Communication tools with end-to-end (E2E) encryption help users maintain their privacy. Although messengers like WhatsApp and Signal bring E2E encryption to a broad audience, past work has documented misconceptions of their security and privacy properties. Through a series of five online studies with 683 total participants, we investigated whether making an app’s E2E encryption more visible improves perceptions of trust, security, and privacy. We first investigated why participants use particular messaging tools, validating a prior finding that many users mistakenly think SMS and e-mail are more secure than E2E-encrypted messengers. We then studied the effect of making E2E encryption more visible in a messaging app. We compared six diffe...
End-to-end encryption has made instant messages more secure. But the technology has also made it mor...
Improving the usability and adoption of secure (i.e. end-to-end encrypted) email systems has been a ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
An ongoing discussion in the field of usable privacy and security debates whether security mechanism...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Billions of secure messaging users have adopted end-to-end encryption (E2EE). Nevertheless, challeng...
Instant messaging applications are increasingly claiming to offer end-to-end encryption. Yet actual,...
International audienceThis paper presents the results of a usability study focused on three end-to-e...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
peer reviewedInforming laymen of security situations is a notoriously hard problem. Users are usuall...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
Instant messaging services are quickly becoming the most dominant form of communication among consum...
End-to-end encryption is becoming a standard feature in popular mobile chat applications (apps) with...
The computer security community has advocated widespread adoption of secure communication tools to c...
End-to-end encryption has made instant messages more secure. But the technology has also made it mor...
Improving the usability and adoption of secure (i.e. end-to-end encrypted) email systems has been a ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
An ongoing discussion in the field of usable privacy and security debates whether security mechanism...
When communication about security to end users is ineffective, people frequently misinterpret the pr...
Billions of secure messaging users have adopted end-to-end encryption (E2EE). Nevertheless, challeng...
Instant messaging applications are increasingly claiming to offer end-to-end encryption. Yet actual,...
International audienceThis paper presents the results of a usability study focused on three end-to-e...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
peer reviewedInforming laymen of security situations is a notoriously hard problem. Users are usuall...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
Computer security and privacy experts have always advocated the widespread adoption of privacy-enhan...
Instant messaging services are quickly becoming the most dominant form of communication among consum...
End-to-end encryption is becoming a standard feature in popular mobile chat applications (apps) with...
The computer security community has advocated widespread adoption of secure communication tools to c...
End-to-end encryption has made instant messages more secure. But the technology has also made it mor...
Improving the usability and adoption of secure (i.e. end-to-end encrypted) email systems has been a ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...