Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Prototype

Briefing

 You You and the facilitator, Stephen Jones, are collaborating on a potentially revolution revolutionary user interface project. As you would not want secret information about your project to leak out to competing 6.813 students, you must be very careful about any conversations you have with Stephen, whether in person or online. Stephen provides you a phone with a Secure Messaging application to allow you to communicate securely with him when you need to discuss sensitive topics.

...

  • You are using SecureMessage because you care deeply about sending and receiving sensitive messages securely
  • This is a phone application and is designed to act similarly to other mobile chat/texting applications
  • Think out loud and let us know how comfortable you are performing these tasks given your need for security

Tasks

Task 1

The facilitator, Stephen Jones, hands you a new phone. Log into the Secure Messaging application, and add Stephen (who is physically standing next to you) as a Secure Contact. Confirm that he in your list of Contacts with whom you can communicate securely. 

...

Stephen has added Rob Miller to the chat. Since you trust Stephen, accept Rob as a chat participant. Review Rob's message, then add Rob as a new secure contact.

Task 4

Stephen receives You receive word that Rob Miller is actually a 6.813 student looking to steal great project ideas. Since it is an imposter, you must remove Rob Miller as a contact. In addition, you want to remove all trace of communication with the imposter so remove all messages received from Rob Miller.

...