Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Prototype

Briefing

 You and the facilitator are collaborating on a potentially revolution user interface project. As you would not want secret information about your project to leak out to competitors, you must be very careful about any conversations you have with one another, whether in person or online. We are providing you a phone with a Secure Messaging application to allow you to communicate securely with the facilitator when you need to discuss sensitive topics.

Tasks

Task 1

The facilitator, Stephen Jones, hands you a new phone. Log into the Secure Messaging application, and add Stephen (who is physically standing next to you) as a Secure Contact. Confirm that he in your list of Contacts with whom you can communicate securely. 

Task 2

Stephen leaves the room. After a few hours, you receive notification of a new message. Go to your message inbox, determine who the message is from, and read the message. Since you are comfortable with whom you are communicating, you decide to reply to the message.

Task 3

Stephen has added Rob Miller to the chat. Since you trust Stephen, accept Rob as a chat participant. Review Rob's message, then add Rob as a new secure contact.

Task 4

Stephen receives word that Rob Miller is actually a 6.813 student looking to steal great project ideas. Since it is an imposter, you must remove Rob Miller as a contact. In addition, you want to remove all trace of communication with the imposter so remove all messages received from Rob Miller.

Round 1 Observations

User 1

...