Being a designer in Open Source (OS) isn’t always easy or straightforward, neither is it the same for all designers. Different open source projects are set up differently, hence demand different outputs and engagements from designers. In this blog, we list the six main tenets for a successful design contribution to OS projects.
Since 2020, we've been working with our community to rebrand Simply Secure. This post explores how we collaboratively built our new identity as Superbloom.
Supported by the Open Technology Fund, our team provided human-centered design and research support for Mobile Surveillance Monitor, a new, public online platform that tracks and maps mobile surveillance threats.
Through UX changes, we helped guide Mailvelope users through the headaches of key management.
This fall, we had the pleasure of working with Digital Democracy on their application, Mapeo. Mapeo is a mobile and desktop app that enables indigenous communities to map their lands, sites, and resources, as well as record and monitor environmental and legal abuses by corporations and the state. The app is used by communities around the world, and due to the sensitive nature of the data being recorded, contributing to Mapeo can be high-risk for users. Our design challenge focused on user safety: how to protect end users in the likely event that a community mapper’s phone is lost, seized, damaged, or stolen.
Mailvelope is a browser extension that makes it easy to use PGP encryption, whether you use Gmail, Outlook, or many other email providers. With the support of UXFund, Simply Secure worked with Mailvelope to support users who want to use an organization-wide PGP key to send an encrypted email. Kelsey Smith and Thomas Oberndörfer had a conversation in 2022, reflecting on the technical problem and the design process.
Since 2020, we've been working with our community to help rebrand Simply Secure. Here's where we are in the ongoing process of refreshing our name and identity.
We asked our community what they think of the name "Simply Secure" and our cheerful aesthetic. Here's what we found out.
Simply Secure's take on branding in open source, with a case study on Tails.
In June 2018, Luminate commissioned Simply Secure to conduct human-centered design (HCD) research focused on uncovering grantees’ experiences of the funding process. The report highlights insights, feedback — including anonymized quotes and comments, and recommendations synthesized from 20 interviews + 53 survey responses.
We interviewed Marcel Schouwenaar from The Incredible Machine on his prototype, a transparent charging station.
IoT security needs UX design to appropriately manage complexity.Architecture school teaches how to design for an IoT context with privacy in mind.
This year’s Consumer Electronics Show (CES ‘17) showcased numerous internet of things (IoT) devices but was found wanting when it came to security concerns. In his UX of IoT report from CES, Scott Jenson assesses that “companies really, really, …
To help you assess risks to your data, we provide ways to dissect threats and tips to protect against them.
Get prepared to discuss security with more technical team mates. If you’re a designer, learn useful background information.
I’ve been enjoying the videos from AI Now, an exploration of artificial intelligence and ethics hosted by the U.S. White House and NYU’s Information Law Institute. Co-chairs Kate Crawford and Simply Secure co-founder Meredith Whittaker put together a …
My last post examined the concept of phishing, which is a type of social-engineering attack to con people into divulging private information like passwords or credit card numbers. When you look for advice on how to protect against phishing, most of …
One of the highlights of HybridConf 2016 was hearing writer Stevyn Colgan talk about his time as a police officer at London’s Scotland Yard. He entertained the audience of UX designers and front-end developers with stories from his book, Why Did the …
Most people who spend time online have a general idea of what “phishing” is, but it can be hard for folks outside of the security community to pin down an exact definition. Understanding the threat that phishing attacks pose can help designers and …
Last week, I encountered discussions of drones in two unimaginably different contexts: in an academic presentation at USENIX Security 2016 and on the TV comedy Portlandia. As distant genres, they offer different perspectives that have equally …
Web browsers are utility software; they are designed to work for all people. Not only must their features meet the needs of average members of a population, they must also work for people with special needs. As Firefox says on its mobile …
Building great software requires understanding what users want and need. If you’re building privacy-preserving software, this includes understanding the privacy threats that your users face. One of the participants in Ame’s NYC study.
When Ame set …
Naming software is hard because the name needs to convey a lot of meaning about what the program does to an unfamiliar audience, and do it all using only a word or short phrase. You want something memorable and easy to say – which becomes more …
Chatbots, or conversational programs that simulate interactive human speech patterns, are a hot topic in UX right now. Microsoft CEO Satya Nadella recently claimed that “bots are the new apps”, and that they are the interface of the future for tasks …
This is the first in a short series of posts looking at Facebook’s “Privacy Checkup” feature. This installment examines why even privacy advocates who avoid social-media sites should take time to understand it and related user experiences. The next …
Many regular readers of our blog have already drunk the metaphorical Kool-Aid. You know that a good user experience is critical to an app’s success; moreover, you know that when a piece of software seeks to preserve its users’ privacy, a poor UX can …
We are pleased to announce a new collaboration with the Open Technology Fund as part of their Usability Lab project. This exciting initiative will allow open-source software projects to apply for free assistance with user-experience (UX) design as …
It can be hard to communicate about security-related features with users who aren't already security experts. From word choice to the level of detail included, it's easy to overwhelm people with information, leave them scared, or bore them to …
Recent attacks byDaesh in Turkey, Egypt, Lebanon, and Paris have fanned the flames of an ongoing debate about software that is resistant to surveillance. It seems that some participants in that debate are trying to use these attacks as an excuse to …
My recent post describing some of the reasons we choose Slack over IRC for our public forum is part of a larger conversation people are having around the promise and concerns of group-communication tools. A quick search for “Slack vs. IRC” yields a …
Last week Google unveiled a new logo as part of an updated brand identity. Professional typographic designers were swift to react. Tobias Frere-Jones, designer of Interstate and other widely-used fonts, said “I really hope this ’e’ does not become a …
Researchers who want to evaluate software interfaces have a number of tools at their disposal. One option for identifying obvious and significant problems is an expert review, which is often used to catch low-hanging fruit before performing any kind …
I really enjoyed being part of the emerging-work track, HotPETS, at the Privacy Enhancing Technologies Symposium earlier this month. From meeting lots of great people to getting face-time with the Simply Secure team, Philadelphia was fun.
Scout and I …
This is the third and final installment in the series on Lessons from Architecture School: Lessons for IoT Security. You can also read the first and second installments, or download the presentation. Thank you to the audience at Solid Conference for …
This continues Part 1 of a series of posts drawn from a talk I gave at O’Reilly’s online conference Experience Design for Internet of Things (IoT) on “Lessons from Architecture School for IoT Security.” You can find the slides for the original talk …
This is the first in a series of posts pulled from a talk I gave at O’Reilly’s online conference Experience Design for Internet of Things (IoT) on “Lessons from Architecture School for IoT Security.” The talk is a call to action for designers and …