kelsey
- A Dev’s Guide To Design In Open Source Software
- What's Next For 'Simply Secure'? Part 3: How We Built Superbloom
- Hey, Whose Keys Are These?
- Finding the Balance
- Refresh: Community-Led Identity Change
- SSL, TLS, and FTP... Oh My!
- Dark Patterns in User Controls: Exploring YouTube’s Recommendation Settings
- The Limits to Digital Consent
- What's next for 'Simply Secure'? Part 2: Refreshing our name and identity
- Strength In Numbers: Designing to Help At-Risk Users Protect Against Phishing Attacks
- What's next for 'Simply Secure'? Part 1: Revisiting our name and identity
- Popping the Filter Bubble: Design Practices for Data Donation
- Data, Decision-Making, & Design: Measuring Internet Performance for Libraries and the Public Sector
- Kelsey Smith