Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

They could be political activists in an environment where the government doesn't support their viewpoints. They could be children wanting to discuss something without their parents seeing it. They could be researchers looking for a way to collect secure, anonymous data from others. Or they could be employees of an enterprise working on a sensitive project and don't want technical details to be divulged to outside sources.

Characteristics

  • Primarily use Use their mobile phones very frequently to communicate with others
  • Have to deal with sensitive information on a regular basis
  • Concerned with Privacy, but not with the technical details of how to be secure
  • Concerned about Personal Safety

...