SlideShare a Scribd company logo
Waterhouse:
secure e-mail for human beings
          Alex Lambert
          Steve Bezek
COGNITIVE WALKTHROUGH
Task: E-mail a friend


                                            I’ll start by typing Karen’s
                                            name in the “to” box, just
                                                  like I always have.

                             Drop down menu for autocomplete (as in Gmail)

                        Karrie Karahalios
                        <kkarahal@cs.uiuc.edu>
                                                                          Hey, after I installed
                                                                     Waterhouse, I started seeing
                        Nitin Karmarkar                              my Facebook friends’ pictures
                                                                      here. Cool! This lock is new,
                        <nitink@uw.edu>                              too…must have something to
                                                                            do with security.
                        Karen Chau
                        <karen@ageff.com>
Task: E-mail a friend


                                                                                                      After I chose Steve’s name,
                                                                                                       it added a lock icon. This
                                                                                                       must mean something is
                                                                                                                 secure.




                      Extra protection: Your message will be sent securely. Evil hackers won’t be able to intercept and read it. Learn more   X




 I guess this is an                                                                                    Ahh…this is what the lock
improvement over              Now I feel a lot better about                                           icon must mean. I hate evil
    usual e-mail.                sending my credit card                                                        hackers.
                               number to Steve. I always
                               hear stories about hackers
                              stealing credit cards online.
Task: E-mail a friend




            For extra protection, ask Jordan to use Waterhouse and add him as a Facebook friend. Learn more




                        I guess this message doesn’t have the
                           extra protection. If I were sending
                       something important, I might want the
                      extra protection. When that happens, I’ll
                                   click “Learn more”.
Task: Receive e-mail from a
           friend




                                                                      You can be confident
                                                                     that Steve Bezek really
                                                                       sent this message.

                                                                          Learn more

                     Hey, it’s Steve’s picture. Cool! Hey, I guess
                      he really sent this. Good to know, after
                       that Chancellor thing. I hate hackers.
Task: Receive e-mail from a
           friend




                                                                     You can be confident
                                                                   that Steve Bezek really
                                                                   sent this message, and
                                                                    that evil hackers can’t
                                                                            read it.

                        Hey, cool, Steve really sent this and            Learn more
                      hackers can’t read it. I feel better about
                                 using e-mail now.
HEURISTIC EVALUATION
Validity of system status
• We provide feedback through the familiar lock
  icon
• We update the “extra protection” message as
  the user chooses recipients
• There’s always a “learn more” link next to our
  UI text.
Match between system and the real
              world
• We never use terms like “encrypt”, “sign”,
  “private key”, “public key”, “RSA”, “1024-bit”, etc.
• We intentionally use colloquial terms like “evil
  hackers” and “extra protection” because they
  resonate with average users’ understanding of
  security
• Simple shorthand: when I see the sender’s
  picture, I know I can trust it
• Picture provides an important incentive outside
  of security benefits (which are likely boring to the
  average user)
User control and freedom
• No worse than conventional e-mail interface
• User can temporarily disable “extra
  protection” using the small “X” in the
  composition screen
• Easy to uninstall
  – Can gracefully degrade even if removed
    improperly: “if the recipient’s Waterhouse client
    hasn’t updated in x days, assume the user
    uninstalled it and ignore his public key (send
    without encryption)”
Consistency and standards
• Unobtrusive extension to e-mail interface
• Doesn’t disturb any existing workflows – just
  makes things better
Help users recognize, diagnose, and
          recover from errors
• Can gracefully degrade even if removed improperly: “if
  the recipient’s Waterhouse client hasn’t updated in x
  days, assume the user uninstalled it and ignore his public
  key (send without encryption)”
• If something fails (can’t reach Facebook), replace “extra
  protection” guarantee with a short message with a
  reasonable explanation
• If signature is missing or bogus, just don’t display the
  extra sender ID panel (in lieu of scary red error message,
  since experience shows the user won’t understand it and
  they can’t take corrective action anyway)
• (Possibility for error reporting to detect bugs in our
  client)
Error prevention
• Hard to make errors: can’t make (m)any
  choices
• Signing is automatic everywhere
• Address book and key list constantly refreshed
• Uses long-term credentials to access Facebook
• Graceful failure if recipient reads an encrypted
  message on non-Waterhouse client (“This
  secure message was sent using Waterhouse;
  please install...”)
Recognition above recall
• Only three things you can really do: send secure
  e-mail, uninstall, or change your Facebook
  account
• No menus
• No choices for security level: automatically sends
  with best security possible
• Minimal configuration options integrated with
  “Settings” UI for e-mail client
• Face recognition  security
   – (And it’s much quicker to recognize a face than to read
     a security statement and remember what it means)
Flexibility and efficiency of use
• It just works: automatically determines the
  best security options for your recipients
  – ALL outgoing messages are signed
  – No friendship: sign only
  – Encrypt iff the recipient has Waterhouse (public
    key in directory) and is a Facebook friend
• No accelerators needed; rides on existing
  composition UI
Aesthetic and minimalist design
• Incredibly simple design
  – “Why Johnny Can’t Encrypt” missed a key point:
    users shouldn’t have to use a dedicated security
    UI
  – Integrates into existing workflow
  – Looks just like existing e-mail client (e.g. Gmail)
• Secure by default
Help and documentation
• “Learn more” links for every Waterhouse
  message
• Help content will be written assuming that
  user doesn’t care about details
• Advanced technical details allow independent
  evaluation (important for tech-savvy early
  adopters)
Another benefit
“The societal benefit of building an
  infrastructure that protects well against
  passive attacks is that it makes it much harder
  to do undetected bulk monitoring of the
  population. It's a defense against police-
  states, not against policemen.”
John Gilmore, on the motivation for FreeS/WAN,
  his open-source IPsec implementation

More Related Content

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Evaluation and Walkthrough

  • 1. Waterhouse: secure e-mail for human beings Alex Lambert Steve Bezek
  • 3. Task: E-mail a friend I’ll start by typing Karen’s name in the “to” box, just like I always have. Drop down menu for autocomplete (as in Gmail) Karrie Karahalios <kkarahal@cs.uiuc.edu> Hey, after I installed Waterhouse, I started seeing Nitin Karmarkar my Facebook friends’ pictures here. Cool! This lock is new, <nitink@uw.edu> too…must have something to do with security. Karen Chau <karen@ageff.com>
  • 4. Task: E-mail a friend After I chose Steve’s name, it added a lock icon. This must mean something is secure. Extra protection: Your message will be sent securely. Evil hackers won’t be able to intercept and read it. Learn more X I guess this is an Ahh…this is what the lock improvement over Now I feel a lot better about icon must mean. I hate evil usual e-mail. sending my credit card hackers. number to Steve. I always hear stories about hackers stealing credit cards online.
  • 5. Task: E-mail a friend For extra protection, ask Jordan to use Waterhouse and add him as a Facebook friend. Learn more I guess this message doesn’t have the extra protection. If I were sending something important, I might want the extra protection. When that happens, I’ll click “Learn more”.
  • 6. Task: Receive e-mail from a friend You can be confident that Steve Bezek really sent this message. Learn more Hey, it’s Steve’s picture. Cool! Hey, I guess he really sent this. Good to know, after that Chancellor thing. I hate hackers.
  • 7. Task: Receive e-mail from a friend You can be confident that Steve Bezek really sent this message, and that evil hackers can’t read it. Hey, cool, Steve really sent this and Learn more hackers can’t read it. I feel better about using e-mail now.
  • 9. Validity of system status • We provide feedback through the familiar lock icon • We update the “extra protection” message as the user chooses recipients • There’s always a “learn more” link next to our UI text.
  • 10. Match between system and the real world • We never use terms like “encrypt”, “sign”, “private key”, “public key”, “RSA”, “1024-bit”, etc. • We intentionally use colloquial terms like “evil hackers” and “extra protection” because they resonate with average users’ understanding of security • Simple shorthand: when I see the sender’s picture, I know I can trust it • Picture provides an important incentive outside of security benefits (which are likely boring to the average user)
  • 11. User control and freedom • No worse than conventional e-mail interface • User can temporarily disable “extra protection” using the small “X” in the composition screen • Easy to uninstall – Can gracefully degrade even if removed improperly: “if the recipient’s Waterhouse client hasn’t updated in x days, assume the user uninstalled it and ignore his public key (send without encryption)”
  • 12. Consistency and standards • Unobtrusive extension to e-mail interface • Doesn’t disturb any existing workflows – just makes things better
  • 13. Help users recognize, diagnose, and recover from errors • Can gracefully degrade even if removed improperly: “if the recipient’s Waterhouse client hasn’t updated in x days, assume the user uninstalled it and ignore his public key (send without encryption)” • If something fails (can’t reach Facebook), replace “extra protection” guarantee with a short message with a reasonable explanation • If signature is missing or bogus, just don’t display the extra sender ID panel (in lieu of scary red error message, since experience shows the user won’t understand it and they can’t take corrective action anyway) • (Possibility for error reporting to detect bugs in our client)
  • 14. Error prevention • Hard to make errors: can’t make (m)any choices • Signing is automatic everywhere • Address book and key list constantly refreshed • Uses long-term credentials to access Facebook • Graceful failure if recipient reads an encrypted message on non-Waterhouse client (“This secure message was sent using Waterhouse; please install...”)
  • 15. Recognition above recall • Only three things you can really do: send secure e-mail, uninstall, or change your Facebook account • No menus • No choices for security level: automatically sends with best security possible • Minimal configuration options integrated with “Settings” UI for e-mail client • Face recognition  security – (And it’s much quicker to recognize a face than to read a security statement and remember what it means)
  • 16. Flexibility and efficiency of use • It just works: automatically determines the best security options for your recipients – ALL outgoing messages are signed – No friendship: sign only – Encrypt iff the recipient has Waterhouse (public key in directory) and is a Facebook friend • No accelerators needed; rides on existing composition UI
  • 17. Aesthetic and minimalist design • Incredibly simple design – “Why Johnny Can’t Encrypt” missed a key point: users shouldn’t have to use a dedicated security UI – Integrates into existing workflow – Looks just like existing e-mail client (e.g. Gmail) • Secure by default
  • 18. Help and documentation • “Learn more” links for every Waterhouse message • Help content will be written assuming that user doesn’t care about details • Advanced technical details allow independent evaluation (important for tech-savvy early adopters)
  • 19. Another benefit “The societal benefit of building an infrastructure that protects well against passive attacks is that it makes it much harder to do undetected bulk monitoring of the population. It's a defense against police- states, not against policemen.” John Gilmore, on the motivation for FreeS/WAN, his open-source IPsec implementation