The Motivated Can Encrypt (Even with PGP)

Author:

Borradaile Glencora1,Kretschmer Kelsy2,Gretes Michele1,LeClerc Alexandria1

Affiliation:

1. School of Electrical Engineering and Computer Science Oregon State University

2. School of Public Policy , Oregon State University

Abstract

Abstract Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controlled lab settings. While these studies have exposed usability obstacles for the average user and offer design improvements, there exist users with an immediate need for private communication, who must cope with existing software and its limitations. We seek to understand whether individuals motivated by concrete privacy threats, such as those vulnerable to state surveil-lance, can overcome usability issues to adopt complex E2EE tools for long-term use. We surveyed regional activists, as surveillance of social movements is well-documented. Our study group includes individuals from 9 social movement groups in the US who had elected to participate in a workshop on using Thunder-bird+Enigmail for email encryption. These workshops tool place prior to mid-2017, via a partnership with a non-profit which supports social movement groups. Six to 40 months after their PGP email encryption training, more than half of the study participants were continuing to use PGP email encryption despite intervening widespread deployment of simple E2EE messaging apps such as Signal. We study the interplay of usability with social factors such as motivation and the risks that individuals undertake through their activism. We find that while usability is an important factor, it is not enough to explain long term use. For example, we find that riskiness of one’s activism is negatively correlated with long-term PGP use. This study represents the first long-term study, and the first in-the-wild study, of PGP email encryption adoption.

Publisher

Walter de Gruyter GmbH

Subject

General Medicine

Reference60 articles.

1. [1] R. Abu-Salma, E. M. Redmiles, B. Ur, and M. Wei. Exploring User Mental Models of End-to-End Encrypted Communication Tools. In 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18), 2018.

2. [2] R. Abu-Salma, M. A. Sasse, J. Bonneau, A. Danilova, A. Naiakshina, and M. Smith. Obstacles to the Adoption of Secure Communication Tools. In 2017 IEEE Symposium on Security and Privacy (SP), pages 137–153, San Jose, CA, USA, May 2017. IEEE.

3. [3] S. D. Agarwal, M. L. Barthel, C. Rost, A. Borning, W. L. Bennett, and C. N. Johnson. Grassroots organizing in the digital age: considering values and technology in Tea Party and Occupy Wall Street. Information, Communication & Society, 17(3):326–341, 2014.

4. [4] E. Atwater, C. Bocovich, U. Hengartner, E. Lank, and I. Goldberg. Leading Johnny to Water: Designing for Usability and Trust. In Eleventh Symposium On Usable Privacy and Security (SOUPS), pages 69–88, 2015.

5. [5] W. Bai, D. Kim, M. Namara, Y. Qian, P. G. Kelley, and M. L. Mazurek. An Inconvenient Trust: User Attitudes Toward Security and Usability Tradeoffs for Key-Directory Encryption Systems. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), pages 113–130, Denver, CO, 2016.

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Quantum-resistant End-to-End Secure Messaging and Email Communication;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29

2. File Encryption: PGP;Guide to Internet Cryptography;2022

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3