2018
DOI: 10.1007/978-3-030-04762-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Co-ordinating Developers and High-Risk Users of Privacy-Enhanced Secure Messaging Protocols

Abstract: Due to the increased deployment of secure messaging protocols, differences between what developers "believe" are the needs of their users and their actual needs can have real consequences. Based on 90 interviews with both high and low-risk users, as well as the developers of popular secure messaging applications, we mapped the design choices of the protocols made by developers to the relevance of these features to threat models of both high-risk and low-risk users. Client device seizures are considered more da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…There has been considerably less work on attempting to understand what threat models and privacy properties actually match the intuitions and expectations of users. While there have been no prior usability studies of anonymous cryptocurrencies, large-scale studies of at-risk activists that show that privacy is a core concern, and that their understanding of privacy -while sometimes confused with the more narrow use of encryption -does indeed map to a global passive adversary capable of observing the metadata of their communication [18]. This threat model is also mentioned explicitly in the ZCash (Zerocash) design, which notes that "Zerocash only anonymizes the transaction ledger.…”
Section: A Threat Model and Privacy Propertiesmentioning
confidence: 99%
See 3 more Smart Citations
“…There has been considerably less work on attempting to understand what threat models and privacy properties actually match the intuitions and expectations of users. While there have been no prior usability studies of anonymous cryptocurrencies, large-scale studies of at-risk activists that show that privacy is a core concern, and that their understanding of privacy -while sometimes confused with the more narrow use of encryption -does indeed map to a global passive adversary capable of observing the metadata of their communication [18]. This threat model is also mentioned explicitly in the ZCash (Zerocash) design, which notes that "Zerocash only anonymizes the transaction ledger.…”
Section: A Threat Model and Privacy Propertiesmentioning
confidence: 99%
“…This problem is not confined to privacy-enhanced cryptocurrency wallets, but the hard problem of holistic privacy is endemic in the development of privacy-enhancing tools from web browsers like Tor to secure messaging applications like Signal. For example, Tor cannot interoperate with the popular Google Chrome browser due to the way it retrieves DNS without allowing a proxy like Tor, and Signal uses phone numbers for identities in a way that many activists feel uncomfortable with even though the Signal server itself uses advanced techniques so that it does not need to record the phone number itself [18]. Holistic privacy is likely always incomplete, as new bugs and layers of abstraction are discovered and more complex assemblages of programs created (in turn, altering their original privacy properties).…”
Section: Holistic Privacymentioning
confidence: 99%
See 2 more Smart Citations
“…Existing qualitative studies have explored security practices of different groups of higher-risk users, e.g. [23,24,29,33,37,42,69,73,74,93], but none to our knowledge have studied such practices within large-scale urban protests.…”
Section: Introductionmentioning
confidence: 99%