The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication tools (e.g., WhatsApp, iMessage) have adopted end-to-end encryption, and many new tools (e.g., Signal, Telegram) have been launched with security as a key selling point. However it remains unclear if users understand what protection these tools offer, and if they value that protection. In this study, we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the va...
With all security technologies available to use and benefit from, computer users might wonder why th...
The purpose of this study was to provide a comprehensive understanding of the usage of software encr...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
International audienceThis paper presents the results of a usability study focused on three end-to-e...
Instant messaging applications are increasingly claiming to offer end-to-end encryption. Yet actual,...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
Communication tools with end-to-end (E2E) encryption help users maintain their privacy. Although mes...
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of suc...
As people rely more heavily on online communication, privacy becomes an increasingly critical concer...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
With all security technologies available to use and benefit from, computer users might wonder why th...
The purpose of this study was to provide a comprehensive understanding of the usage of software encr...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
International audienceThis paper presents the results of a usability study focused on three end-to-e...
Instant messaging applications are increasingly claiming to offer end-to-end encryption. Yet actual,...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
Communication tools with end-to-end (E2E) encryption help users maintain their privacy. Although mes...
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of suc...
As people rely more heavily on online communication, privacy becomes an increasingly critical concer...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
With all security technologies available to use and benefit from, computer users might wonder why th...
The purpose of this study was to provide a comprehensive understanding of the usage of software encr...
Nowadays, the possibility to communicate securely is crucial for users in the private as well as in ...