2019
DOI: 10.1145/3313761
|View full text |Cite
|
Sign up to set email alerts
|

A Usability Study of Four Secure Email Tools Using Paired Participants

Abstract: Secure email is increasingly being touted as usable by novice users, with a push for adoption based on recent concerns about government surveillance. To determine whether secure email is ready for grassroots adoption, we employ a laboratory user study that recruits pairs of novice users to install and use several of the latest systems to exchange secure messages. We present both quantitative and qualitative results from 28 pairs of novices as they use Private WebMail (Pwm), Tutanota, and Virtru and 10 pairs of… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
2

Relationship

4
5

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 18 publications
0
20
0
Order By: Relevance
“…The paper included a lab usability study of PGP that failed miserably and provided a wake-up call to the security community of the importance of user-centered design. Nearly 20 years later, a lab usability study of a modern PGP web client (Mailvelope) had similarly disappointing results when 9 of 10 participant pairs were unable to exchange a secure email message after 1 h of trying to use the system [18].…”
Section: Fig 82 Email Vulnerabilitiesmentioning
confidence: 99%
“…The paper included a lab usability study of PGP that failed miserably and provided a wake-up call to the security community of the importance of user-centered design. Nearly 20 years later, a lab usability study of a modern PGP web client (Mailvelope) had similarly disappointing results when 9 of 10 participant pairs were unable to exchange a secure email message after 1 h of trying to use the system [18].…”
Section: Fig 82 Email Vulnerabilitiesmentioning
confidence: 99%
“…These annotations could be used to quickly identify group members who: (a) the user has explicitly identified as a contact, (b) the user has interacted with in another group, or (c) the group member is a contact of one of the user's contacts. This last annotation is reminiscent of PGP's web-of-trust; while the web-of-trust largely failed in email [27], it may be that it provides a reasonable way to establish trust in group chat tools due to the more closed nature of these tools and their support for instantaneous communication. This approach could also help address the key verification problem identified above.…”
Section: Improving Group Chat Toolsmentioning
confidence: 99%
“…A related challenge is that some blockchain systems require users to store, manage, and secure cryptographic keys; this requirement is known to be a significant impediment for most users. 10 Legality and regulation Some benefits claimed by blockchain systems cannot be attributed to the underlying technology, but rather to sidestepping the regulation and oversight that slows existing systems (for example, international payments or raising capital by selling virtual assets to investors). As regulators catch up, compliance is given priority.…”
Section: Usabilitymentioning
confidence: 99%