You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 19 Next »

User Analysis

Our users are regular people, keenly interested in privacy but not necessarily knowledgeable about the technical details of cryptography. They want to discuss potentially sensitive or incriminating topics without being tracked. They could be political activists in an environment where the government doesn't support their viewpoints. They could be children wanting to discuss something without their parents seeing it. They could be researchers looking for a way to collect secure, anonymous data from others. Or they could be employees of an enterprise working on a sensitive project and don't want technical details to be divulged to outside sources.

Characteristics

  • Concerned with Privacy
  • Unconcerned with Technical Details
  • Concerned about Personal Safety

Task Analysis

General Actions

Task

Why

Where

Environment

Frequency

Effort

Taught

Pitfalls

Others Involved

Authenticate Pseudonyms

 

 

 

 

 

 

 

 

Find Public Conversations

 

 

 

 

 

 

 

 

Erase evidence of communication

 

 

 

 

 

 

 

 

Conversation Types

Task

Why

Where

Environment

Frequency

Effort

Taught

Pitfalls

Others Involved

Have a Group Conversation

 

 

 

 

 

 

 

 

Have a Public Conversation

 

 

 

 

 

 

 

 

Have a Private Conversation

 

 

 

 

 

 

 

 

Conversation Actions

Task

Why

Where

Environment

Frequency

Effort

Taught

Pitfalls

Others Involved

Join

 

 

 

 

 

 

 

 

Leave

 

 

 

 

 

 

 

 

Send

 

 

 

 

 

 

 

 

Receive

 

 

 

 

 

 

 

 

Log

 

 

 

 

 

 

 

 

  • Have a secure and anonymous group chat (private to the group).
    • Join/leave the group chat.
    • Send/receive messages.
    • Log the group chat.
  • Have a public and anonymous conversation (readable by all).
    • Join/leave the conversation.
    • Send/receive messages.
    • Log the conversation.
  • Have a direct, private, and anonymous and secure conversations.
    • Send/receive messages.
    • Log the conversation.
  • Authenticate pseudonyms.
  • Find public conversation topics.
  • Erase evidence of communication.

Questions

  • Have you ever found the need to securely converse with another person?
  • Have you ever censored what you were saying to someone because you were worried about privacy?

Interviews

Interview 1)

Interview 2)

Interview 3)

  • No labels