouse and add him as a Facebook friend. Learn more




                        I guess this message doesn’t have the
                           extra protection. If I were sending
                       something important, I might want the
                      extra protection. When that happens, I’ll
                                   click “Learn more”.
Task: Receive e-mail from a
           friend




                                                                      You can be confident
                                                                     that Steve Bezek really
                                                                       sent this message.

                                                                          Learn more

                     Hey, it’s Steve’s picture. Cool! Hey, I guess
                      he really sent this. Good to know, after
                       that Chancellor thing. I hate hackers.
Task: Receive e-mail from a
           friend




                                                                     You can be confident
                                                                   that Steve Bezek really
                                                                   sent this message, and
                                                                    that evil hackers can’t
                                                                            read it.

                        Hey, cool, Steve really sent this and            Learn more
                      hackers can’t read it. I feel better about
                                 using e-mail now.
HEURISTIC EVALUATION
Validity of system status
• We provide feedback through the familiar lock
  icon
• We update the “extra protection” message as
  the user chooses recipients
• There’s always a “learn more” link next to our
  UI text.
Match between system and the real
              world
• We never use terms like “encrypt”, “sign”,
  “private key”, “public key”, “RSA”, “1024-bit”, etc.
• We intentionally use colloquial terms like “evil
  hackers” and “extra protection” because they
  resonate with average users’ understanding of
  security
• Simple shorthand: when I see the sender’s
  picture, I know I can trust it
• Picture provides an important incentive outside
  of security benefits (which are likely boring to the
  average user)
User control and freedom
• No worse than conventional e-mail interface
• User can temporarily disable “extra
  protection” using the small “X” in the
  composition screen
• Easy to uninstall
  – Can gracefully degrade even if removed
    improperly: “if the recipient’s Waterhouse client
    hasn’t updated in x days, assume the user
    uninstalled it and ignore his public key (send
    without encryption)”
Consistency and standards
• Unobtrusive extension to e-mail interface
• Doesn’t disturb any existing workflows – just
  makes things better
Help users recognize, diagnose, and
          recover from errors
• Can gracefully degrade even if removed improperly: “if
  the recipient’s Waterhouse client hasn’t updated in x
  days, assume the user uninstalled it and ignore his public
  key (send without encryption)”
• If something fails (can’t reach Facebook), replace “extra
  protection” guarantee with a short message with a
  reasonable explanation
• If signature is missing or bogus, just don’t display the
  extra sender ID panel (in lieu of scary red error message,
  since experience shows the user won’t understand it and
  they can’t take corrective action anyway)
• (Possibility for error reporting to detect bugs in our
  client)
Error prevention
• Hard to make errors: can’t make (m)any
  choices
• Signing is automatic everywhere
• Address book and key list constantly refreshed
• Uses long-term credentials to access Facebook
• Graceful failure if recipient reads an encrypted
  message on non-Waterhouse client (“This
  secure message was sent using Waterhouse;
  please install...”)
Recognition above recall
• Only three things you can really do: send secure
  e-mail, uninstall, or change your Facebook
  account
• No menus
• No choices for security level: automatically sends
  with best security possible
• Minimal configuration options integrated with
  “Settings” UI for e-mail client
• Face recognition  security
   – (And it’s much quicker to recognize a face than to read
     a security statement and remember what it means)
Flexibility and efficiency of use
• It just works: automatically determines the
  best security options for your recipients
  – ALL outgoing messages are signed
  – No friendship: sign only
  – Encrypt iff the recipient has Waterhouse (public
    key in directory) and is a Facebook friend
• No accelerators needed; rides on existing
  composition UI
Aesthetic and minimalist design
• Incredibly simple design
  – “Why Johnny Can’t Encrypt” missed a key point:
    users shouldn’t have to use a dedicated security
    UI
  – Integrates into existing workflow
  – Looks just like existing e-mail client (e.g. Gmail)
• Secure by default
Help and documentation
• “Learn more” links for every Waterhouse
  message
• Help content will be written assuming that
  user doesn’t care about details
• Advanced technical details allow independent
  evaluation (important for tech-savvy early
  adopters)
Another benefit
“The societal benefit of building an
  infrastructure that protects well against
  passive attacks is that it makes it much harder
  to do undetected bulk monitoring of the
  population. It's a defense against police-
  states, not against policemen.”
John Gilmore, on the motivation for FreeS/WAN,
  his open-source IPsec implementation

More Related Content

Recently uploaded

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 

Recently uploaded (20)

Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 

Featured

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
Alireza Esmikhani
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
Project for Public Spaces & National Center for Biking and Walking
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
Erica Santiago
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Evaluation and Walkthrough

  • 1. Waterhouse: secure e-mail for human beings Alex Lambert Steve Bezek
  • 3. Task: E-mail a friend I’ll start by typing Karen’s name in the “to” box, just like I always have. Drop down menu for autocomplete (as in Gmail) Karrie Karahalios <kkarahal@cs.uiuc.edu> Hey, after I installed Waterhouse, I started seeing Nitin Karmarkar my Facebook friends’ pictures here. Cool! This lock is new, <nitink@uw.edu> too…must have something to do with security. Karen Chau <karen@ageff.com>
  • 4. Task: E-mail a friend After I chose Steve’s name, it added a lock icon. This must mean something is secure. Extra protection: Your message will be sent securely. Evil hackers won’t be able to intercept and read it. Learn more X I guess this is an Ahh…this is what the lock improvement over Now I feel a lot better about icon must mean. I hate evil usual e-mail. sending my credit card hackers. number to Steve. I always hear stories about hackers stealing credit cards online.
  • 5. Task: E-mail a friend For extra protection, ask Jordan to use Waterhouse and add him as a Facebook friend. Learn more I guess this message doesn’t have the extra protection. If I were sending something important, I might want the extra protection. When that happens, I’ll click “Learn more”.
  • 6. Task: Receive e-mail from a friend You can be confident that Steve Bezek really sent this message. Learn more Hey, it’s Steve’s picture. Cool! Hey, I guess he really sent this. Good to know, after that Chancellor thing. I hate hackers.
  • 7. Task: Receive e-mail from a friend You can be confident that Steve Bezek really sent this message, and that evil hackers can’t read it. Hey, cool, Steve really sent this and Learn more hackers can’t read it. I feel better about using e-mail now.
  • 9. Validity of system status • We provide feedback through the familiar lock icon • We update the “extra protection” message as the user chooses recipients • There’s always a “learn more” link next to our UI text.
  • 10. Match between system and the real world • We never use terms like “encrypt”, “sign”, “private key”, “public key”, “RSA”, “1024-bit”, etc. • We intentionally use colloquial terms like “evil hackers” and “extra protection” because they resonate with average users’ understanding of security • Simple shorthand: when I see the sender’s picture, I know I can trust it • Picture provides an important incentive outside of security benefits (which are likely boring to the average user)
  • 11. User control and freedom • No worse than conventional e-mail interface • User can temporarily disable “extra protection” using the small “X” in the composition screen • Easy to uninstall – Can gracefully degrade even if removed improperly: “if the recipient’s Waterhouse client hasn’t updated in x days, assume the user uninstalled it and ignore his public key (send without encryption)”
  • 12. Consistency and standards • Unobtrusive extension to e-mail interface • Doesn’t disturb any existing workflows – just makes things better
  • 13. Help users recognize, diagnose, and recover from errors • Can gracefully degrade even if removed improperly: “if the recipient’s Waterhouse client hasn’t updated in x days, assume the user uninstalled it and ignore his public key (send without encryption)” • If something fails (can’t reach Facebook), replace “extra protection” guarantee with a short message with a reasonable explanation • If signature is missing or bogus, just don’t display the extra sender ID panel (in lieu of scary red error message, since experience shows the user won’t understand it and they can’t take corrective action anyway) • (Possibility for error reporting to detect bugs in our client)
  • 14. Error prevention • Hard to make errors: can’t make (m)any choices • Signing is automatic everywhere • Address book and key list constantly refreshed • Uses long-term credentials to access Facebook • Graceful failure if recipient reads an encrypted message on non-Waterhouse client (“This secure message was sent using Waterhouse; please install...”)
  • 15. Recognition above recall • Only three things you can really do: send secure e-mail, uninstall, or change your Facebook account • No menus • No choices for security level: automatically sends with best security possible • Minimal configuration options integrated with “Settings” UI for e-mail client • Face recognition  security – (And it’s much quicker to recognize a face than to read a security statement and remember what it means)
  • 16. Flexibility and efficiency of use • It just works: automatically determines the best security options for your recipients – ALL outgoing messages are signed – No friendship: sign only – Encrypt iff the recipient has Waterhouse (public key in directory) and is a Facebook friend • No accelerators needed; rides on existing composition UI
  • 17. Aesthetic and minimalist design • Incredibly simple design – “Why Johnny Can’t Encrypt” missed a key point: users shouldn’t have to use a dedicated security UI – Integrates into existing workflow – Looks just like existing e-mail client (e.g. Gmail) • Secure by default
  • 18. Help and documentation • “Learn more” links for every Waterhouse message • Help content will be written assuming that user doesn’t care about details • Advanced technical details allow independent evaluation (important for tech-savvy early adopters)
  • 19. Another benefit “The societal benefit of building an infrastructure that protects well against passive attacks is that it makes it much harder to do undetected bulk monitoring of the population. It's a defense against police- states, not against policemen.” John Gilmore, on the motivation for FreeS/WAN, his open-source IPsec implementation