Presentation at CascadeSF explaining why privacy matters and how to build more secure user experiences. Includes new frontiers in UX, including multi-app integration, ambient displays, and IoT. https://www.eventbrite.com/e/uxnight-designing-to-build-trust-tickets-18832593795
9. Designing to Build Trust
Introduction
Why Privacy Matters
Building Better Basics
Exploring New Frontiers
Conclusion
@ameellio #UXNight
10. Your online
behavior leaves
traces that can
identify you
Your online
behavior is
monitored
Image: Kajart Studio’s Tor Browser explanation
http://www.kajart.com/portfolio/tor-project-
educational-animation-english/
11. Combined with
your offline
movements and
activities, your
behavior is tracked
Image: Kajart Studio’s Tor Browser explanation
http://www.kajart.com/portfolio/tor-project-
educational-animation-english/
13. Adults “agree” or “strongly
agree” that we should be
concerned about the
government’s monitoring of
phone calls and internet
communications.
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
Adults “agree” or “strongly
agree” that consumers have
lost control over how personal
information is collected and
used by companies
91% 80%
14. In 2014, governments requested data about
https://govtrequests.facebook.com
99,715accounts
16. 80 million people effected by the Anthem hack, 10s of millions of children
http://www.nbcnews.com/business/personal-finance/millions-children-exposed-id-theft-through-anthem-
breach-n308116
After a data breach,
people have longer
lifespans than companies
19. | +---+ +---+
+---+ ^
/ +---+ +---+ +---+
/ | F |--->| H |--->| I |
+---+ +---+ +---+
/ ^
/ /
+ +---+ +---+ +---+
|--->| I |--->| H | | M |
+ +---+ +---+ +---+
^
|
+-----------+ +------+ +---+
--| Bridge CA |-------->| TA X |-->| L |
+-----------+ +------+ +---+
/ ^
v v v
-+ +------+ +---+ +---+
| | TA Z | | J | | N |
-+ +------+ +---+ +---+
/
v v v v v
---+ +---+ +---+ +---+ +----+
C | | O | | P | | K | | EE |
---+ +---+ +---+ +---+ +----+
/ /
v v v v v v
-+ +---+ +---+ +---+ +---+ +---+
| | A | | B | | Q | | R | | S |
-+ +---+ +---+ +---+ +---+ +---+
| +---+ +---+
| ^
| /
| /
+------+ +-----------+ +------+ +---+ +-
| TA W |<----->| Bridge CA |<------>| TA X |-->| L |-->|
+------+ +-----------+ +------+ +---+ +-
^ ^
/
/
v v v v
+------+ +------+ +---+ +---
| TA Y | | TA Z | | J | | N
+------+ +------+ +---+ +---
/ / | |
/ / | |
/ / v v
v v v v +---+ +----
+---+ +---+ +---+ +---+ | K | | EE
| A |<--->| C | | O | | P | +---+ +----
+---+ +---+ +---+ +---+
/ /
/ /
/ v v v
v v +---+ +---+ +---+
+---+ | Q | | R | | S |
| B | +---+ +---+ +---+
+---+ |
/ |
/ |
v v v
+---+ +---+ +---+
| E | | D | | T |
+---+ +---+ +---+
Figure 9 - Four Bridged PKIs
You don’t need to be a
cryptographer to work in
security
50. How might we …
create smooth
seams between
experiences?
51. Get involved with Simply Secure
Follow @simplysecureorg on Twitter
Email slack@simplysecure.org to request access
to our Slack (UX, security, privacy)
Share your work
Become a peer reviewer or mentor
@ameellio #UXNight
54. Get involved
Follow @simplysecureorg on Twitter
Email slack@simplysecure.org to request access
to our Slack (UX, security, privacy)
Share your work
Become a peer reviewer or mentor
@ameellio #UXNight