<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>USABLE Tools</title><link>http://usable.tools/</link><description>Recent content on USABLE Tools</description><image><link>https://usable.tools</link><title>USABLE Tools</title><url>https://usable.tools/images/logo.svg</url><description>USABLE.tools</description></image><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Wed, 01 Mar 2023 00:19:41 +0400</lastBuildDate><atom:link href="http://usable.tools/index.xml" rel="self" type="application/rss+xml"/><item><title>Peru: Tila</title><link>http://usable.tools/personas/pe-tila/</link><pubDate>Wed, 01 Mar 2023 00:19:41 +0400</pubDate><guid>http://usable.tools/personas/pe-tila/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Tila is a journalist who has worked for 10 years in print journalism. She has
worked in large cities such as Peru’s capital, Lima. After covering some recent
protests, there was a change in her devices. They were not working properly;
she had friend requests from trolls across her social media accounts and she
kept receiving strange calls. She noticed she wasn&amp;rsquo;t the only one with the
same problems, so she teamed up with several journalists to investigate the
issue. Together, they learned that they were being watched by someone through
accounts that has been hacked.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Tila is active across several social media platforms and blogs. She has a
personal Mac computer which she uses for design and audiovisual production.
Tila also has a work laptop with Windows. Given the nature of her work, Tila
often connects to public Wifi networks and shares devices with colleagues to
pass material. She stores sensitive information on her devices without
encryption. She uses Google Drive extensions to store information, sends files
via Facebook.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Learn and achieve safer digital habits.&lt;/p>
&lt;p>Identify digital risks that go unnoticed.&lt;/p>
&lt;p>Learn new strategies and tools for safeguarding information.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Sexist threats for being a woman journalist.&lt;/p>
&lt;p>Adversaries have better technological capabilities to attack.&lt;/p>
&lt;p>Threats and intimidation to interrupt/stop journalist investigations from being
carried out.&lt;/p>
&lt;p>Difficulties accessing media accounts and identity theft.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>She has a network of journalists with whom she meets to discuss digital
security issues and plan joint actions to strengthen digital security.&lt;/p>
&lt;p>Seek out communities and organizations that can advise you on digital security
issues&lt;/p>
&lt;p>She is technologically savvy and has good internet connection.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I back up the sensitive information and make sure it is protected?&lt;/p>
&lt;p>What is a safe platform can use to conduct interviews on sensitive topics?&lt;/p>
&lt;p>How can I identify attacks on my digital accounts? How can I protect against attacks?&lt;/p></description></item><item><title>Peru: Oscar</title><link>http://usable.tools/personas/pe-oscar/</link><pubDate>Wed, 01 Mar 2023 00:17:24 +0400</pubDate><guid>http://usable.tools/personas/pe-oscar/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Oscar is a journalist who works daily covering and reporting on important
political, social and economic developments. During the height of the Covid-19
pandemic, he has visited hospitals, medical centers, and other crowded spaces
to observe and share their Covid-19 reponses. Being at the forefront of events
such as this, he has had to implement protective measures for his health and
safety.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Oscar uses different forms of social media such as Facebook, Twitter,
Instagram, etc. to share information. He also has a website which he
administers through Wordpress. He is experienced using audio and video editing
software. Oscar has some security measures in place, he has updated his
operating system and has a good antivirus. He uses similar passwords for his
services but makes but uses slightly different combinations. He connects to
public wifi networks, where there is no coverage to use mobile data.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Provide accurate, current and insightful coverage.&lt;/p>
&lt;p>Be informed on the concerns of the national (and international) community in
order to address informational gaps.&lt;/p>
&lt;p>Disseminate information that clarifies doubts about myths and eliminates
misinformation.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Loss of information by hacking the cloud storage.&lt;/p>
&lt;p>Email vulnerability by hacking, unauthorized intrusion, phishing attempts&lt;/p>
&lt;p>Password theft&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>He has some digital security protection measures in place.&lt;/p>
&lt;p>He has devices specifically dedicated for his work.&lt;/p>
&lt;p>He understands nothing can be completely protected and wants learn more about
digital security strategies.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I tell if a link or website might be malicious?&lt;/p>
&lt;p>How can I protect myself when using public wifi networks? Are there alternative
ways I can connect?&lt;/p>
&lt;p>How do I know if my Operating System issecure?&lt;/p></description></item><item><title>Venezuela: "María"</title><link>http://usable.tools/personas/ve-maria/</link><pubDate>Wed, 01 Mar 2023 00:14:07 +0400</pubDate><guid>http://usable.tools/personas/ve-maria/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>María is a middle-aged woman, teacher and psychologist by profession. She was
born in a small town in the state of Mérida and as a child she was the victim
of various types of abuse by some of her relatives. Growing up, she decided to
dedicate her life to helping other women who have gone through situations
similar to the ones she went through as a child. María founded an NGO that
provides psychological and legal support to women who are victims of rape and
gender based violence.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>María uses instant messaging apps, video conferencing and email platforms to
communicate with victims and her co-workers. She saves the files of all the
cases they receive in a cloud storage platform.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Support the fight to end sexism and gender based violence in the country.&lt;/p>
&lt;p>Work to reduce the gender gap in the workplace.&lt;/p>
&lt;p>Advocate to the State for guaranteed equal rights for men and women.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Repression by state security agencies.&lt;/p>
&lt;p>Gender-motivated violence.&lt;/p>
&lt;p>High crime rates in the country.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Strong ties and relations with other human rights organizations.&lt;/p>
&lt;p>Training in nonviolent resistance.&lt;/p>
&lt;p>Knowledge of the national legal framework.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What safety recommendations can we give to young girls when using the Internet?&lt;/p>
&lt;p>How can we publicly denounce bullying and abuse while protecting and respecting victims?&lt;/p></description></item><item><title>Venezuela: "Antonio"</title><link>http://usable.tools/personas/ve-antonio/</link><pubDate>Wed, 01 Mar 2023 00:10:48 +0400</pubDate><guid>http://usable.tools/personas/ve-antonio/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Antonio, is a 21-year-old gay man who has struggled to find safe spaces for
self expression on social media. He experiences constant harassment and
mistreatment on the Internet. Antonio is an active member of an NGO that works
to educate young people on human rights, with particular focus on the LGBTIQ+
community. He is tired of seeing members of the LGBTIQ+ community harassed and
threatened for being themselves.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>He has a smartphone with an emergency function that he can use to call for help
and allows a trusted person to locate him. He uses Facebook and Telegram groups
to spread information about how to protect oneself and off the Internet.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>To advocate for equal rights.&lt;/p>
&lt;p>To combat discrimination and hate.&lt;/p>
&lt;p>To advocate for legal protection of people with sexual and gender diversity.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Harassment- both physical and on social media.&lt;/p>
&lt;p>Targeting of LGBTIQ+ individuals via dating apps.&lt;/p>
&lt;p>Lack of support and resources in a country/culture with conservative values.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Knowledge of laws and rights.&lt;/p>
&lt;p>Network of allies that support his fight.&lt;/p>
&lt;p>Commitment to defending the rights of the LGBTIQ+ community.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can we safely reach more people so they know how to protect themselves?&lt;/p>
&lt;p>What are some tools that can help improve our security?&lt;/p></description></item><item><title>Venezuela: "Valeria"</title><link>http://usable.tools/personas/ve-valeria/</link><pubDate>Wed, 01 Mar 2023 00:07:37 +0400</pubDate><guid>http://usable.tools/personas/ve-valeria/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Valeria is a young independent journalist who collaborates with different
national and international digital media and in her free time she collaborates
in investigations with some NGOs, especially those that work on issues of
feminism, LGBTIQ+ rights and freedom of expression. She has been injured during
coverage of popular demonstrations and threatened by armed groups in her
community, who are close to the regime and seek to intimidate dissidents in
order to silence them.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Instant messaging apps for communicating with her loved ones and coworkers,
video calling platforms for work, and email for professional and personal use.
Due to the heavy censorship in the country, she must use a VPN to access
various web pages.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Report what is happening in the country.&lt;/p>
&lt;p>Overcome censorship and attempts to limit access to information.&lt;/p>
&lt;p>Fight against the disinformation and propaganda of the regime.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Repressive context for freedom of expression (freedom of expression has been criminalized).&lt;/p>
&lt;p>High crime rates in the areas she frequents.&lt;/p>
&lt;p>Gender-based violence.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Alliances with other journalists and organizations.&lt;/p>
&lt;p>Advanced communication skills.&lt;/p>
&lt;p>Social capital and influence in social media.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can we increase the security of our social media accounts?&lt;/p>
&lt;p>What are some more secure means of messaging that I can use to maintain contact with collaborators, colleagues, and family?&lt;/p>
&lt;p>What security tools can we use in spaces with low connectivity?&lt;/p></description></item><item><title>Venezuela: "Emilio"</title><link>http://usable.tools/personas/ve-emilio/</link><pubDate>Wed, 01 Mar 2023 00:04:27 +0400</pubDate><guid>http://usable.tools/personas/ve-emilio/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Emilio grew up and currently lives in one of the most dangerous neighborhoods
in Caracas. At a very young age he became interested in public affairs and
chose to become involved with different NGOs. He leads the chapter of of the
National Student Movement at his university. He is also currently part of an
NGO that works to provide support to the poorest communities throughout the
city.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>He uses WhatsApp to communicate with allies throughout the communities and his
work team. He also uses Zoom to participate in conferences and workshops.
Emilio uses and social media platforms to communicate his work and connect to
people with people interested in the project.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Help people living in extreme poverty.&lt;/p>
&lt;p>Empower community members.&lt;/p>
&lt;p>Create support and solidarity networks in poor communities.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Armed political groups living in the communities.&lt;/p>
&lt;p>Kidnappers looking to extort money.&lt;/p>
&lt;p>Political persecution for his social activism.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Community support for the work he does.&lt;/p>
&lt;p>Legal advice of other human rights organizations.&lt;/p>
&lt;p>Alliances with other organizations to denounce attacks.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What security measures can we take when violent groups come to sabotage activities?&lt;/p>
&lt;p>Is it safe to coordinate activities through SMS when we don&amp;rsquo;t have Internet access?&lt;/p></description></item><item><title>Ecuador: Yanhya</title><link>http://usable.tools/personas/ec-yanhya/</link><pubDate>Wed, 01 Mar 2023 00:02:46 +0400</pubDate><guid>http://usable.tools/personas/ec-yanhya/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Yanhya is a human rights and environmental activist. She works with community
radios to denounce environmental injustice as well as violence against women.
She lives in a community that has suffered the effects of water contamination,
oil exploitation, logging, and illegal mining. Access to electricity and
internet is poor in her community, she must leave her territory whenever she
needs to access more reliable internet.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Yanhya uses Facebook and WhatsApp to communicate information/work done by
herself or others, to view the news, and search for information. She uses her
computer for radio to edit her programs. Yanhya uses her cell phone to collect
testimonials for her activism work. She is currently learning to use some
design and video editing&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>To find other effective ways to disseminate information about women and
culture/ find more spaces to tell women’s stories.&lt;/p>
&lt;p>To connect with other members of the environmental rights and human rights
communities.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Physical threats to her and her family.&lt;/p>
&lt;p>Identity theft and impersonation to discredit her work/spread disinformation.&lt;/p>
&lt;p>Attempted hacking of social media and email accounts.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Some friends and individuals she coordinates with have started using Signal for more secure communication.&lt;/p>
&lt;p>Yanhya is aware of digital threats and is interested in learning more about digital security.&lt;/p>
&lt;p>She understands the basics of the Internet and is able to use it as a tool to gather information.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>If my devices are stolen, is there a way to protect the information they contain?&lt;/p>
&lt;p>How can I know if my social networks have been tapped?&lt;/p>
&lt;p>Where do I backup sensitive information so that it is secure?&lt;/p>
&lt;p>Is there a way for me to keep my content from being removed from social networks?&lt;/p></description></item><item><title>Mexico: Nahua</title><link>http://usable.tools/personas/mx-nahua/</link><pubDate>Tue, 28 Feb 2023 23:55:17 +0400</pubDate><guid>http://usable.tools/personas/mx-nahua/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Nahua is a radio communicator, he belongs to the Tucta community, in the
municipality of Nacajuca. Nahua has worked to document the harm and
contamination of oil, mining and hydroelectric companies in indigenous
territories. He conducts interviews to spread the word about the environmental
impact on these communities as well as the discrimination and threats that they
face.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>They have started using Free Software to setup a radio station. And they have
also organized with communities to use other organizations&amp;rsquo; free community
storage infrastructure to strengthen their information security. They have
received workshops on VPN use. They have also created their webpage.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Transparency in the actions of mining companies.&lt;/p>
&lt;p>Create spaces for alternative voices.&lt;/p>
&lt;p>Generate alternative communication products.&lt;/p>
&lt;p>Create intercultural communication that exposes the realities of the
communities.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Mining companies are threatening those who produce and disseminate information
criticizing and/or exposing them.&lt;/p>
&lt;p>Threats by drug traffickers to journalists.&lt;/p>
&lt;p>Cell phone spying and wiretapping.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Nahua has basic knowledge of technology.&lt;/p>
&lt;p>He has discovered and learned to use Free Software that allows him to securely store and backup information.&lt;/p>
&lt;p>He is aware of threats to digital security and wants to learn how to better protect against them.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can we be monitored through our cell phone?&lt;/p>
&lt;p>Is there a mechanism to protect our privacy when navigating social networks?&lt;/p>
&lt;p>What kind of tools can I use to further protect my security?&lt;/p></description></item><item><title>Ecuador: Michi</title><link>http://usable.tools/personas/ec-michi/</link><pubDate>Tue, 28 Feb 2023 23:51:19 +0400</pubDate><guid>http://usable.tools/personas/ec-michi/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Michi is a journalist who works to promote women and feminist rights using
radio to tell stories/share information. In the past she has been persecuted
for disseminating information on sexual and reproductive rights and presenting
reports critisizing and exposing violence and machismo.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Michi is an experienced communicator and has been working in radio and radio
production for many years. Her knowledge of technology is basic. She uses her
smartphone to share information about her work and sensitive issues via
Facebook and email. She also uses these platforms to connect with other
feminists and feminist groups On her phone she also installs game applications
for her children.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Connect with feminist networks while maintaining personal safety&lt;/p>
&lt;p>Use digital networks to support in building alternative discourses to
disseminate credible facts to counter misogynistic/sexist beliefs and
perceptions, combat violence against women.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Michi regularly receives threats online from trolls and individuals with
conservative/traditional cultural perceptions. She fears for her safety and
that of her family in the event that any personal information such as her home
location were to be discovered or revealed. She also fears cyber threats such
as hacking of personal accounts by malicious actors looking to shut her down or
discredit her.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Michi maintains contact with a couple of cyberfeminist organizations working in
digital security. They have been able to recommend security tips to her.&lt;/p>
&lt;p>Michi recently learned about the Signal app which offers encrypted instant
messaging. She has begun to use it for any sensitive communications.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can can I better protect the data on my cell phone?&lt;/p>
&lt;p>How can I better protect my location and other personal data?&lt;/p>
&lt;p>Are my email communications secure/is there a way to ensure this?&lt;/p></description></item><item><title>Uganda: Lakony James</title><link>http://usable.tools/personas/ug-lakony_james/</link><pubDate>Tue, 28 Feb 2023 23:43:08 +0400</pubDate><guid>http://usable.tools/personas/ug-lakony_james/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Married 35 year old HR lawyer &amp;amp; activist who works with civil society to
advocate for the property ownership rights of women in Northern Uganda. He
lives in a post armed conflict region. He speaks &amp;amp; writes fluently in English&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Social Media platforms, Facebook, twitter, Instagram to create awareness.&lt;/p>
&lt;p>Communicates via email, SMS, social media apps, uses a myriad of email list
serves (Gmail, yahoo, Hotmail to network), Accesses internet from any location
(hotels, public WIFI).&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>To conceal his digital trail from surveillance.&lt;/p>
&lt;p>Wishes to keep his communication platforms secure&lt;/p>
&lt;p>Needs secure open source cloud platforms for backups&lt;/p>
&lt;p>Needs to securely stay connected during Internet shutdowns/ censorship&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Intimidation, arbitrary arrest and detention&lt;/p>
&lt;p>Some of the software he uses is not licensed.&lt;/p>
&lt;p>Government surveillance.&lt;/p>
&lt;p>Fear of losing his practicing certificate.&lt;/p>
&lt;p>Betrayal from fellow colleagues&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Understands the prevailing legal framework that supports his work&lt;/p>
&lt;p>Has a large online following that supports his online activism&lt;/p>
&lt;p>Adopts fairly to new tech applications&lt;/p>
&lt;p>Ability to use technology to circumvent censorship &amp;amp; also seek help from his IT peers.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What will happen to my family incase I’m taken under hostage.&lt;/p>
&lt;p>How can I safely communicate to my people who are not using any of the security tools named?&lt;/p>
&lt;p>How can I navigate the internet safely when I need to use public internet?&lt;/p></description></item><item><title>Venezuela: Daniel Suárez</title><link>http://usable.tools/personas/ve-daniel_suarez/</link><pubDate>Tue, 28 Feb 2023 23:31:34 +0400</pubDate><guid>http://usable.tools/personas/ve-daniel_suarez/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Daniel is a journalist who lives in Caracas. He works as a reporter for digital
media. Most of the time he is on the street documenting the news from various
sectors of the city and at the end of the day he returns to the office for the
coordination meeting that he holds with the rest of his co-workers.&lt;/p>
&lt;p>&lt;strong>Relevant recent events&lt;/strong>: A few months ago, government offcials raided the
office for no apparent reason, Daniel feels that he must be very vigilant about
protecting the information on his phone and on the office computer.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Daniel has had digital security training in the past on behalf of the media he
represents, so he uses strong passwords and in some cases activates double
factor authentication. Most of his teammates have not received training.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Overcome the censorship imposed by the national government.&lt;/p>
&lt;p>Inform communities with little or no access to independent media.&lt;/p>
&lt;p>Make the general crisis in the country visible.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Physical and digital attacks by state security forces.&lt;/p>
&lt;p>Website and social media blocking.&lt;/p>
&lt;p>Arbitrary detentions.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Interest and motivation to learn new ways on how to protect himself and others
around him.&lt;/p>
&lt;p>International cooperation resources to acquire new equipment.&lt;/p>
&lt;p>The organization as a whole has an interest in promoting organizational security policies.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What communication channels can and can’t the government intervene and how can I protect myself?&lt;/p>
&lt;p>What is the safest place to store documents?&lt;/p>
&lt;p>What special security measures must be taken into consideration while investigating sensitive topics such as corruption schemes?&lt;/p></description></item><item><title>Venezuela: Carolina Prieto</title><link>http://usable.tools/personas/ve-carolina_prieto/</link><pubDate>Mon, 27 Feb 2023 21:19:53 +0400</pubDate><guid>http://usable.tools/personas/ve-carolina_prieto/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Carolina is a journalist who lives in Los Andes region and is a correspondent
for several digital media, some with their headquarters in Caracas. Most of the
news that she covers is related to the humanitarian emergency: food shortages,
failures in public services and health system.&lt;/p>
&lt;p>&lt;strong>Relevant recent events&lt;/strong>: Like most people who live outside of the capital
city Caracas, most of the time she does not have an internet connection due to
ISP failures or the frequent and prolonged power outages.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>Due to constant power failures and the cost of alternative ISPs, Carolina
relies almost entirely on her cell phone to get her work done. She receives
most of her inputs on WhatsApp and she writes the news on her computer using
data shared from her cell phone.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Overcome the censorship imposed by the national government.&lt;/p>
&lt;p>Inform communities with little or no access to independent media.&lt;/p>
&lt;p>Bring useful information to the masses so that they can be informed.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Lack of infrastructure / equipment to get the job done.&lt;/p>
&lt;p>Arbitrary detentions.&lt;/p>
&lt;p>Physical and digital attacks by state security forces or irregular armed groups.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Reliable coworkers that support each other to overcome deficiencies.&lt;/p>
&lt;p>International cooperation resources to acquire new equipment.&lt;/p>
&lt;p>Interest and motivation to learn.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I implement the recommendations if I don&amp;rsquo;t have electricity or internet?&lt;/p>
&lt;p>Can communication apps like WhatsApp or Telegram be hacked?&lt;/p>
&lt;p>How can I safely document human rights violations?&lt;/p></description></item><item><title>Ecuador: Joshefin</title><link>http://usable.tools/personas/ec-joshefin/</link><pubDate>Mon, 27 Feb 2023 20:44:18 +0400</pubDate><guid>http://usable.tools/personas/ec-joshefin/</guid><description>&lt;h2 id="background">Background&lt;/h2>
&lt;p>Joshefin is a journalist, feminist, and trans activist covering issues of
gender, diversity, and gender based violence. Through her work, Joshefin
promotes sexual and reproductive rights. Joshefin is the Community Manager of a
feminist journal. She and other members of her community have organized
trainings for journalists on reporting with a gender perspective. She is also
alert about cases of femicide to give support to the families, also to trans
people who are discriminated against.&lt;/p>
&lt;h2 id="technology-use">Technology use&lt;/h2>
&lt;p>She uses different social media platforms such as Facebook, Instagram,Telegram,
and Twitter to share her work, She has a space/site dedicated to sharing her
reports.&lt;/p>
&lt;p>She worries about her communications being tapped, especially when working on
sensitive topics, and implements some digital safety measures. She uses a VPN
sometimes and uses Signal to communicate.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Share information with a gender and diversity focus.&lt;/p>
&lt;p>Denounce threats against the diverse community and women.&lt;/p>
&lt;p>Promote communication with a gender perspective.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Troll attacks on shared content.&lt;/p>
&lt;p>Attempted hacking of Web pages, mail and social media accounts.&lt;/p>
&lt;p>Phishing attempts.&lt;/p>
&lt;p>Reporting of published content to be removed.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>She is aware of the need for digital security measures.&lt;/p>
&lt;p>She implements certain tools to protect her digital security.&lt;/p>
&lt;p>She implements strong passwords and uses two-factor authentication for her
social media accounts.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How do I protect my mobile device?&lt;/p>
&lt;p>How do I deal with troll attacks?&lt;/p>
&lt;p>How do I protect myself from attacks to my accounts?&lt;/p></description></item><item><title>Announcing the 2022 UXForum: Connect, Create &amp; Shape Tech!</title><link>http://usable.tools/blog/2022-02-07-uxforum2022/</link><pubDate>Tue, 08 Feb 2022 09:50:48 -0700</pubDate><guid>http://usable.tools/blog/2022-02-07-uxforum2022/</guid><description>&lt;h2 id="the-uxforum-is-back-april-25-29-2022">The UXForum is back, April 25-29, 2022!!&lt;/h2>
&lt;p>A virtual convening to explore human-rights centered design in the open source privacy and security community&lt;/p>
&lt;p>Join human rights defenders, digital security trainers, auditors, software developers and designers for a multi-day, online event that will provide space for skill-building, networking, sharing best practices, and exploring opportunities for collaboration.&lt;/p>
&lt;p>Help us shape the agenda by &lt;a href="https://forms.gle/u4tpcYA6uexpNUv48">submitting a session proposal&lt;/a>! The call for proposals will remain open until &lt;strong>March 18th, 2022&lt;/strong> and we will notify applicants of selection no later than March 25, 2022.&lt;/p>
&lt;p>We encourage you to put in a session regardless of your experience leading sessions in other circumstances. Likewise, if you’ve got a great idea but still need to work on the details, we encourage you to submit a session and join us for our open information session Friday, February 25, 2022 at 8:00 am EST or 11:00 am EST to ask questions, discuss your idea, and receive feedback. Links to the sessions will be provided once you &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSdaI5KcWwPFo9wIj3iBUoub6XEr992oGVbZCJES73CVJcYaOw/viewform">sign up here&lt;/a>.&lt;/p>
&lt;p>In the meantime, don’t forget to &lt;a href="https://forms.gle/hfD9sG5RkEN7oJLf6">register for the forum&lt;/a> (registration closes on April 15, 2022) and follow us on &lt;a href="https://twitter.com/USABLE_tools/">Twitter @USABLE_tools&lt;/a> for the latest updates.&lt;/p>
&lt;p>The event will be guided by the USABLE &lt;a href="https://usable.tools/coc/">code of conduct&lt;/a>.&lt;/p></description></item><item><title>16 Tips for Maintaining Trust During Feedback Collection</title><link>http://usable.tools/blog/2021-05-14-tipsformaintainingtrust/</link><pubDate>Fri, 21 May 2021 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2021-05-14-tipsformaintainingtrust/</guid><description>&lt;p>Trust is always a prerequisite for working with at-risk communities, but it becomes increasingly important when you are gathering feedback. If trust has been established, users are more likely to participate in the feedback process and provide honest responses without fear of judgment or risk.&lt;/p>
&lt;p>This resource is designed for organizational security auditors, digital security trainers, and other practitioners who have already built and established trust with an at-risk community and are planning to collect feedback on privacy and security tools from the community.&lt;/p>
&lt;h2 id="tips-for-maintaining-trust-during-engagements--feedback-collection">Tips for Maintaining Trust During Engagements &amp;amp; Feedback Collection&lt;/h2>
&lt;p>Though trust can be established prior to an audit, training, or user engagement, the facilitator must take action to maintain and uphold that trust throughout the event. Below are suggestions to help ensure that participants feel safe and supported throughout the entire feedback collection process.&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Communicate transparently with partners about what you will be doing together and outline the overall plan. Be sure to manage expectations about time and involvement. Explain how the feedback you are collecting will be used and what impact it may have long-term.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Collaboratively establish rules or protocols for the gathering to ensure people feel safe (i.e. no photos, no social media posts, Chatham house rules, etc.). Confirming confidentiality at the beginning (and maintaining that confidentiality) can also help participants open up.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Where possible, conduct feedback collection in the local language. Participants will likely be able to more easily share challenges, frustrations, or features that they appreciate in the language they are most comfortable with.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Follow through on your commitments and be communicative throughout the process.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Identify and highlight something positive that you hear or learn from participants in order to help them build their confidence. It can be useful to begin a training or audit by collecting best practices. This will demonstrate to participants that they already take certain actions or use certain tools and reassure them prior to beginning.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Encourage participants to share challenges or mistakes from the perspective of someone else (perhaps a persona), so they do not feel shame in sharing.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Explain technical concepts in accessible language so that people can understand how technical tools work and do not feel overwhelmed by complex terms and concepts.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Remind participants that you are not testing them as users, but rather you are testing the tool.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ensure that your team of facilitators is diverse and representative of the community or organization with which you are working so participants feel comfortable. You can also provide opportunities for participants to be co-facilitators. Cascading or transferring information to a trusted member of the organization or community can be an effective way to communicate a message.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Encourage questions throughout the session and provide different ways for people to engage (verbally, written, etc.). It is critical that you listen to participants. Continuously check-in with each participant and follow-up afterwards via phone or email.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>You should plan for the engagement to be interactive and immersive, but you should also be adaptable and adjust as needed.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Location can also play a large role in making sure participants feel safe to fully engage, without fear or distraction. If funding permits, host events in a neutral location.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Give honest and straightforward answers, and respond as quickly as possible to requests for support. You should always be clear and specific about the functionalities of tools so organizations and communities can choose the tool that best fits their threat model.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ask open-ended questions, and create space for storytelling and exploring emotions.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Include short movement activities, which allow for linking body and content (i.e. finger ladders, shoulder rotation, etc.).&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Utilize privacy-preserving measures when collecting feedback from at-risk users. This may require you to use aliases, assign numbers, etc. to ensure that you are not linking results or feedback to specific individuals.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;p>Whether you are just getting started building trust with a new organization or community or you are eager to begin collecting feedback from existing partners, these tips and suggestions will help ensure you are centering the wellbeing of your participants while effectively collecting critical feedback from at-risk users.&lt;/p></description></item><item><title>AXIS: A Global Feedback Exchange for Trainers, Auditors, Developers, and Designers</title><link>http://usable.tools/blog/2020-11-18-axis/</link><pubDate>Wed, 18 Nov 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-11-18-axis/</guid><description>&lt;p>Internews, with support from &lt;a href="https://okthanks.com">Okthanks&lt;/a> and &lt;a href="https://simplysecure.org/">Simply Secure&lt;/a>, hosted a month-long virtual event entitled &lt;strong>AXIS: A Global feedback Exchange for Trainers, Auditors, Designers, and Developers.&lt;/strong> This event brought together key communities to map privacy and security tools being used by at-risk organizations and to identify concrete ways that we can support improvements to those tools.&lt;/p>
&lt;p>&lt;strong>66 participants&lt;/strong> across the globe attended throughout the month including:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>41&lt;/strong> Digital Security Trainers and Organizational Security Auditors&lt;/li>
&lt;li>&lt;strong>9&lt;/strong> Designers and UX Experts&lt;/li>
&lt;li>&lt;strong>4&lt;/strong> Tool Developers&lt;/li>
&lt;li>&lt;strong>12&lt;/strong> People Representing Other Communities (journalists, activists, etc.)&lt;/li>
&lt;/ul>
&lt;img src="http://usable.tools/images/blog/AXIS_Map.png" alt="Image of blue world map with dots placed in the USA, Mexico, Sub-Saharan Africa, South America, and Eastern Europe" style="width: 40%; border: 0; padding: 2em; float: right;" />
&lt;p>In order to maximize flexibility for participants, program content was made available in a variety of formats including podcasts, live sessions, and blog posts. Since AXIS was originally planned as an in-person event, one of our top priorities when making it virtual was to facilitate community building and trust among participants, particularly for those who are new to the digital security and Internet Freedom communities. While building community and trust can come naturally during in-person events, virtual gatherings require strategic facilitation to create opportunities for those connections to be made.&lt;/p>
&lt;p>Here are a few of the ways we facilitated collaboration and communication throughout the month:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>&lt;strong>Welcome Calls.&lt;/strong> Prior to the start of AXIS, we hosted two “Welcome Calls” where participants could introduce themselves and get to know one another in an informal setting.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>AXIS Community Slack.&lt;/strong> Throughout the month, participants were able to communicate with each other or the hosts via the AXIS Community Slack. The Slack served as a space for participants to make introductions, exchange resources, submit homework assignments, and even share music recommendations and pictures of their pets! Having this informal space for participants to communicate throughout the month (and afterwards) greatly contributed to the overall success of the event.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Community-led Skill Shares.&lt;/strong> As part of AXIS programming, participants were invited and encouraged to share their own skills and expertise through live sessions, blog posts, and/or podcasts. 12 participants contributed to these skill-shares covering topics such as web accessibility, threat modeling, user research, and more.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Breakout Groups and Shared Notes.&lt;/strong> During live sessions, hosts used BigBlueButton’s breakout feature and shared collaborative notes on Riseup Pads to create smaller groups and allow participants to engage in the format they are most comfortable with, whether that be speaking or typing into the shared document.&lt;/p>
&lt;/li>
&lt;/ol>
&lt;h3 id="axis-outputs-and-resources">AXIS Outputs and resources&lt;/h3>
&lt;p>As part of select AXIS sessions, participants contributed to the development of new resources, and provided feedback on existing resources. Content developed during the event, ranging from best practices for feedback collection to templates for archetypes, will be edited, designed, and integrated into the &lt;a href="https://usable.tools/guidebook/">UX Feedback Collection Guidebook&lt;/a>.&lt;/p>
&lt;p>Building on User Personas, or fictional profiles of individuals created based on the real needs of users, the archetype templates developed during AXIS will expand the resources available to help trainers, auditors, designers, and developers analyze threat models and understand risks. AXIS participants contributed to the development of templates for the following resources:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Organizational Archetypes&lt;/strong> will provide a snapshot of at-risk organizations who rely on privacy and security tools. These archetypes will highlight threats they face, tools they use, the size of the organization, and more.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Adversary Archetypes&lt;/strong> will provide a direct contrast to the organizational archetypes, as they will provide a snapshot of common threat actors, including some of their tactics, known targets, and more.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>Templates for these resources will be shared with trainers and auditors so that they can contribute to a growing library of &lt;a href="https://usable.tools/personas/">personas and archetypes&lt;/a>.&lt;/p>
&lt;h3 id="axis-tracker-and-feedback-collection-certification">AXIS Tracker and Feedback Collection Certification&lt;/h3>
&lt;p>Each AXIS participant collected a virtual “stamp” for attending a session, reading a blog post, or listening to a podcast. Each stamp represented a different theme or topic, and an editable Progress Tracker allowed participants to track their progress throughout the event. Upon completion of the program, participants were eligible to receive an &lt;a href="https://usable.tools/blog/2020-07-31-axiscertification/">AXIS Feedback Collection Certificate&lt;/a>*. A total of 42 participants received a Feedback Collection Certificate.&lt;/p>
&lt;img src="http://usable.tools/images/blog/AXIS_Tracker.png" alt="Image of printable game board with 10 stamps that can be added into square spaces to track progress" style="width: 75%; border: 0; float: center;" />
&lt;h3 id="whats-next">What’s Next?&lt;/h3>
&lt;p>Following the event, AXIS participants were invited to apply for the Feedback Collection Funding Pool, a small grants pool for individuals or organizations who would like to implement feedback collection from at-risk users during their trainings or audits. Many AXIS participants have expressed interest in collaborating with another trainer or auditor to implement these activities, demonstrating an increase in the amount of collaboration happening within the auditor and trainer community, particularly with regards to usability work. This feedback collection, combined with the &lt;a href="https://usable.tools/blog/2020-10-01-uxfund2020/">UXFund&lt;/a>, aims to improve the usability of open source security and privacy tools used by at-risk communities around the globe. Check back &lt;a href="https://usable.tools/blog/">here&lt;/a> for updates as we launch this work!&lt;/p>
&lt;img src="http://usable.tools/images/blog/AXIS_Stamps.png" alt="Image of 10 stamps representing AXIS themes" style="width: 100%; border: 0;" />
&lt;p>&lt;em>Logo, Progress Tracker, Icons, and all other design assets for AXIS were created by Juan Pablo Trujillo Romo.&lt;/em>&lt;/p></description></item><item><title>RightsCon 2020: Ensuring Users Have a Voice: Collecting and Integrating User Feedback</title><link>http://usable.tools/blog/2020-10-16-rightscon/</link><pubDate>Thu, 15 Oct 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-10-16-rightscon/</guid><description>&lt;p>&lt;a href="https://rightscon.org">RightsCon&lt;/a>, the world’s leading event on human rights in the digital age, was held online this year during the month of July 2020. Internews’ Ashley Fowler led a session entitled, “Ensuring users have a voice: collecting and integrating user feedback.” Since 2015, Internews has partnered with digital security trainers, design experts, and open source tool teams to improve the usability and accessibility of open source privacy and security tools. Valuable user feedback collected from across the globe has ensured that users have a voice in the design and development of the tools they rely on. This panel was composed of digital security trainers and accessibility experts who have experience collecting feedback from at-risk users as well as designers working with open source tool teams who have implemented usability and accessibility improvements based on user feedback. Below you can find highlights from the panelists, who shared lessons learned, best practices, and responded to questions about collecting and integrating user feedback.&lt;/p>
&lt;p>&lt;strong>Moderator:&lt;/strong> Ashley Fowler, Technical Program Officer at &lt;a href="https://internews.org/">Internews&lt;/a>&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Panel:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Nancy Reyes, Trainer and Accessibility Consultant at &lt;a href="http://www.a11ylab.com/?lang=EN">Accessibility Lab&lt;/a>&lt;/li>
&lt;li>Mario Felaco, Security Auditor at &lt;a href="https://conexo.org">Conexo&lt;/a>&lt;/li>
&lt;li>Carrie Winfrey, Founder and Design Lead at &lt;a href="https://okthanks.com">Okthanks&lt;/a>&lt;/li>
&lt;li>Helen Nyinakiiza, Digital Security Trainer in Kampala, Uganda&lt;/li>
&lt;/ul>
&lt;/li>
&lt;/ul>
&lt;h3 id="why-is-it-important-to-involve-users-in-the-design-and-development-of-open-source-tools-how-do-we-sustain-feedback-loops-between-at-risk-users-and-open-source-tool-teams">Why is it important to involve users in the design and development of open source tools? How do we sustain feedback loops between at-risk users and open source tool teams?&lt;/h3>
&lt;p>Panelists highlighted that many open source tools are developed in North America or Europe, far from the communities that heavily rely on these tools for their physical and digital security. Tool teams that do not have direct access to end users struggle to understand the specific needs and threats they face, sometimes resulting in tools that are difficult to use or neglect to account for people outside of North America and Europe. Involving users and creating sustainable feedback loops is critical to the success of any privacy or security tool.&lt;/p>
&lt;p>Feedback should not only be collected towards the end of the development cycle, but rather gathered throughout the entire process. Developers must ensure they have structured the process to power continuous feedback loops. For open source donors and funders, it is important to ask how the projects you’re supporting are incorporating feedback from at-risk or marginalized populations. Not only is it important to ask, but also demand that it is included and fund the work.&lt;/p>
&lt;p>Nancy noted that it is imperative to also include people with disabilities in the design process of the tool, and seek their feedback early on in the process, in order to build more accessible tools.&lt;/p>
&lt;img src="http://usable.tools/images/AXIS/line.PNG" style="width: 100%; border: 0;" />
&lt;p>Web Accessibility Guidelines exist and can support the inclusion of people with disabilities. Learn more at &lt;a href="https://w3.org/TR/WCAG21/">https://w3.org/TR/WCAG21/&lt;/a>.&lt;/p>
&lt;img src="http://usable.tools/images/AXIS/line.PNG" style="width: 100%; border: 0;" />
&lt;h3 id="are-there-simple-ways-to-integrate-feedback-collection-into-existing-training-or-engagements-with-end-users">Are there simple ways to integrate feedback collection into existing training or engagements with end users?&lt;/h3>
&lt;p>There are lots of lightweight and fun ways to collect feedback! Panelists shared several methods they have used, emphasizing that you can even collect feedback over dinner or coffee. In fact, making it a no pressure, lightweight social event helps people feel more comfortable and results in more accurate, real feedback. If you are conducting a more formal digital security training, you can wander around and observe how people are interacting with the tool and identify where they are facing hurdles. Collect those insights and pain points as feedback you can later send to the tool developer. It can be particularly useful to identify a co-trainer or “observer” whose sole responsibility during a training is to watch and document user behavior, capturing specific feedback that can inform tool teams.&lt;/p>
&lt;img src="http://usable.tools/images/AXIS/line.PNG" style="width: 100%; border: 0;" />
&lt;p>Listening groups, surveys, and trainings are all different channels for collecting feedback. Check out the &lt;a href="https://usable.tools/guidebook/">UX Feedback Collection Guidebook&lt;/a> and the Okthanks &lt;a href="https://okthanks.com/exploratorium">Exploratorium&lt;/a> for more activities! There are also initiatives like &lt;a href="https://usable.tools">USABLE&lt;/a> and the &lt;a href="https://www.opentech.fund/labs/usability-lab/">OTF Usability Lab&lt;/a> that can fund user engagements or design and accessibility support for open source tool teams.&lt;/p>
&lt;img src="http://usable.tools/images/AXIS/line.PNG" style="width: 100%; border: 0;" />
&lt;h3 id="what-role-does-trust-play-when-collecting-user-feedback">What role does trust play when collecting user feedback?&lt;/h3>
&lt;p>Empathy is an important factor when collecting feedback. We feel closer to things when we feel connected to the humans who designed them. When you can connect a tool developer directly with users, it helps to build trust and understanding, which in turn improves feedback and the tool! Users will be more likely to engage if they know that developers are interested and their feedback will be heard. Even if you are not able to connect users directly to developers, make sure to let users know that their perspectives matter!&lt;/p>
&lt;p>It is also important to stay in touch with the users so that you can follow-up as they continue to use the tool. You can reach out to them to share any development or feature updates as they happen, capture any pain points that may have emerged as they become more familiar with the tool, and get feedback on any changes that have been made.&lt;/p>
&lt;h3 id="what-prevents-users-from-providing-feedback-to-developers">What prevents users from providing feedback to developers?&lt;/h3>
&lt;p>It is hard to make sure that development teams are listening. Collecting and sharing feedback requires your time and resources. If you feel like your time and expertise are going into a void, what&amp;rsquo;s the point? Additionally, connectivity continues to be a huge challenge - both internet connectivity and human connectivity. Digital security trainers, or others skilled at connecting with a particular community, can play a huge role in bridging that gap.&lt;/p>
&lt;p>Developers face obstacles as well. Time, access, and resources are obvious challenges. Oftentimes, small tool teams simply may not have the bandwidth to review and act on all of the feedback coming in from users. Internews’ USABLE project has worked to mitigate some of these obstacles. Through the USABLE project, Internews offered financial support to digital security trainers to compensate them for the additional work of collecting and packaging feedback in ways that are easier for developers to receive and act on. For developers, Internews provided funding support for tool teams that were willing and able to implement some of the changes requested through direct user feedback. This approach has been helpful in making sure feedback is not only shared with developers, but also put into practice.&lt;/p>
&lt;h3 id="how-can-i-get-involved">How can I get involved?&lt;/h3>
&lt;p>Whether you are a digital security trainer, a SAFETAG auditor, or a designer who wants to collect user feedback to help improve open source privacy and security tools, please reach out! We also encourage open source tool teams wishing to integrate user feedback into their design and development processes to connect with us. We have a robust network of community members eager to make tools more usable for those who need them most. Email us at &lt;a href="mailto:connect@usable.tools">connect@usable.tools&lt;/a> today!&lt;/p></description></item><item><title>Announcing the 2020-2021 UXFund</title><link>http://usable.tools/blog/2020-10-01-uxfund2020/</link><pubDate>Thu, 01 Oct 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-10-01-uxfund2020/</guid><description>&lt;p>We are excited to announce the launch of the latest round of the UXFund, a targeted pool of funding dedicated to improving the usability of open source security and privacy tools used by at-risk communities around the globe.&lt;/p>
&lt;p>Developers, maintainers, and other representatives of open source tool teams are invited to apply on behalf of an open source privacy and security tool. Winning applications must demonstrate a commitment to high-impact usability solutions, and incorporate human-centered design principles, including user testing, engagement with end-users, as well as a willingness to work directly with digital security trainers and auditors around the globe. The goal of this funding is to support stronger feedback loops among tool teams and their target user base, and ultimately make tools more usable for those who need them most.&lt;/p>
&lt;p>The majority of the UXFund will support work addressing the needs of at-risk persons and/or vulnerable populations (e.g. ethnic minorities, LGBTQI communities, people with disabilities, and women), but there are limited funds available for deeper tool re-architecture, if clear usability-enhancing outputs are presented.&lt;/p>
&lt;p>This round of the UXFund will also prioritize tools or platforms that apply to address unique challenges that are faced at the organization or community level, such as shared password management or encrypted collaboration tools.&lt;/p>
&lt;p>The amount of funding provided will vary based on the specific needs of the tool, but will likely range from $5,000 to $50,000 USD. The funding period will likely span from November 2020 through June 2021.&lt;/p>
&lt;h2 id="deadline-to-apply">DEADLINE TO APPLY&lt;/h2>
&lt;p>All applications should be submitted before November 15, 2020.&lt;/p>
&lt;h2 id="what-will-we-fund">WHAT WILL WE FUND?&lt;/h2>
&lt;ul>
&lt;li>User-testing/user-engagements designed to collect feedback from at-risk users&lt;/li>
&lt;li>Design sprints&lt;/li>
&lt;li>UX, design, or accessibility consultants/support&lt;/li>
&lt;li>Staff time for the design/development of usability and accessibility improvements (new features, documentation, etc.)&lt;/li>
&lt;li>Experts/consultants to support with reviewing and prioritizing user feedback, documentation, etc.&lt;/li>
&lt;li>And more!&lt;/li>
&lt;/ul>
&lt;h2 id="how-will-applications-be-scored">HOW WILL APPLICATIONS BE SCORED?&lt;/h2>
&lt;p>All applications are required to include the following:&lt;/p>
&lt;ul>
&lt;li>Must include user testing or feedback collection from target at-risk users (Internews will connect tool teams with communities as needed)&lt;/li>
&lt;li>Must work with users and/or training or auditing community&lt;/li>
&lt;li>Must use standard usability and accessibility guidelines where appropriate&lt;/li>
&lt;/ul>
&lt;p>Please see below for our judging criteria and funding requirements.&lt;/p>
&lt;p>Applications will be reviewed by a three-person technical committee based on the criteria provided below.&lt;/p>
&lt;p>&lt;strong>1. Quality of Program Idea and Associated Activities: 30 Points&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Address a need which would improve the usability for one or more user persona developed under the USABLE project (&lt;a href="https://usable.tools/personas/">https://usable.tools/personas/&lt;/a>)&lt;/li>
&lt;li>Improve accessibility and internationalization&lt;/li>
&lt;li>Incorporate human-centered design principles and user testing&lt;/li>
&lt;li>Tool is open source and has good development practices&lt;/li>
&lt;li>Tool already exists (we are not able to fund the development of new tools)&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>2. Program Planning/Ability to Achieve Objectives: 15 Points&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Provide a detailed work plan for tool development and testing phases&lt;/li>
&lt;li>Demonstrate how this work is crucial to promoting high-impact usability solutions&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>3. Institution’s Record and Capacity: 25 Points&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Demonstrate legal registration&lt;/li>
&lt;li>Be in good standing in performance and reporting under any previous subgrants, from Internews or any other organization, where applicable&lt;/li>
&lt;li>Be able to meet all reporting requirements and deadlines&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>4. Cost Effectiveness (including Cost Share): 20 Points&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Be able and willing to demonstrate the tool’s commitment to continuing proposed activities after the subgrant period ends&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>5. Program Monitoring and Evaluation: 10 Points&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Provide a detailed plan to effectively monitor and evaluate grant progress and deliverables&lt;/li>
&lt;/ul>
&lt;p>This funding will be administered in accordance with The Department of Human Rights and Labor/Department of State &lt;a href="https://www.statebuy.state.gov/fa/Documents/2015DeptTermsAndConditionsForUSandForeignOrg.pdf">standard terms and conditions&lt;/a>.&lt;/p>
&lt;p>In addition, regulations and provisions, at minimum, of &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=de342bfd8f33c25cd6f657e006dc5481&amp;amp;node=pt2.1.600&amp;amp;rgn=div5">2CFR200 and 2CFR600&lt;/a> Uniform Administrative Requirements, Cost Principles, and Audit Requirements for Federal Awards, will apply to subawards issued as a result of this request for applications.&lt;/p>
&lt;p>Proposal budgets will be reviewed in accordance with, and selected subrecipients’ costs will be subject to the cost principles that apply to them to assure reasonableness, allocability, and allowability as per &lt;a href="http://www.ecfr.gov/cgi-bin/text-idx?SID=3a5b24a09e5a2bee7c2d178e2e9ca53e&amp;amp;mc=true&amp;amp;node=pt2.1.200&amp;amp;rgn=div5">2CFR200 Subpart E&lt;/a>, Cost Principles.&lt;/p>
&lt;h2 id="how-to-apply">HOW TO APPLY?&lt;/h2>
&lt;p>We&amp;rsquo;re afraid that applications are now closed&lt;/p></description></item><item><title>SAFETAG Community Feedback</title><link>http://usable.tools/blog/2020-09-24-communityfeedback/</link><pubDate>Thu, 24 Sep 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-09-24-communityfeedback/</guid><description>&lt;p>Over the last few months, we have been working with &lt;a href="https://www.tafka.mx">Tafka&lt;/a>, a Mexico-based design firm, to develop a new visual identity for the SAFETAG framework. As part of these efforts, we hosted 3 community feedback calls to gather feedback. Additionally, we shared an open survey for those who were unable to join the calls. In total, we received feedback from over 25 SAFETAG users around the globe.&lt;/p>
&lt;p>We have highlighted some of the feedback we received below.&lt;/p>
&lt;p>&lt;strong>SAFETAG could be described as:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>“Complex, yet comprehensive”&lt;/li>
&lt;li>“Your really smart friend that you like a lot, but gives very detailed answers to very simple questions”&lt;/li>
&lt;li>“Flexible and adaptive”&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>What makes SAFETAG and its community unique?&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>We take the time to get to know, listen, and engage with the organization before starting hands-on work during the audit&lt;/li>
&lt;li>We are driven by the opportunity to support organizations advocating for civil and human rights, allowing them to do their work more safely and effectively&lt;/li>
&lt;li>We strive to provide holistic support to organizations, taking into consideration digital, physical, and psycho-social components of their security&lt;/li>
&lt;li>We enable organizations to make informed decisions regarding their digital security, and contribute to building a more resilient and sustainable foundation&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>SAFETAG users believe the framework’s visual identity should be:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Building blocks, or individual pieces that come together to form something larger and more comprehensive&lt;/li>
&lt;li>Colorful and approachable&lt;/li>
&lt;li>Casual, yet professional&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>What challenges do users face when navigating the framework?&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>It is big. As a new auditor, it is difficult to understand the “big picture”&lt;/li>
&lt;li>The document is overwhelming, and it is hard to decide which parts are relevant&lt;/li>
&lt;li>No clear hierarchy or organization&lt;/li>
&lt;li>The information architecture is not intuitive, and it is difficult to search for content that will be relevant for a specific organization, community, or context&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>What changes or features would make it easier to navigate?&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>The ability to hide activities so that you can see a smaller version of the framework&lt;/li>
&lt;li>Less words, more visuals. A clear naming structure and hierarchy&lt;/li>
&lt;li>A search feature, and a way to select specific activities that are relevant for a particular scenario&lt;/li>
&lt;li>Using metadata (such as size of organization, theme of activity, etc.) to sort the activities&lt;/li>
&lt;li>Videos, tutorials, and lessons learned for activities&lt;/li>
&lt;li>Having a clear “table of contents” so it is easy to locate a specific section or activity&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>What challenges do users face when contributing new content to the framework?&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>Many users do not feel comfortable contributing content through GitHub&lt;/li>
&lt;li>Others reported that contributing content currently takes too long; there are limited options for smaller, less time-consuming contributions&lt;/li>
&lt;li>The process of contributing content is difficult&lt;/li>
&lt;/ul>
&lt;p>Thank you to all who joined the feedback calls or responded to the survey! The insights you shared have directly informed the design and development of the new visual identity and web interface. We hope that the new visual assets and interface will make SAFETAG easier to use and more accessible for both new and experienced auditors. We are in the final stages of work and look forward to sharing the final products soon. Stay tuned for updates!&lt;/p></description></item><item><title>A very short story about digital security for young women</title><link>http://usable.tools/blog/2020-09-22-digisecjh/</link><pubDate>Tue, 22 Sep 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-09-22-digisecjh/</guid><description>&lt;p>So, why has it become more important for young women to get to know about digital security? Because more and more, they’re using and living in the internet world, either for education, to earn some money, or simply to have fun. The exposure of young women to the digital world brings another effect – online harassment – which also has implication on their offline life. In recent research, &lt;a href="https://webfoundation.org/">Web Foundation&lt;/a> mentioned several threats online for women and girls in the internet world.&lt;/p>
&lt;p>I won’t write about the material or technical components of digital security training, since every organization has their own module. Instead, I’ll discuss how to set up a training to become more appealing and friendly for a group of young women and less intimidating, without lessening the importance of the training.&lt;/p>
&lt;p>&lt;strong>Go to a laid back and discreet place&lt;/strong>&lt;/p>
&lt;p>To create a laid back and fun situation, first we need to decide the theme and place. A small home with an open garden could be a good option, or if you have enough budget, we can organize a training in a resort, far away from bustling city life. Try to find a place that is discreet and quiet. To protect peoples’ security, the training will minimize the involvement of social media – no mentions, no tagging, and minimize publications. A lesson that they also will learn in the training is that when it’s necessary, they can completely disconnect from the online world.&lt;/p>
&lt;p>&lt;strong>Create a fun ambience&lt;/strong>&lt;/p>
&lt;p>While the term “training” could feel intimidating, we can choose a different format that is more fun for participants. Borrowing the format of a book club perhaps could help. When it comes to the session organizing, the participants could divide into a small groups, with 1-2 facilitators. Like a book club, the session is about sharing experiences from participants and the facilitator, covering what they need to know about digital security. It’s possible that ice-breaking activities would be needed to create closeness and gain trust among the participants and the facilitator. The more relaxed the discussion is, the more sharing of knowledge that will take place among participants and facilitators.&lt;/p>
&lt;p>&lt;strong>Setup the mind&lt;/strong>&lt;/p>
&lt;p>Digital security training material is available widely on the internet. What we need is to raise the awareness and the implementation of these recommendations. Participants can start to become more aware of what platforms they use, and how to be more safe when using them. An introduction to open source platforms could also be a good place to start, as an alternative to closed source platforms that are relatively widely used. All they need to know to start is to be aware that digital harm could attack anybody.&lt;/p>
&lt;p>&lt;strong>And, what’s next?&lt;/strong>&lt;/p>
&lt;p>There are several ways to create activities after training, as a follow up. Create online groups or some meet ups after the training, if possible. You could create a catchy ‘digital security tips and tricks’ guide, both in online and offline form, as a tool to use when we need to distribute information to people who don’t have sufficient access to the internet.&lt;/p></description></item><item><title>10 Tips for Collecting Quality User Feedback from Grassroots HRDs, Activists, and Security Tool Users</title><link>http://usable.tools/blog/2020-08-28-10tipsforfeedback/</link><pubDate>Fri, 28 Aug 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-08-28-10tipsforfeedback/</guid><description>&lt;p>Security tools are vital to ensure at-risk users like human rights defenders and activists stay safe while doing their valuable work of activism and defending human rights. However, the usefulness of these tools depends on how usable they are to this at-risk community. Many feedback collection activities have been done to provide security tool developers with quality user feedback to ensure they develop these tools with the at-risk users in mind. Through USABLE, feedback is constantly being collected from at-risk communities around the security tools they use to stay safe. Feedback has been collected on security tools like Signal, VeraCrypt, KeepassXC, BitLocker, Tor Browser, and many others. Through conducting different digital security training and tool feedback sessions in East Africa since 2018, I have been able to interact with many grassroots communities and collect their feedback on key tools that they use. Grassroots communities in East Africa are particularly unique in that they face several challenges like poor internet connectivity, lack of electricity, and limited resources and equipment. These factors can greatly limit the adoption of certain security tools.
Below, I share my 10 tips for collecting quality user feedback from at-risk grassroots communities.&lt;/p>
&lt;h2 id="1-understand-the-community-using-a-particular-security-tool">1. Understand the community using a particular security tool.&lt;/h2>
&lt;p>It is important to understand the community you intend to collect feedback for. Not only does it enable you to plan accordingly, but it also gives you a clear picture of the needs of that community. This also makes it easy for you to focus on collecting feedback for specific tools used by that community based on their threat models.&lt;/p>
&lt;h2 id="2-know-which-security-tool-is-used-most-by-grassroots-communities-and-focus-on-collecting-feedback-for-that-tool">2. Know which security tool is used most by grassroots communities and focus on collecting feedback for that tool.&lt;/h2>
&lt;p>Knowing the tool used by particular communities gives you the ability to make necessary arrangements on collecting feedback on specific features of that tool that is commonly used by the community. Tools like Tor Browser or VeraCrypt have many features and there may be some features that are more frequently used by particular communities. Once you know which tool and its specific features are used by grassroots communities, feedback collection for that tool becomes a little easier than going into a feedback collection activity without knowing which tool or feature is mostly used by that community.&lt;/p>
&lt;h2 id="3-know-which-method-of-feedback-collection-works-best-for-that-community">3. Know which method of feedback collection works best for that community.&lt;/h2>
&lt;p>Due to different factors and working conditions of grassroots communities, not all methods of feedback collection work for them. Grassroots communities, in particular, have many challenging factors which limit you from using certain methods of collecting feedback. For example, using virtual feedback collection methods like sending questionnaires or using surveys to collect feedback from grassroots communities is not a very practical method due to factors like limited access to the internet or low bandwidth.&lt;/p>
&lt;h2 id="4-understand-the-schedule-and-availability-of-the-community-to-provide-user-feedback">4. Understand the schedule and availability of the community to provide user feedback.&lt;/h2>
&lt;p>A lot of grassroots human rights defenders are constantly in the field working and doing a lot of travelling within their communities. If you intend to conduct tool feedback collection outside digital security training, you will need to make sure your schedule matches theirs to ensure the tool feedback collection activity is not getting in the way of their important work. Therefore, know which local events, training, or workshops bring these communities together and use it as an opportunity to organize a tool feedback collection. Liaise with event organizers to publicize your tool feedback collection activity and find a suitable location and time for you to collect the tool feedback during the event.&lt;/p>
&lt;h2 id="5-understand-the-barriers-which-exist-and-have-the-potential-to-hinder-the-community-from-using-a-particular-security-tool">5. Understand the barriers which exist and have the potential to hinder the community from using a particular security tool.&lt;/h2>
&lt;p>Before introducing grassroots communities to a new tool for which you want to collect feedback, know which barriers exist and have the potential to hinder its adoption by them. This will save you from wasting a lot of valuable time collecting feedback for a tool which the community has no interest in adopting simply because it’s not useful to them – no matter how useful or usable that particular tool is to another community. Barriers like lack of proper devices and equipment (like good laptops or smartphones) play a big role in the adoption of certain tools because certain tools work best on particular devices with specific system requirements. Also, certain tools like VeraCrypt are a little bit technical and need a certain level of expertise which many grassroots communities do not have.&lt;/p>
&lt;h2 id="6-understand-the-context-in-which-grassroots-communities-work">6. Understand the context in which grassroots communities work.&lt;/h2>
&lt;p>Different communities work under different contexts and knowing this beforehand enables the feedback collector to prepare in advance on what tools they will collect feedback for from that community. Likewise, grassroots communities also work in different contexts and it is particularly challenging to collect feedback if the feedback collector does not know their working context.&lt;/p>
&lt;h2 id="7-prepare-a-checklist-to-act-as-a-benchmark-when-collecting-the-user-feedback">7. Prepare a checklist to act as a benchmark when collecting the user feedback.&lt;/h2>
&lt;p>The type of feedback that you will collect from grassroots communities during a feedback collection activity will vary from inferior to superior. Having a checklist will enable you to quickly rank feedback for particular features of a security tool and will ensure that you evaluate the feedback collection activity before and after the activity.&lt;/p>
&lt;h2 id="8-categorize-feedback-collected-and-rank-them-by-quality-remember-even-inferior-feedback-can-be-useful-to-tool-developers">8. Categorize feedback collected and rank them by quality. Remember, even inferior feedback can be useful to tool developers.&lt;/h2>
&lt;p>Collecting feedback from grassroots communities is challenging in terms of the quality of feedback you will receive. This is because people from grassroots communities are new to the idea of tool feedback collection, often get excited, and end up providing all the feedback they have. Collect all this feedback and categorize them according to the quality but submit all to the developers because all that feedback could potentially be useful to tool developers.&lt;/p>
&lt;h2 id="9-if-possible-have-a-virtual-call-with-a-tool-developer-during-the-feedback-collection-activity-with-grassroots-participants">9. If possible, have a virtual call with a tool developer during the feedback collection activity with grassroots participants.&lt;/h2>
&lt;p>Having a video call with a tool developer during a feedback collection activity makes a great difference and can be very motivating for grassroots participants and puts them in the mood to provide feedback for that tool. Many participants of tool feedback collection activities often are in disbelief that the feedback they provide will lead to improvement of the tool, but once they actually get to see and talk with the developer of that tool, they instantly get excited to provide the feedback because they know it will create an impact.&lt;/p>
&lt;h2 id="10-virtually-stay-in-touch-with-grassroots-participants-even-after-initial-physical-feedback-collection-activity">10. Virtually stay in touch with grassroots participants even after initial physical feedback collection activity.&lt;/h2>
&lt;p>Sometimes collecting feedback from grassroots communities needs constant connection with participants. This is because more valuable feedback can be collected even after the initial activity. Following up with participants through a phone call or WhatsApp chat gives you the opportunity to understand the challenges they have been facing while using the security tool. This method of virtual feedback collection is very efficient, fast, and easy and helps you to reach out to participants without interrupting much of their schedule.&lt;/p>
&lt;p>In conclusion, collecting user feedback from grassroots communities is very interesting despite the challenges that come with it but as a feedback collector, you have to always be accommodative and dynamic, ready to make changes as you go about collecting the feedback. One thing you have to keep in mind at all times is that tool feedback collection is a new and constantly evolving activity and it gets easier every time.&lt;/p></description></item><item><title>Synthesizing and Prioritizing Feedback</title><link>http://usable.tools/blog/2020-08-14-prioritizingfeedback/</link><pubDate>Fri, 14 Aug 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-08-14-prioritizingfeedback/</guid><description>&lt;p>&lt;strong>Collecting feedback from at-risk users is a critical first step, but it is not the final step in the process. To maximize the impact of the feedback loop between end-users and developers, trainers, auditors, and other facilitators should ensure that the feedback shared is of high quality, relevant, and consistent. This requires time spent reviewing, synthesizing, and prioritizing which pieces of feedback should be shared with the developer. The questions below will help guide trainers, auditors, and facilitators through this process.&lt;/strong>&lt;/p>
&lt;img src="http://usable.tools/images/blog/Friends_Comic.png" alt="Image of comic that reads 'Before posting a new comic I sometimes ask a friend for feedback'" style="width: 40%; border: 0; float: right; padding: 1em;" />
&lt;h3 id="what-are-the-common-areas-of-confusion-or-frustration">What are the common areas of confusion or frustration?&lt;/h3>
&lt;p>It is important to focus on feedback that is common among multiple users. If multiple people are experiencing similar frustrations, this demonstrates that it is a shared challenge and not a one-off “user” error or misunderstanding. Understanding the scale of the issue will also help the developer prioritize the improvement.&lt;/p>
&lt;h3 id="what-are-the-common-features-or-processes-that-users-appreciate-or-are-able-to-navigate-easily">What are the common features or processes that users appreciate or are able to navigate easily?&lt;/h3>
&lt;p>While it is easy to focus on areas of a tool that users struggle with, it can also be helpful to highlight features or processes that users appreciate or depend on day-to-day. This information will ensure that developers do not change or remove these features in the future.&lt;/p>
&lt;h3 id="how-frequently-does-the-user-need-to-complete-the-task">How frequently does the user need to complete the task?&lt;/h3>
&lt;p>Consider the frequency of the task, as well as how important the task may be to the overall function of the tool. For example, if the user is struggling with a particular task within the tool, but it is not a task they will need to complete regularly (such as configuring settings), this may not be a priority for the developer. However, if it is a task that the user will need to complete on a regular basis that is causing frustration, this likely will be a priority for the developer. Alternatively, if a task does not need to be completed often, but is essential to the functioning of the tool, this can also be a major barrier that should be prioritized by the developer. For example, if a user struggles to install the program properly or setup the program to run, this may prevent them from properly using the tool, even though it may only need to be completed once.&lt;/p>
&lt;h3 id="is-this-piece-of-feedback-relevant-and-actionable">Is this piece of feedback relevant and actionable?&lt;/h3>
&lt;p>The facilitator, trainer, or auditor is also uniquely positioned to ensure that the feedback is relevant and useful. Not all users will have technical knowledge, which will influence the type of feedback that they are able to provide. For example, a user who does not understand how attackers could “spoof” a trusted contact even in a secure communication tool may not understand the importance of verifying contacts by comparing what is often presented as a very long code of letters and numbers, and therefore, never do it. While the specific complaint about the usability could be “this is too difficult / the code is too long;” a facilitator or trainer would be able to identify the root cause and help provide more actionable feedback to the developer. A request to “shorten” the code would likely be met with resistance from a cryptographic / security standpoint, but the trainer can suggest better ways to present critical information to the user (e.g., has the code changed?) and help identify more user-friendly but still cryptographically sound ways to present the information.&lt;/p>
&lt;h3 id="what-concrete-suggestions-can-i-make-based-on-the-feedback-collected">What concrete suggestions can I make based on the feedback collected?&lt;/h3>
&lt;p>Beyond simply highlighting areas of confusion or frustration, the facilitator, trainer, or auditor is also a valuable voice when it comes to concrete suggestions for improvements. For example, if the language used on a specific button or configuration is confusing, suggest another word that may make the function of the button clearer to users. Similarly, instead of only highlighting that a specific word or phrase was not translated accurately, offer an alternative translation. These specific recommendations are very useful for the developer and give them concrete actions that they can take to improve the usability or accessibility of the tool or application.&lt;/p>
&lt;h3 id="how-can-i-streamline-the-feedback-process-and-maintain-this-feedback-loop-with-the-developer">How can I streamline the feedback process and maintain this feedback loop with the developer?&lt;/h3>
&lt;p>Most developers receive ad-hoc feedback from passionate users, who typically have some level of technical knowledge, but do not usually represent the average user of the tool or application. Trainers, auditors, and facilitators are positioned to capture feedback from real users, prioritize it based on relevance and quality, and share it in a streamlined format. By formalizing this process, trainers and facilitators will be able to share feedback more regularly.&lt;/p>
&lt;h3 id="resourcesadditional-information">Resources/additional information:&lt;/h3>
&lt;ul>
&lt;li>&lt;strong>&lt;a href="https://okthanks.com/blog/2019/3/6/keepassxc-can-anyone-use-it">Approachability of KeePassXC: Can anyone use it?&lt;/a>&lt;/strong> Blog post by Okthanks after a usability study of KeePassXC&lt;/li>
&lt;li>Simply Secure’s &lt;strong>&lt;a href="https://simplysecure.org/blog/feedback-gathering-guide">Guide to Gathering Feedback&lt;/a>&lt;/strong>&lt;/li>
&lt;li>Simply Secure’s &lt;strong>&lt;a href="https://simplysecure.org/blog/formative-testing">User Testing &amp;amp; Feedback with Tails Blog Post&lt;/a>&lt;/strong>&lt;/li>
&lt;/ul>
&lt;h3 id="stamp-for-this-activity">Stamp for this activity:&lt;/h3>
&lt;div style="text-align: center">&lt;img src="http://usable.tools/images/AXIS/PrioritizingFeedback.png" alt="Image of synthesizing and prioritizing feedback AXIS stamp" style="width:30%; border: 0; padding: 1em;" />&lt;/div></description></item><item><title>From Usability to Threat Modeling</title><link>http://usable.tools/blog/2020-08-11-threatmodels/</link><pubDate>Tue, 11 Aug 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-08-11-threatmodels/</guid><description>&lt;p>Across our portfolio of technology, training, and advocacy to support a
free and open Internet that protects and advances human rights, we are
assembling a wide array of foundational resources (all released under
Creative Commons licenses!). &lt;/p>
&lt;div class="boxtext" style=" width: 40%; float: right; padding-left: .5em; margin-left: 1em; border-left: 2px solid gray;">
&lt;h5 style="font-size: .75em;">Threat Modeling in Internet Freedom Projects&lt;/h5>
&lt;p style="font-size: .75em; line-height:1em; text-align: justify; text-justify: inter-word;">&lt;em>It's important to underline that this is not a new concept -- certainly
there are many security tools which already carefully consider threat
models during development; there is much written on using use cases and
"misuse cases" to expose the security and usability requirements for
tools -- this paper provides a good overview, and EFF's Security
Education Companion coverage of Threat Models introduces the concept for
use in training.&lt;/em>&lt;/p>
&lt;/div>
&lt;p>These include user personas with community-built lists of needs, and information about the threats or
adversaries they face. &lt;strong>This collection of different resources is not
coincidental&lt;/strong> – it builds a space in the middle to create detailed
&lt;strong>threat models&lt;/strong> around specific tools and practices and paves the way
to more expansive and cohesive long term digital safety strategies for
resilient communities.&lt;/p>
&lt;h2 id="what-we-have">What we have&lt;/h2>
&lt;table>
&lt;tr>&lt;th width="50%" style="background-color: #005CAB;">&lt;h3>At-Risk User Personas&lt;/h3>&lt;/th>
&lt;th width="50%" style="background-color: #FBB034;">&lt;h3>Contextual Digital Risk Assessments&lt;/h3>&lt;/th>&lt;/tr>
&lt;tr>&lt;td valign="top" style="padding: 15px;" >
&lt;!--&lt;img src="https://usable.tools//images/personas/ky-alexandria.png" alt="Example persona face" align="right" />-->
&lt;p>Our &lt;a href="https://USABLE.tools">USABLE.tools&lt;/a> project has a &lt;strong>&lt;a href="https://USABLE.tools/personas">user persona library&lt;/a>&lt;/strong> with 30+ user personas from around the world, representing LGBTQI activists, persons with disabilities, human rights defenders in closed states, and many more. These are not simply idealized stereotypes, however - they are created by the at-risk users themselves to provide authentic insight into the lived experiences, needs, and threats of these communities without putting any specific members of their community at risk. These personas provide critical insights into the needs and threats real people face in challenging environments. Tools for these communities need to be resilient against a wide variety of technical, physical, and legal attacks while also being easy to use, with little or no training.&lt;/p>
&lt;!--[**User Personas**](https://usable.tools/personas/), or anonymized profiles of end-users, provide a critical insight into the people who engage -- or whom developers want to engage -- with tools. When we are thinking about tools to protect marginalized persons, vulnerable populations, and/or the activists, advocates, and human rights defenders supporting them, the stakes are high. -->
&lt;/td>&lt;td valign="top" style="padding: 15px;" >
&lt;strong>Risk Assessments&lt;/strong> are a core of Internews' internal risk management process, and we also strongly encourage auditors using the &lt;strong>&lt;a href="https://SAFETAG.org">SAFETAG framework&lt;/a>&lt;/strong> to leverage a similar approach to research the technical and social context that they are working in when assessing an organization's security. The framework provides a &lt;a href="https://github.com/SAFETAG/SAFETAG/tree/master/en/exercises/technical_context_research">guide to research the technical capacity of potential threat actors&lt;/a>, including both historical attack data and any indicators of changes to their capacity. Auditors are encouraged to also look at focal areas and trends.
&lt;/td>&lt;/tr>&lt;/table>
&lt;h2 id="what-were-building">What we&amp;rsquo;re building&lt;/h2>
&lt;p>Under the &lt;a href="https://usable.tools/blog/2020-07-07-adoptable/">next phase of USABLE&amp;rsquo;s work&lt;/a>, we will be building two new resources - &amp;ldquo;personas&amp;rdquo; which represent the needs of organizations and communities and “personas” which capture the capabilities and motivations of realistic but generalized adversaries.&lt;/p>
&lt;table>
&lt;tr>
&lt;th width="50%" style="background-color: #6CB33F;">&lt;h3>Organizational Archetypes&lt;/h3>&lt;/th>
&lt;th width="50%" style="background-color: #F15D22;">&lt;h3>Adversary Personas&lt;/h3>&lt;/th>&lt;/tr>
&lt;tr>&lt;td valign="top" style="padding: 15px;" >
&lt;strong>Organizational Archetypes capture the complex needs of organizations and communities, spanning from grassroots communities all the way up to donors in the space facing state-level adversaries.&lt;/strong>
&lt;p>What are the more complex needs and different threats faced when collaborating? Secure messaging, calls, and document collaboration are all significantly more complex when you have multiple people or organizations involved, and tools which are relatively easy to swap in and out at a personal level become incredibly more complex if an entire organization depends upon them as a core part of their workflow.&lt;/p>
&lt;/td>&lt;td valign="top" style="padding: 15px;" >
&lt;p>&lt;strong>Adversary Personas will contain realistic details of generalized adversaries’ capacities and what issues these actors are willing to expend resources and build capacity to undermine.&lt;/strong>&lt;/p>
&lt;p>Organizations will be able to use these resources to anticipate potential threats and malicious actions and proactively develop practices and responses to realistic situations. This will enable developers, trainers, policymakers, funders, and others to contextualize their work against a wider variety of threat actors without having to rely on any one specific nation-state as a &amp;ldquo;bogeyman.&amp;rdquo; I specifically hope this enables richer conversation around actual threats while removing cultural stereotypes and prejudices.&lt;/p>
&lt;/td>&lt;/tr>&lt;/table>
&lt;h2 id="from-resources-to-practice">From Resources to Practice&lt;/h2>
&lt;p>These are collectively designed to enable unbiased discussions and
strategy development around the serious challenges and threats users,
organizations, and entire communities face, the tools we use to help,
and tools, practices, or policies we wish we had.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Responses focused on threats, not just threat actors&lt;/strong> Threat
actors change and evolve, and often have more capacity than is
publicly confirmed (but perhaps less than is presumed through
rumor). By extracting and de-personalizing aspects of this, we can
have clearer discussions. Further, specifying current existing
actors, especially in open source tools, can overly complicate the
public profile of the tool as well as those using it. If a tool is
clearly built to combat a specific actor, then users of that tool
can be seen as inherently being aligned against that actor. This has
resulted already in excessive targeting and jailing of activists
based on their tool choice.&lt;/li>
&lt;li>&lt;strong>Identification of common, cross-regional threats&lt;/strong> What attacks,
specific techniques, and even malicious tools are being used and
re-used globally? Are there patterns we can detect and build
proactive defenses against?&lt;/li>
&lt;li>&lt;strong>Gap identification&lt;/strong> What gaps remain when we look at this data
mapped out? Is anyone working to address them? What solutions
(tools, training, policy changes) could be used? How do we
sustainably build these resources?&lt;/li>
&lt;li>&lt;strong>More dynamic responses, more resilient communities&lt;/strong> By tackling
the inputs into this process separately, we can update our models
more agilely and plan against a wider variety of attacks to build
tools and guidance that are more resilient to more types of threat
actors as well as changes in any specific actor.&lt;/li>
&lt;li>&lt;strong>Future-looking strategies&lt;/strong> With these fictional personas and
archetypes, we do not have to be as limited to current actors and
their capacities. We can (within reason) consider possible future
threats that activists may face by remixing and extrapolating from
current threats. Anticipating these risks will allow us to build
tools to mitigate sooner, rather than later. &lt;em>Dystopian cyberpunk
scenarios welcome!&lt;/em>&lt;/li>
&lt;li>These resources can be used to develop &lt;strong>tabletop scenarios&lt;/strong> to
explore current and emerging threats and build creative responses to
them. These scenarios are useful in advanced trainings, tool
development, and strategy building exercises. Fictional but
realistic adversaries and personas can get into detail around
specific threats and mitigations without being as personal, risking
bias, and helping reduce potential of trauma involved in these
discussions.&lt;/li>
&lt;/ul>
&lt;br />
&lt;p>We are just getting started and would love to hear from you on what
data you hope to find in these resources, how you would use and adapt
them, and more! You can reach us at
&lt;a href="mailto:connect@usable.tools">&lt;strong>connect@usable.tools&lt;/strong>&lt;/a>.&lt;/p></description></item><item><title>Overview of Feedback Collection Activities</title><link>http://usable.tools/blog/2020-08-07-axisoverview/</link><pubDate>Fri, 07 Aug 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-08-07-axisoverview/</guid><description>&lt;h2 id="internews">Internews&lt;/h2>
&lt;h3 id="ux-feedback-collection-guidebook">UX Feedback Collection Guidebook&lt;/h3>
&lt;p>Many of the most at-risk communities around the globe rely on open source privacy and security tools. However, these tools are often designed, developed, and maintained by individuals or small teams who have little to no access to their target audience — journalists, activists, human rights defenders, and other high-risk groups. This often results in tools that poorly fit the threats, challenges, and/or accessibility or usability requirements of end-users.&lt;/p>
&lt;p>To further facilitate feedback loops between tool developers and the at-risk communities using those tools, Internews worked with trainers, designers, and developers from around the globe to create the &lt;em>&lt;a href="https://usable.tools/guidebook/">UX Feedback Collection Guidebook&lt;/a>&lt;/em> a compilation of activities and resources designed to integrate feedback collection into existing digital security training frameworks. These activities and resources allow trainers, auditors, and facilitators to collect relevant and useful feedback from high-risk users that are typically underrepresented in the design and development of open source privacy and security tools.&lt;/p>
&lt;p>The Guidebook equips digital security trainers and other trusted facilitators with the skills and resources they need to:&lt;/p>
&lt;ul>
&lt;li>Safely gather information around end-users’ needs, practices, and operating environments&lt;/li>
&lt;li>Collect tool-specific feedback from at-risk users&lt;/li>
&lt;li>Synthesize, prioritize, and structure information or feedback&lt;/li>
&lt;li>Share information or feedback with relevant developers or tool teams&lt;/li>
&lt;/ul>
&lt;p>This resource will help practitioners understand the value and process of capturing feedback where possible and how to share it with developers. When done effectively, this process can transform the design and development of the most commonly used privacy and security tools for at-risk users.&lt;/p>
&lt;h2 id="okthanks">Okthanks&lt;/h2>
&lt;p>In our work, we rely on our trusted local partners to help us understand the needs and desires of communities. Activities and frameworks serve as a guide, so that our partners know which questions to ask and what information is needed to inform the design of a tool. &lt;em>&lt;a href="https://www.okthanks.com/exploratorium">The Exploratorium&lt;/a>&lt;/em> contains many of the methods and activities we use in our practice when conducting user research, engaging communities in the design process, and measuring impact.&lt;/p>
&lt;h3 id="the-exploratorium">THE EXPLORATORIUM&lt;/h3>
&lt;p>&lt;em>&lt;a href="https://www.okthanks.com/exploratorium">The Exploratorium&lt;/a>&lt;/em> is a collection of activities that seeks to inspire participant engagement and foster relationships built on trust, inclusivity, and freedom, so all voices are heard and represented. They can be used as part of a user research plan or for gathering feedback. These activities aim to cultivate honest input, and generate meaningful and actionable insights. Use them in a group setting, at an event, or in a virtual focus group.&lt;/p>
&lt;p>Keeping individuals safe and implementing privacy-preserving measures when engaging is very important. &lt;em>&lt;a href="https://okthanks.com/our-research-principles">‘Our Research Principles’&lt;/a>&lt;/em> outline some of the questions we discuss as a team and with our partners when planning an engagement. Before deploying an activity, please consider how you are protecting the safety and privacy of participants.&lt;/p>
&lt;ul>
&lt;li>You can find all the activities on the Exploratorium page of our website: &lt;a href="https://okthanks.com/exploratorium">https://okthanks.com/exploratorium&lt;/a>.&lt;/li>
&lt;/ul>
&lt;p>A &lt;strong>facilitator guide&lt;/strong> accompanies every activity, outlining everything you need to know to deploy the activity, along with ideas for remote or virtual deployment! We understand how important it is to localize activities and currently have a few options localized, but would love to work together to do more!&lt;/p>
&lt;p>To learn more about ways to utilize an Exploratorium activity within your program visit our blog post entitled, &lt;em>&lt;a href="https://okthanks.com/blog/12activities-engage-communities-feedback-2019/8/23">“10 Activities to Engage Communities and Gather Feedback.”&lt;/a>&lt;/em>&lt;/p>
&lt;p>&lt;strong>We would love this collection to grow, so if you have activities you love, feedback on these activities, or ideas for activities you’d like to see, contact us on Signal or WhatsApp @ +1 209.396.5087 or through email at &lt;a href="mailto:hello@okthanks.com">hello@okthanks.com&lt;/a>.&lt;/strong>&lt;/p>
&lt;h2 id="simply-secure">Simply Secure&lt;/h2>
&lt;p>Gathering feedback can feel overwhelming! We’ve developed a number of resources — lightweight guides and templates — to try to make it easier to add into your regular engagements with people in your communities, at trainings, or convenings depending on the type of feedback you are interested to collect. As we’re frequently working with high-risk participants, we also prioritize &lt;em>&lt;a href="https://simplysecure.org/blog/design-spot-high-risk-research">safety and security&lt;/a>&lt;/em> as part of our feedback gathering practice.&lt;/p>
&lt;p>If you are new to gathering feedback, it might be best to start with the &lt;em>&lt;a href="https://simplysecure.org/knowledge-base/beginners/">beginners&lt;/a>&lt;/em> section of our &lt;em>&lt;a href="https://simplysecure.org/knowledge-base/">Knowledge Base&lt;/a>&lt;/em> or with our &lt;em>&lt;a href="https://simplysecure.org/ux-starter-pack/">UX Starter Pack&lt;/a>&lt;/em>. Interviews and surveys are great methods for getting in-depth, qualitative and open-ended feedback, but we’ve also found it can be helpful to invite people to draw and annotate feedback on paper. We’ve shared an example exercise like this in our &lt;em>&lt;a href="https://simplysecure.org/blog/feedback-gathering-guide">App Feedback Gathering Guide&lt;/a>&lt;/em> and our &lt;em>&lt;a href="https://simplysecure.org/blog/design-spot-tool-feedback">Design Spot: Quick Tool Feedback&lt;/a>&lt;/em> video. These tools and methods can be useful to developers, designers, trainers and auditors and are intended to help bring to light challenges that people have using different tools.&lt;/p></description></item><item><title>Selecting a Tool and Identifying Developers During the Feedback Collection Process</title><link>http://usable.tools/blog/2020-08-07-selectingtool/</link><pubDate>Fri, 07 Aug 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-08-07-selectingtool/</guid><description>&lt;p>Trainers and auditors should have the ability and framework to do quick research on tools before beginning the feedback collection process. This quick checklist helps trainers, auditors, and trusted facilitators determine whether or not they should choose to spend time collecting feedback on a particular tool.&lt;/p>
&lt;p>Prior to beginning feedback collection on any specific tool, it is important to consider the following:&lt;/p>
&lt;h3 id="is-the-project-active-is-the-project-sustainable">Is the project active? Is the project sustainable?&lt;/h3>
&lt;p>Before doing anything else, ensure the project is currently active. This means developers are currently working to update and make improvements on the product. With many open source projects, development may fluctuate due to lack of funding, volunteers, or time. Please refer to the checklist below to ensure the tool is actively maintained.&lt;/p>
&lt;ul>
&lt;li>Begin with a Google search.&lt;/li>
&lt;li>Explore the project’s website to find where they host their code. This is often GitHub, but could also be GitLab, SourceForge or a custom site for larger projects.&lt;/li>
&lt;li>Check for information on &lt;em>&lt;a href="https://openhub.net">OpenHub.net&lt;/a>&lt;/em>. OpenHub is a platform that gives you immediate data about current open source projects hosted on GitHub. Simply type the name of a tool in the search function and the output is a status report of the project.&lt;/li>
&lt;li>Reference the criteria used by the &lt;em>&lt;a href="https://openintegrity.org/framework/tool_selection_criteria/">Open Integrity Index by iilab&lt;/a>&lt;/em>.&lt;/li>
&lt;li>Additional considerations may also be taken depending on your context or concerns within the high-risk community you’re working with - e.g., has the tool been audited or peer-reviewed?&lt;/li>
&lt;/ul>
&lt;p>It can also be helpful to check if the project seems to be stable. Does the project have funding? Is it part of an organization? This is often harder to determine, but can save a lot of wasted effort.&lt;/p>
&lt;h3 id="is-there-a-way-to-submit-feedback-is-there-a-preferred-method-of-feedback-submission-specifically-for-user-feedback">Is there a way to submit feedback? Is there a preferred method of feedback submission (specifically for user-feedback)?&lt;/h3>
&lt;p>To maximize the impact of the feedback you are able to collect, look up the tool developers and how to contact them in advance. It can be frustrating to collect valuable feedback, but have no one to share it with. You may be able to identify specific developers via the tool’s website, GitHub, or the tool’s social media platform.&lt;/p>
&lt;p>You may not always be able to know which method of feedback is preferred. If you do and you are comfortable or familiar with this method, contact the developers through this channel. If not, submit the feedback via the method with which you feel most comfortable. Submitting feedback via a less common channel is better than submitting no feedback.&lt;/p>
&lt;p>To make things a bit easier, USABLE has put together a quick list of products that have been vocal about wanting feedback from their users. This list of tools can be found &lt;em>&lt;a href="https://usable.tools/pdfs/UXfeedbackCollectionGuidebook_ListOfTools.pdf">here&lt;/a>.&lt;/em>&lt;/p>
&lt;h3 id="stamp-for-this-activity">Stamp for this activity:&lt;/h3>
&lt;div style="text-align: center">&lt;img src="http://usable.tools/images/AXIS/FeedbackCollection.png" alt="Image of Tool-specific feedback collection AXIS stamp" style="width: 33.33%; border: 0; padding: 1em;" />&lt;/div></description></item><item><title>Feedback Collection Certification</title><link>http://usable.tools/blog/2020-07-31-axiscertification/</link><pubDate>Fri, 31 Jul 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-07-31-axiscertification/</guid><description>&lt;p>We are excited to offer a new &lt;strong>AXIS Feedback Collection Certification&lt;/strong>. As part of our 2020 event, &lt;strong>Axis: A Global Feedback Exchange for Trainers, Auditors, Designers, and Developers&lt;/strong>, we are bringing together key communities to map privacy and security tools being used by at-risk organizations and to identify concrete ways that we can support improvements to those tools.&lt;/p>
&lt;p>During the convenings, participants will explore and provide feedback on existing feedback collection resources such as The UX Feedback Collection Guidebook, the Exploratorium, and more. They will map tools being used in at-risk communities, develop organizational archetypes and adversary personas, practice feedback collection activities, learn how to synthesize and prioritize feedback, how to share that information with tool developers, and more.&lt;/p>
&lt;p>Each week of the convening offers participants a chance to collect stamps toward the Feedback Collection Certification by engaging and interacting with fundamental concepts important to understanding and implementing feedback within their communities.&lt;/p>
&lt;p>Following the convenings, participants will be able to integrate feedback collection into their existing audits and/or trainings, resulting in actionable feedback that will be shared directly with tool teams and developers. Additionally, participants will have the option to apply for funding to put these skills into practice.&lt;/p>
&lt;p>&lt;strong>Individuals who receive this certification have the following qualifications:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Knowledge of Open Source Tools:&lt;/strong> Knowledge of open source privacy and security tools being developed and maintained, as well as an awareness of which at-risk communities are relying on these tools&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Building Trust With At-risk Communities:&lt;/strong> Ability to connect and build trust with at-risk communities/users&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Understanding User Experience &amp;amp; Human Centered Design:&lt;/strong> Understanding of human-centered design and user-experience&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Tool-Specific Feedback Collection:&lt;/strong> Ability to collect tool-specific feedback during digital security trainings and/or organizational security audits (utilizing editable templates and activities for feedback collection)&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Understanding the User:&lt;/strong> Ability to understand and capture user needs and challenges at the individual, organization, and/or community levels (and present in the form of personas, archetypes, user stories, etc.)&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Understanding Adversaries:&lt;/strong> Knowledge of common adversary tactics and strategies&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Synthesizing, Prioritizing, and Formatting Feedback:&lt;/strong> Ability to synthesize, prioritize, and format tool-specific user feedback&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Communicating User Feedback to Developers:&lt;/strong> Ability to communicate feedback effectively to developers and/or tool teams&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Virtual Engagements with Users:&lt;/strong> Understanding of how to facilitate feedback collection activities virtually&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Networking:&lt;/strong> Access to a global network of digital security trainers, auditors, UX designers and accessibility experts, and developers&lt;/p>
&lt;/li>
&lt;/ul>
&lt;div style="text-align: center">&lt;img src="http://usable.tools/images/AXIS/AllStamps.PNG" alt="All AXIS Stamps" style="border: 0; padding: 1em;" />&lt;/div></description></item><item><title>Human-Centered Design and User-Experience</title><link>http://usable.tools/blog/2020-07-31-uxandhcd/</link><pubDate>Fri, 31 Jul 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-07-31-uxandhcd/</guid><description>&lt;p>&lt;strong>Human-centered design&lt;/strong> is a principle that intentionally places humans, their needs, their concerns, and their experiences front and center when building a system. This system could be a piece of software or a product, but it could also be a process like conducting a security assessment or creating a resource for your community. Co-creation is an integral part of human-centered design, products and software that are collaboratively developed are more likely to meet the needs of a broader user base. Components of human-centered design include:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Building empathy&lt;/strong> with the users&lt;/li>
&lt;li>&lt;strong>Identifying needs&lt;/strong> based on observations, interactions, and user feedback&lt;/li>
&lt;li>&lt;strong>Creative ideation&lt;/strong> to solve challenges users experience&lt;/li>
&lt;li>&lt;strong>Prototyping&lt;/strong> without technical implementation&lt;/li>
&lt;li>&lt;strong>Testing&lt;/strong> to validate decisions made&lt;/li>
&lt;li>&lt;strong>Implementing&lt;/strong> based on findings during the testing phase&lt;/li>
&lt;li>&lt;strong>Observing&lt;/strong> and collecting more user feedback&lt;/li>
&lt;/ul>
&lt;p>&lt;strong>User-experience, or UX,&lt;/strong> is a holistic way someone may experience the service, the product, or the system from all aspects - usability to information architecture and layout to things like likelihood of making a mistake or being able to recover from said mistake.&lt;/p>
&lt;p>How are these two concepts related? If we are able to understand our users, or more importantly, empathize with them using human-centered design principles, we are often left with better results. Our products, services, processes, or overarching system will be more resilient and more effective in achieving their goals.&lt;/p>
&lt;p>A key feature to both human-centered design principles and good user-experience is communicating with the user in the form of feedback. In the software development world, it is important &lt;strong>to collect feedback early and often&lt;/strong> to avoid problems later on in the development lifecycle, For example, spending hours engineering a product without inputting user feedback into the process can result in a product that no one will use. Not only is it likely to be difficult for your users, but changes will be more costly if made at the end of the cycle rather than the beginning, when very little to any code is written.&lt;/p>
&lt;p>By involving trainers in the feedback process through the activities in the &lt;a href="https://usable.tools/guidebook">UX Feedback Collection Guidebook&lt;/a>, USABLE provides a space for tool developers to learn about specific threats faced by their users, the risks they take, and challenges they face, in addition to tool-specific feedback to improve the design for high-risk users. Likewise, it gives trainers and high-risk users a platform to share their feedback and lived experiences, while impacting security and privacy products their communities need.&lt;/p>
&lt;iframe title="vimeo-player" src="https://player.vimeo.com/video/321251611" width="640" height="337" float="center" frameborder="0" allowfullscreen>&lt;/iframe>
&lt;p>&lt;strong>To learn more, we recommend checking out:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Nielsen Norman Group &lt;a href="https://www.nngroup.com/articles/design-thinking/">https://www.nngroup.com/articles/design-thinking/&lt;/a> and &lt;a href="https://www.nngroup.com/articles/definition-user-experience/">https://www.nngroup.com/articles/definition-user-experience/&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Ideo &lt;a href="http://www.designkit.org/human-centered-design">http://www.designkit.org/human-centered-design&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Stanford University &lt;a href="https://dschool.stanford.edu/resources/design-thinking-bootleg">https://dschool.stanford.edu/resources/design-thinking-bootleg&lt;/a>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>SimplySecure &lt;a href="https://simplysecure.org/knowledge-base/">https://simplysecure.org/knowledge-base/&lt;/a>&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h3 id="stamp-for-this-activity">Stamp for this activity:&lt;/h3>
&lt;div style="text-align: center">&lt;img src="http://usable.tools/images/AXIS/UXandHCD.png" alt="Image of User experience and human centered design AXIS stamp" style="width: 33.33%; border: 0; padding: 1em;" />&lt;/div></description></item><item><title>Understanding Development Ecosystems &amp; The Role of Trainers and Auditors</title><link>http://usable.tools/blog/2020-07-31-ecosystems/</link><pubDate>Fri, 31 Jul 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-07-31-ecosystems/</guid><description>&lt;p>Though business models vary case by case, there are significant differences between the development ecosystems of closed source tools (many of which are private and commercial) and open source tools. By understanding the humans and processes behind the tool, we can tailor our feedback and maximize the impact of our usability and accessibility recommendations. This blog explores tool team structures, providing insight into the design and development processes they implement.&lt;/p>
&lt;h2 id="understanding-the-closed-source-ecosystem">Understanding the Closed Source Ecosystem&lt;/h2>
&lt;p>Many of the most popular private sector tools are closed source and well resourced. Most of these tools have well-established business models (including paid services and advertisements) that provide significant funding streams. They often have large teams of people working on the tool, specializing in particular areas such as design, user-experience, or marketing. In addition to large teams of developers or engineers who are focused on back-end development, many private sector tools will also have entire teams devoted to user testing or providing support to end users.&lt;/p>
&lt;p>In this ecosystem, end users are rarely engaging directly with developers. Feedback from users is filtered through multiple team members (user support, UX experts, designers, etc.) and is vetted at multiple levels before eventually being converted into specific edits or changes to the tool.&lt;/p>
&lt;p>Additionally, these well-resourced tools often have offices located around the globe and can afford to conduct targeted user-testing if they are seeking input from a particular user group.&lt;/p>
&lt;p>A few examples of Closed Source Ecosystems include:&lt;/p>
&lt;ul>
&lt;li>Facebook&lt;/li>
&lt;li>Google&lt;/li>
&lt;li>Microsoft&lt;/li>
&lt;/ul>
&lt;h2 id="understanding-the-open-source-ecosystem">Understanding the Open Source Ecosystem&lt;/h2>
&lt;p>Alternatively, many of the most-used and most-critical open source digital security tools are maintained and updated by “tool teams” rather than businesses or organizations. These ad-hoc groups have little if any institutional capacity, are often under-resourced, and have limited insight into the specific needs of at-risk users.&lt;/p>
&lt;p>The survival of many of these tools is dependent on the dedication of volunteers, often working in their free time simply because they are passionate about the project. Some tools are developed and maintained by only one core individual. Additionally, these small teams seldom include specific UX, user-research, or design experts.&lt;/p>
&lt;p>While USABLE has experienced great results with tool teams that have the capacity to address identified usability barriers, many tool teams simply lack the necessary personnel or organizational structures that would allow them to respond directly or even receive funding to support a response. This traps tool teams – and by extension, the community of high-risk tool users – in a vicious cycle of only being able to focus on the most immediate and urgent needs without being able to prioritize long-term usability or scalability improvements.&lt;/p>
&lt;p>A few examples of Open Source Ecosystems include:&lt;/p>
&lt;ul>
&lt;li>The Guardian Project&lt;/li>
&lt;li>Mailvelope&lt;/li>
&lt;li>KeePassXC&lt;/li>
&lt;/ul>
&lt;h2 id="the-role-of-trainersauditors">The Role of Trainers/Auditors&lt;/h2>
&lt;p>Given these ecosystems, relevant and synthesized feedback from at-risk users via proper channels is incredibly valuable, particularly for open source tool teams with limited capacity. Trainers, auditors, and other facilitators who engage regularly with at-risk users are uniquely positioned to serve as trusted intermediaries between end users and tool teams. Based on their in-depth knowledge of user needs and challenges, as well as their understanding of privacy and security tools, trainers and auditors are able to synthesize and prioritize feedback. By ensuring that tool teams receive high-quality feedback reduces the burden for development teams, particularly those that may have limited bandwidth and resources, and increases the likelihood of tool teams implementing meaningful usability and accessibility enhancements within the tools at-risk communities rely on.&lt;/p>
&lt;p>Though resources and structures may vary, the important role that users play in each of these ecosystems is undeniable. It is critical that we continue to connect, build trust, and close the feedback loop between tool creators and end users. In the end, we are all part of the same ecosystem working towards a more usable and secure future.&lt;/p></description></item><item><title>Introducing ADOPTABLE</title><link>http://usable.tools/blog/2020-07-07-adoptable/</link><pubDate>Tue, 07 Jul 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-07-07-adoptable/</guid><description>&lt;h2 id="introducing-adoptable-equipping-at-risk-organizations-with-localized-expertise-resources-and-tools-to-mitigate-digital-attacks">Introducing ADOPTABLE: Equipping at-risk organizations with localized expertise, resources, and tools to mitigate digital attacks&lt;/h2>
&lt;p>Human rights organizations around the globe continue to face ongoing and increasing digital security threats from state and non-state actors. ADOPTABLE (Adaptable Digital and Organizational Protections by Transforming and Building Long-term Ecosystems) is an Internews project designed to help these at-risk organizations access relevant resources (human, financial, and technical tools) that will allow them to continue to operate safely. Without access to local organizational security experts, usable security and privacy tools, buy-in from decision-makers, and support from funders to adopt stronger safety practices, the organizations and their beneficiaries remain at risk, as does their crucial work.&lt;/p>
&lt;h3 id="the-project-consists-of-four-core-components">The project consists of four core components:&lt;/h3>
&lt;h3 id="1-expanding-the-capacity-of-regional-and-local-partners-to-address-organizational-security-risks">1. Expanding the capacity of regional and local partners to address organizational security risks&lt;/h3>
&lt;p>Internews will support experienced partners in Latin America, Sub-Saharan Africa, and Eastern Europe to become &lt;strong>regionally recognized centers of expertise&lt;/strong> on organizational security and build out local and regional ecosystems of organizational security auditors. Partners will conduct Trainings of Auditors (ToA’s) to train and/or upskill local security auditors in their regions on the &lt;a href="https://safetag.org">SAFETAG framework&lt;/a>. These newly trained auditors will work with experienced auditors to gain first-hand experience in conducting audits, while also collecting feedback on organizational security tools being used by at-risk organizations. To improve the scalability of this localization of expertise, Internews is also working to improve the SAFETAG onboarding and training process and make the framework more accessible by developing a &lt;strong>new interface&lt;/strong>. More on that process &lt;a href="https://usable.tools/blog/2020-05-13-safetag-community-call/">here&lt;/a>.&lt;/p>
&lt;h3 id="2-improving-the-adoption-of-organizational-security-practices-within-at-risk-organizations">2. Improving the adoption of organizational security practices within at-risk organizations&lt;/h3>
&lt;p>Internews will fund at least 5 audits or engagements in each of the three target regions. At-risk organizations will undergo a &lt;strong>full security audit&lt;/strong> and receive a detailed &lt;strong>Risk Reduction Plan&lt;/strong> (RRP), which outlines tangible steps they can take to mitigate their risks. Even after a security audit, Internews has found that many organizations lack the resources needed to implement the recommendations provided by an expert. Without the ability to implement these changes, organizations are no more secure than they were before an audit. Internews will ensure that these organizations are able to implement the recommended changes by &lt;strong>providing direct financial support after the audits.&lt;/strong> A variety of mitigation efforts may be eligible for support, including trainings for organization staff, facilitation of a security service by a third party, or the purchase of software and hardware.&lt;/p>
&lt;h3 id="3-developing-and-enhancing-feedback-collection-mechanisms-to-ensure-at-risk-users-have-a-voice-in-the-design-and-development-of-open-source-privacy-and-security-tools">3. Developing and enhancing feedback collection mechanisms to ensure at-risk users have a voice in the design and development of open source privacy and security tools&lt;/h3>
&lt;p>As part of the USABLE approach, Internews created feedback loops between at-risk users, digital security trainers, and open source tool developers. Internews will continue to collect feedback from at-risk individual users, while also expanding to capture organization-wide feedback on security and privacy tools. Most notably, the USABLE approach will be integrated into the SAFETAG framework, allowing SAFETAG auditors to identify gaps and usability issues with privacy tools being used at the organizational level. Through virtual &lt;a href="https://usable.tools/blog/2020-04-03-cross-regional-convenings/">Cross-Regional Convenings&lt;/a>, Internews will work with partners to update the activities in the &lt;a href="https://usable.tools/guidebook">UX Feedback Collection Guidebook&lt;/a>, develop organizational archetypes to further build out our library of user personas, and map the current landscape of open source tools being used by at-risk communities around the globe. Following the virtual convenings, Internews will launch a &lt;strong>pool of funding for trainers and auditors&lt;/strong> to integrate feedback collection activities into their digital security trainings or organizational audits. The high-quality feedback collected during these engagements will be shared with developers through their preferred channels. Key communities will convene once more at the end of the project for the third &lt;strong>UXForum&lt;/strong> to continue devising ways to scale and sustain feedback loops.&lt;/p>
&lt;h3 id="4-enhancing-the-usability-and-accessibility-of-open-source-privacy-and-security-tools">4. Enhancing the usability and accessibility of open source privacy and security tools&lt;/h3>
&lt;p>Internews will launch the third round of the &lt;strong>UX Fund&lt;/strong>. This funding pool will provide support to privacy and security tool teams, enabling them to work with UX and accessibility experts to implement human-centered, usability-focused tool improvements. These changes will ultimately strengthen the tools, making them more &lt;strong>secure for the at-risk individuals and organizations&lt;/strong> who need them the most.&lt;/p>
&lt;p>Ultimately, &lt;strong>we believe that with more localized tools and stronger local support, at-risk organizations will be better equipped to withstand the digital attacks and surveillance they currently face.&lt;/strong>&lt;/p></description></item><item><title>IFF OrgSec Village: Day Five</title><link>http://usable.tools/blog/2020-06-15-iff-osv-day5/</link><pubDate>Mon, 15 Jun 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-06-15-iff-osv-day5/</guid><description>&lt;h2 id="iff-orgsec-village">IFF OrgSec Village&lt;/h2>
&lt;p>Internews is hosting the virtual Internet Freedom Festival (IFF) Organizational Security Village throughout this week (June 8-12)! The event is bringing together security auditors, digital security trainers, and other experts and practitioners for a five-day program of over 20 community-led sessions exploring five major themes in organizational security.&lt;/p>
&lt;h2 id="day-4">Day 4&lt;/h2>
&lt;p>Sessions on Day 5 focused on funding OrgSec work and Monitoring &amp;amp; Evaluation. Highlights from Day 5 of the OrgSec village included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>A discussion around how small, local digital support initiatives can &lt;strong>fund digital security assistance&lt;/strong> for nonprofits through strategic networking.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A brainstorm around ways to better &lt;strong>support digital security programs&lt;/strong> through informing and coordinating with donors.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>An open dialogue on &lt;strong>evaluating audit success&lt;/strong> from an auditor’s perspective.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A presentation of frameworks to measure the &lt;strong>impact&lt;/strong> of organizational security work.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="key-takeaways">Key Takeaways&lt;/h2>
&lt;p>Key takeaways from the discussions included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Securing funding is a challenge for OrgSec practitioners.&lt;/strong> Organizations need to better incorporate digital and organizational security into their budgets and marketing and communications plans. More broadly, there is a need for coordination within the local and international OrgSec community to promote knowledge sharing and establish partnerships in order to educate and coordinate with donors more effectively. Donors also need to adopt digital security practices that allow them to engage with organizations and support their work safely.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Community members debated the value of establishing certifications or skills qualifications&lt;/strong> for work in the space in order to reduce the reliance on trust networks. This could reduce barriers to funding and opportunities for work for new practitioners who may be less known to both funders and at-risk organizations seeking support. However, establishing community-wide agreed upon standards and mitigating the substantial additional barriers to entry (e.g. cost, training opportunities and locations, personal and unfunded time) caused by any such certification system pose a formidable challenge.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Measuring the impact of OrgSec programs is important&lt;/strong> in order to evaluate and improve approaches and communicate success to donors. While it is easy to focus on measuring purely digital risk, is it important to bear in mind that effective OrgSec should take a &lt;strong>holistic&lt;/strong> approach also incorporating psychosocial support and physical aspects.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Whether to evaluate OrgSec interventions using shared community standards or by measuring change within an organization and against its own threat model&lt;/strong> continued to inspire debate among community members. The Engine Room shared a &lt;a href="https://orgsec.community/display/OS/Monitoring+and+Evaluation+Framework++for+Organisational+Security">Monitoring and Evaluation Framework&lt;/a> for Organizational Security - which takes the latter approach - for practitioners to adapt for their own M&amp;amp;E practices.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h3 id="thank-you-for-participating-in-the-orgsec-village-if-youd-like-to-continue-the-conversation-head-to-httpsorgseccommunitydisplayos-we-will-be-posting-shared-notes-from-the-event-on-the-wiki">Thank you for participating in the OrgSec Village! If you;d like to continue the conversation, head to &lt;a href="https://orgsec.community/display/OS">https://orgsec.community/display/OS&lt;/a>. We will be posting shared notes from the event on the wiki!!&lt;/h3></description></item><item><title>IFF OrgSec Village: Day Four</title><link>http://usable.tools/blog/2020-06-12-iff-osv-day4/</link><pubDate>Thu, 11 Jun 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-06-12-iff-osv-day4/</guid><description>&lt;h2 id="iff-orgsec-village">IFF OrgSec Village&lt;/h2>
&lt;p>Internews is hosting the virtual Internet Freedom Festival (IFF) Organizational Security Village throughout this week (June 8-12)! The event is bringing together security auditors, digital security trainers, and other experts and practitioners for a five-day program of over 20 community-led sessions exploring five major themes in organizational security.&lt;/p>
&lt;h2 id="day-4">Day 4&lt;/h2>
&lt;p>Sessions on Day 4 focused on responding to advanced threats. Highlights from Day 4 of the OrgSec village included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>A conversation on &lt;strong>community insights to improve automated threat modeling,&lt;/strong> gathering inputs from a diverse range of individuals and groups regarding the threats they face.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A session demonstrating how to build a &lt;strong>threat lab with your bare hands . . . and a laptop.&lt;/strong>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>An overview of digital &lt;strong>threat information sharing for human rights.&lt;/strong>&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="key-takeaways">Key Takeaways&lt;/h2>
&lt;p>Key takeaways from the discussions included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Threat detection isn’t only about fancy technology!&lt;/strong> A lot of endpoint detection is process and practice-oriented. Impressing the importance of antivirus and software updates, teaching partners what abnormal activity looks like, or making sure they know the process for calling first responders takes training, process development, and awareness raising.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Trust is a key component of threat information sharing.&lt;/strong> Knowing who and where to share information about threats requires personal connections and existing trust relationships, which can feel like a barrier to entering the space. But community networks like the Computer Incident Response Center for Civil Society (CiviCERT) and information sharing standards such as the Traffic Light Protocol (TLP) can lower barriers and facilitate sharing through established community standards.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Getting started in threat analysis requires trust, skills, and time.&lt;/strong> Though you will eventually need computers powerful enough to run virtual machines, more advanced skills, and connections to other researchers and communities like CiviCERT, don’t be intimidated by the technical jargon! All it takes to get started is a willingness to learn.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Human rights advocates are facing attacks&lt;/strong> such as phishing and publication of their identifying details by government or state-sponsored adversaries that are based on online open source intelligence (OSINT) gathering. When threat modeling, it is important to identify the types of public data that makes you vulnerable and that adversaries may try to exploit.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h3 id="join-us-for-the-final-sessions-this-friday-with-a-focus-on-assessing-impact-and-funding-organizational-security">Join us for the final sessions this Friday, with a focus on assessing impact and funding organizational security!&lt;/h3></description></item><item><title>IFF OrgSec Village: Day Three</title><link>http://usable.tools/blog/2020-06-11-iff-osv-day3/</link><pubDate>Thu, 11 Jun 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-06-11-iff-osv-day3/</guid><description>&lt;h2 id="iff-orgsec-village">IFF OrgSec Village&lt;/h2>
&lt;p>Internews is hosting the virtual Internet Freedom Festival (IFF) Organizational Security Village throughout this week (June 8-12)! The event is bringing together security auditors, digital security trainers, and other experts and practitioners for a five-day program of over 20 community-led sessions exploring five major themes in organizational security.&lt;/p>
&lt;h2 id="day-3">Day 3&lt;/h2>
&lt;p>Sessions on Day 3 continued to explore examples of OrgSec in Practice. Highlights from Day 3 of the OrgSec village included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>A collective discussion around what we mean as a community when we say &lt;strong>OrgSec Crisis Response,&lt;/strong> and how we can provide comprehensive crisis response support.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>An informal session sharing practitioners’ experiences conducting &lt;strong>Remote Organizational Assessments, Remote Tech Assistance, and other remote interventions.&lt;/strong>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A case study of one organization’s experience launching a &lt;strong>Website with Digital Security Instructions&lt;/strong> and the unexpected ways audiences used it.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A presentation on the &lt;strong>RAWRR (Risk Assessment Workflow Recommendation Roadmap) tool&lt;/strong> for documenting security assessments, risk modelling, recommendation development and implementation monitoring.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A review of &lt;strong>Security Governance in CSOs&lt;/strong> exploring ways to scale policy development approaches to different sizes, capacities, and complexities of organizations and communities.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="key-takeaways">Key Takeaways&lt;/h2>
&lt;p>Key takeaways from the discussions included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Remote interventions do work, but require more time and preparation than face-to-face support.&lt;/strong> Remote interventions can save time and money spent on travel, and can be the right format for rapid response or consultations (especially when trust is already established) as well as for facilitated online learning. However, they require significant time investment, and present numerous additional challenges. For example, remote trust building is tricky, and many people are uncomfortable enabling remote device access. Technical barriers like poor internet connectivity or lack of tech skills among staff may emerge. Finally, it is impossible to provide full technical support if something goes wrong that can&amp;rsquo;t be fixed remotely.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Web-based digital security guides are not dead (but keep them simple)!&lt;/strong> Websites with complicated interactive guides addressing specific threat models don’t get sustained engagement and are difficult and expensive to maintain long-term. In contrast, sites with a set of searchable, specific, and updated instructions for different tools and cases can be a useful resource for post-audit and training communications and remote support and incident response. In addition, they are easier to keep up-to-date.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>It’s crucial to tailor security audit reports to the audience in mind.&lt;/strong> Whether the report is for management or IT staff with technical know-how will dictate the specificity and structure of the report. There was community consensus that risk should be the focus of audit reports. Shorter reports focusing on action steps may be useful for organizations with limited bandwidth and interest in holistic security; in-depth reports detailing the process and connecting recommendations to risk are a more useful resource for organizations wishing to replicate the process down the line or build their own internal digital security expertise.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>When developing organizational security policies, don’t start from scratch!&lt;/strong> There are many existing policy frameworks for practitioners to draw upon when assisting civil society organizations. Start with &lt;a href="https://www.usesoap.app/">SOAP&lt;/a>, &lt;a href="https://sdamanual.org/">SDA&lt;/a>, and resources from &lt;a href="https://communitydocs.accessnow.org/370-Organizational_Security_Policy.html">Access Now&lt;/a> and the &lt;a href="https://sandbox.cryptpad.info/bounce/#https%3A%2F%2Forgsec.community%2Fdisplay%2FOS%2FCreating%2Borganisational%2Bsecurity%2Bpolicies">OrgSec Wiki&lt;/a>.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="its-not-too-late-to-register">It&amp;rsquo;s not too late to register!&lt;/h2>
&lt;p>It&amp;rsquo;s not too late to register! Join us for more sessions throughout the week on OrgSec in Practice, Advanced Threats, Funding Models, and more!
Register &lt;a href="HTTPS://DOCS.GOOGLE.COM/FORMS/D/E/1FAIPQLSD_VZEIABKYYT1PMIQ4_KA-FFK8KCJGMHNJQW9-N2UCFJABIG/VIEWFORM">here!&lt;/a>&lt;/p></description></item><item><title>IFF OrgSec Village: Day Two</title><link>http://usable.tools/blog/2020-06-10-iff-osv-day2/</link><pubDate>Wed, 10 Jun 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-06-10-iff-osv-day2/</guid><description>&lt;h2 id="iff-orgsec-village">IFF OrgSec Village&lt;/h2>
&lt;p>Internews is hosting the virtual Internet Freedom Festival (IFF) Organizational Security Village throughout this week (June 8-12)! The event is bringing together security auditors, digital security trainers, and other experts and practitioners for a five-day program of over 20 community-led sessions exploring five major themes in organizational security.&lt;/p>
&lt;h2 id="day-2">Day 2&lt;/h2>
&lt;p>Sessions on Day 2 explored examples of OrgSec in Practice. Highlights from Day 2 of the OrgSec village included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>A collaborative survey of the &lt;strong>OrgSec Community’s Response to Emerging Crises.&lt;/strong>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A presentation of work carried out with the &lt;strong>Mechanism for the Integral Protection of Human Rights Defenders and Journalists in Mexico City&lt;/strong>, including a typology and workflow for the diagnosis of digital incidents.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A discussion around &lt;strong>Non-technical Due Diligence&lt;/strong> when choosing security tools and services, exploring questions on jurisdiction, open sourcing, and reputation.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>An exploration of alliances as a support mechanism to guarantee the &lt;strong>Digital Security of Human Rights Defenders Working in Civic and Internet Repressive Environments.&lt;/strong>&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A step-by-step playbook of the &lt;strong>OrgSec Audit Process&lt;/strong> in different contexts.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>A hard look at how &lt;strong>Digital Security Trainings Can Do More Harm than Good.&lt;/strong>&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="key-takeaways">Key Takeaways&lt;/h2>
&lt;p>Key takeaways from the discussions included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>Cross-sector partnerships can expand OrgSec support.&lt;/strong> At times, it can be advantageous for organizations providing digital security support to at-risk communities to coordinate with government agencies offering similar support mechanisms. Traditional training methods combined with local and federal protection mechanisms allow for maximum protection for those communities who are most at-risk.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Approaches to OrgSec must be adapted to the local context or threat model.&lt;/strong> What may be a serious threat to one organization, may not be to another. When working with an organization, it is important to understand the threats that are relative to their work and/or location. What are the risks that they face? What has been happening to similar organizations in the region? It is not a one-size-fits-all approach, but rather needs to be tailored to the needs and capacity of each organization.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Empower organizations with the knowledge and guidance to understand and mitigate their risks.&lt;/strong> Security can be overwhelming, particularly for less-technical users. It is critical for an auditor or trainer to focus on the how and why and not just the end result. The more organizations understand, the more confident they will be. This will better equip them to replicate the process in the future. Accessible language and easy to navigate guides and checklists can facilitate this sharing of knowledge.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Know when your support does more harm than good.&lt;/strong> Digital security trainings are helpful &amp;ndash; except for when they’re not. As an auditor or trainer, it is often difficult to find the time needed to properly onboard organizations to the security practices they need. Behavior change takes time and cannot be accomplished in a two-hour training session. There is no guarantee that the organization will continue to properly use (or use at all) a tool or software installed or downloaded during the training. OrgSec practitioners must be aware of these limitations, as insufficient training or support may lead to a false sense of security and can ultimately put the organization at a greater risk than they were to begin with.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>SAFETAG is meant to be a general framework.&lt;/strong> The SAFETAG framework serves as a toolbox, or collection of relevant tools and activities that can be used to conduct an organizational security audit. When planning for an audit, the auditor must select which tools and activities are most relevant based on the local context, size of the organization, and resources available. Some activities may be too complicated or irrelevant. You do not need to complete every activity in the SAFETAG framework!&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="its-not-too-late-to-register">It&amp;rsquo;s not too late to register!&lt;/h2>
&lt;p>It&amp;rsquo;s not too late to register! Join us for more sessions throughout the week on OrgSec in Practice, Advanced Threats, Funding Models, and more!
Register &lt;a href="HTTPS://DOCS.GOOGLE.COM/FORMS/D/E/1FAIPQLSD_VZEIABKYYT1PMIQ4_KA-FFK8KCJGMHNJQW9-N2UCFJABIG/VIEWFORM">here!&lt;/a>&lt;/p></description></item><item><title>IFF OrgSec Village: Day One</title><link>http://usable.tools/blog/2020-06-09-iff-osv-day1/</link><pubDate>Tue, 09 Jun 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-06-09-iff-osv-day1/</guid><description>&lt;h2 id="iff-orgsec-village">IFF OrgSec Village&lt;/h2>
&lt;p>Internews is hosting the virtual Internet Freedom Festival (IFF) Organizational Security Village throughout this week (June 8-12)! The event is bringing together security auditors, digital security trainers, and other experts and practitioners for a five-day program of over 20 community-led sessions exploring five major themes in organizational security.&lt;/p>
&lt;h2 id="day-1">Day 1&lt;/h2>
&lt;p>Sessions on Day 1 centered around diverse approaches to OrgSec adopted by practitioners in the community. Highlights from Day 1 of the OrgSec village included:&lt;/p>
&lt;ul>
&lt;li>A co-creation session on making &lt;em>Organizational Security Community Spaces more Useful, Inclusive, and Resilient.&lt;/em>&lt;/li>
&lt;li>A discussion on ways to &lt;em>Scale Organizational Security Assistance.&lt;/em>&lt;/li>
&lt;li>A session on &lt;em>Strategies to Avoid Dependency and Deliver Lasting Change&lt;/em> through OrgSec interventions.&lt;/li>
&lt;li>A conversation around the &lt;em>Importance of Long Term Support and Engagement&lt;/em> beyond digital security assessments in delivering organizational change.&lt;/li>
&lt;/ul>
&lt;h2 id="key-takeaways">Key Takeaways&lt;/h2>
&lt;p>Key takeaways from the discussions included:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>The goal of OrgSec work is to make itself obsolete!&lt;/strong> While it is easy to focus on tangible outputs like audits or reports, most auditors and trainers prioritize increased internal organizational security expertise and decreased dependence on external security help. Effective strategies include finding digital security champions within organizations and building capacity in the surrounding community. Building the confidence and ability of those in the organizations to put digital security into practice is just as important as hardening their digital security.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>Organizational Security assistance is not being made available to those who need it the most.&lt;/strong> In the US and globally marginalized communities facing the greatest threats are also those with least access to critical digital security resources (both human and financial). It is imperative to address this fact when designing programs and change the language we are using to be more inclusive of these communities.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>&lt;strong>A security audit or assessment is just the beginning!&lt;/strong> Most organizations need long-term support to make an effective change in their practices and harden their defenses against digital security attacks. Despite this, funding structures supporting current OrgSec work are not conducive to long-term engagement. Practitioners need to consider how to bake sustainability and long-term support into program design.&lt;/p>
&lt;/li>
&lt;/ul>
&lt;h2 id="its-not-too-late-to-register">It&amp;rsquo;s not too late to register!&lt;/h2>
&lt;p>It&amp;rsquo;s not too late to register! Join us for more sessions throughout the week on OrgSec in Practice, Advanced Threats, Funding Models, and more!
Register &lt;a href="HTTPS://DOCS.GOOGLE.COM/FORMS/D/E/1FAIPQLSD_VZEIABKYYT1PMIQ4_KA-FFK8KCJGMHNJQW9-N2UCFJABIG/VIEWFORM">here!&lt;/a>&lt;/p></description></item><item><title>Join us for the IFF Organizational Security Village!</title><link>http://usable.tools/blog/2020-05-26-iff-orgsecvillage/</link><pubDate>Tue, 26 May 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-05-26-iff-orgsecvillage/</guid><description>&lt;h2 id="iff-orgsec-village">IFF OrgSec Village&lt;/h2>
&lt;p>Internews is excited to announce that we will be hosting a virtual Internet Freedom Festival (IFF) Organizational Security Village from &lt;strong>June 8-12&lt;/strong>. This event will bring together security auditors, digital security trainers, and other experts and practitioners for a five-day program of over 20 community-led sessions exploring five major themes in organizational security.&lt;/p>
&lt;div style="text-align: center">&lt;img src="http://usable.tools/images/blog/IFFOSV_Theme.png" alt="Five OrgSec Village Themes are 1. Approaches to OrgSec 2. OrgSec In Practice 3. Advanced Threats 4. Funding OrgSec Work 5. Monitoring and Evaluation" style="border: 0; width: 75%; padding: 1em;" />&lt;/div>
&lt;h2 id="virtual-village-format">Virtual Village Format&lt;/h2>
&lt;p>Based on feedback from the community, we have decided to host live sessions during the week, with each day of programming beginning around 12:30 UTC, and ending no later than 20:00 UTC. Each session will last approximately 50 minutes, with a short break in between sessions. We will be sharing a schedule and additional information on each session prior to the event. You are invited to join as many or as few sessions as you would like!&lt;/p>
&lt;p>We recognize that some folks may not be able to join due to timing or prior engagements. To ensure that everyone has the opportunity to contribute in some way, non-attributed, editable notes from each session will be made available. We will also use the IFF Mattermost for asynchronous collaboration and networking. If you do not have an IFF Mattermost account, please email &lt;a href="mailto:team@internetfreedomfestival.org">team@internetfreedomfestival.org&lt;/a>.&lt;/p>
&lt;h2 id="registration-and-coc">Registration and CoC&lt;/h2>
&lt;p>Please let us know you will be attending by registering here: &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSd_vzeIABKyYt1pMiq4_Ka-Ffk8kcjGmHnJQw9-n2UCfjAbig/viewform">https://docs.google.com/forms/d/e/1FAIpQLSd_vzeIABKyYt1pMiq4_Ka-Ffk8kcjGmHnJQw9-n2UCfjAbig/viewform&lt;/a>.&lt;/p>
&lt;p>We ask that you register even if you are only able to attend a few days or sessions. Event access details will only be shared with registered participants. Please also complete the registration form if you are not able to join the live sessions but would like to review notes or contribute asynchronously.&lt;/p>
&lt;p>This event will follow the &lt;a href="https://www.internetfreedomfestival.org/wiki/index.php/Code_of_Conduct">&lt;em>IFF Code of Conduct&lt;/em>&lt;/a>.&lt;/p></description></item><item><title>Community Call for Feedback!!</title><link>http://usable.tools/blog/2020-05-13-safetag-community-call/</link><pubDate>Wed, 13 May 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-05-13-safetag-community-call/</guid><description>&lt;p>Last month, we shared that we would be updating the visual identity of SAFETAG, including the development of a new logo, color-scheme, and iconography. We are excited to share that we will be working with &lt;a href="https://showcase.dropbox.com/s/This-is-tafka-MX9NBtr2zTzngWhO2EVLp">&lt;em>Tafka&lt;/em>&lt;/a>, a design collective based in Mexico, and are officially starting the re-design process!&lt;/p>
&lt;h2 id="why-re-design-safetag">Why re-design SAFETAG?&lt;/h2>
&lt;p>We have decided to re-design SAFETAG to provide a more cohesive and recognizable brand. The new digital assets will be used across the website, interface (more details below), and all other SAFETAG documentation. Our hope is that this new design will make content more accessible for users, particularly new auditors that may have previously struggled with navigating through the framework.&lt;/p>
&lt;h2 id="new-interface-coming-soon">New Interface (coming soon)&lt;/h2>
&lt;p>In addition to the re-design, we are working with a development team to build a new SAFETAG interface that is easier to use and more accessible for both new and experienced auditors. The new interface will allow auditors to generate “playlists,” or collections of audit activities, tailored to a specific type of organization or risk environment. These customized and shareable playlists can be stored for future reference or shared with other auditors working in similar contexts. We are expecting to launch the new interface during the late summer or early fall of 2020.&lt;/p>
&lt;h2 id="we-need-you">We need you!&lt;/h2>
&lt;p>In order to make sure that the new design reflects the needs of the SAFETAG community, we would like to invite all SAFETAG users, both new and experienced, to share feedback with us. We will be holding two open community calls on &lt;strong>May 19, 2020 at 10:30 am ET and another on May 21 at 9:00 am ET.&lt;/strong> Please let us know you will be attending one of the calls by registering &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSdbcQm-IR0tUdC32T1dzRNxgEa_oAfMk9gNlcyNvkoTHgsTRw/viewform">&lt;em>here&lt;/em>&lt;/a>. We will be sharing details for joining the call directly via email with those who RSVP.&lt;/p>
&lt;p>In addition to the community feedback calls, we would also like to invite community members to complete a &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSe_4r7JM8YDEj17h-IgPgXOM0PS2BGyMek1JLyW0wKHyBkAFQ/viewform">&lt;em>short survey&lt;/em>&lt;/a>. This 20-question survey will allow us to collect any ideas and feedback you may have and provide space for those who may not be able to join one of the community feedback calls to share thoughts asynchronously. We look forward to hearing from you and incorporating your thoughts and feedback into this design process!&lt;/p></description></item><item><title>Apply to Participate in Upcoming Cross-Regional Convenings!!</title><link>http://usable.tools/blog/2020-04-03-cross-regional-convenings/</link><pubDate>Fri, 03 Apr 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-04-03-cross-regional-convenings/</guid><description>&lt;p>This year, Internews will be hosting two Cross-Regional Convenings to bring together digital security trainers, SAFETAG auditors, usability and accessibility experts, and tool developers to map privacy and security tools being used by at-risk organizations and to identify concrete ways that we can support improvements to those tools.&lt;/p>
&lt;p>Over the past few years, we have worked with the Internet freedom community to develop a variety of activities for trainers to deploy during digital security trainings to collect tool-specific feedback and critical information about at-risk users. We have also compiled useful information on how to identify open source tools interested in feedback, connect with tool developers, and format and prioritize recommendations. All of these activities and resources can be found in the &lt;a href="https://usable.tools/guidebook">&lt;em>UX Feedback Collection Guidebook&lt;/em>&lt;/a>. Internews partner Okthanks also developed a set of activities to facilitate a participatory design and development process. Those activities can be found in the &lt;a href="https://okthanks.com/exploratorium">&lt;em>Exploratorium&lt;/em>&lt;/a>. These activities are for the community and any feedback or additions to the collection (or Exploratorium) are highly appreciated. The Cross-Regional Convenings will build on this work, expanding the number of individuals trained in feedback collection and increasing the number of tool teams implementing usability and accessibility improvements.&lt;/p>
&lt;p>During the convenings, attendees will:&lt;/p>
&lt;ul>
&lt;li>
&lt;p>Review and provide feedback on the UX Feedback Collection Guidebook, the Exploratorium, and other existing activities and resources;&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Develop new content and resources focused on capturing feedback at the organizational level; &lt;/p>
&lt;/li>
&lt;li>
&lt;p>Map the various tools that at-risk communities and organizations are using and their reasons for doing so; &lt;/p>
&lt;/li>
&lt;li>
&lt;p>Document the specific challenges that organizations face, such as sharing passwords or using tools for collaboratively editing documents; and&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Make meaningful connections with individuals across sectors. &lt;/p>
&lt;/li>
&lt;/ul>
&lt;p>Following these convenings, Internews will open a small pool of funding to support digital security trainers and SAFETAG auditors wishing to collect feedback within their communities, with an emphasis on trainers or auditors working long-term with at-risk organizations and communities. With funding support through this mechanism, trainings and audits will incorporate creative and effective feedback collection methods to obtain actionable feedback about the privacy and security tools being used in the field.&lt;/p>
&lt;p>Simultaneously, Internews will work with trainers and auditors to identify relevant open source privacy and security tools to receive funding to implement the specific usability and accessibility improvements requested by the at-risk communities.&lt;/p>
&lt;p>At this time, we are planning to hold certain sessions of the Cross-Regional Convenings virtually over the summer (June-July 2020). If it is safe to do so, we hope to facilitate the remaining sessions at two in-person engagements, hosted between August-October 2020. Participants will only be expected to attend one of the in-person convenings and all associated costs will be covered by Internews. We will continue to provide updates and potential dates and locations for the convenings as we have them. &lt;/p>
&lt;h2 id="how-to-apply">How to Apply &lt;/h2>
&lt;p>If you are interested in participating in these convenings, please &lt;a href="https://docs.google.com/forms/d/e/1FAIpQLSeMCH6GJRtMNhNniXHuqSPK1r2qpSVZI2rr5MxqPfROZcX3xw/viewform?usp=sf_link">&lt;em>apply here!&lt;/em>&lt;/a>&lt;/p>
&lt;p>Any and all skill-levels and backgrounds are invited to apply. Whether you have previously participated in a UX event hosted by Internews or you are new to the human-centered design space, there will be relevant programming for everyone.&lt;/p>
&lt;p>Please also note our &lt;a href="https://usable.tools/coc/">&lt;em>Code of Conduct&lt;/em>&lt;/a>.&lt;/p>
&lt;h4 id="please-submit-applications-by-may-15-2020">Please submit applications by May 15, 2020.&lt;/h4></description></item><item><title>Bridge Usability and Organizational Security at the Internet Freedom Festival's first-ever Organizational Security Village!</title><link>http://usable.tools/blog/2020-01-27-orgsec-village/</link><pubDate>Mon, 20 Jan 2020 09:00:00 +0000</pubDate><guid>http://usable.tools/blog/2020-01-27-orgsec-village/</guid><description>&lt;p>Internews is pleased to host the Organizational Security Village at the &lt;a href="https://internetfreedomfestival.org/">Internet Freedom Festival&lt;/a> this year. This two-day event (April 23 and 24) will bring together digital security trainers, security auditors, and other experts and practitioners for lightning talks, interactive workshops, collaborative discussions, and relevant hands-on labs and skill-shares.&lt;/p>
&lt;h3 id="add-usability-to-the-agenda">Add Usability to the Agenda!&lt;/h3>
&lt;p>In addition to some more traditional &amp;ldquo;OrgSec&amp;rdquo; ideas for this village; we are seeking specific user feedback on both the &lt;a href="https://SAFETAG.org">SAFETAG framework&lt;/a> (how it works, how the content is presented, etc.) and are also looking to identify critical usability gaps in organization-level security tools - what is needed and how are organizations currently managing secure collaboration needs?&lt;/p>
&lt;p>Please complete &lt;a href="https://forms.gle/AiLgB9PHdq3ka3Tt9">this application&lt;/a> to propose sessions or topics that you would like to explore further. Deadline for submission is &lt;strong>February 28, 2020&lt;/strong>. All selected submissions will be notified by March 20, 2020.&lt;/p>
&lt;p>&lt;em>We look forward to seeing you there!&lt;/em>&lt;/p></description></item><item><title>From the Guidebook: GitHub for Non-developers</title><link>http://usable.tools/blog/2019-10-04-guidebook-github/</link><pubDate>Fri, 04 Oct 2019 13:50:48 +0000</pubDate><guid>http://usable.tools/blog/2019-10-04-guidebook-github/</guid><description>&lt;p>&lt;a href="https://github.com/">&lt;img src="http://usable.tools/images/logos/GitHub_Logo.png" alt="GitHub" style="width: 40%; border: 0; float: right; padding: 1em;" />&lt;/a>&lt;/p>
&lt;p>&lt;a href="https://github.com/">GitHub&lt;/a> is a powerful tool developers use for version control and storing their code in an open and transparent way. However, this platform is complex with many different features that can be daunting for the non-developer. The USABLE team has worked with partners to try to break down several GitHub features in a way that makes the most sense for non-developers, reviewing only what is needed to investigate a tool and to provide critical user feedback.&lt;/p>
&lt;p>&lt;em>Note that many of these approaches also work fot GitLab and many other code management platforms!&lt;/em>&lt;/p>
&lt;p>There are three key ways that non-developers can use GitHub:&lt;/p>
&lt;ol>
&lt;li>To check if a project is active&lt;/li>
&lt;li>To investigate who is contributing to the code&lt;/li>
&lt;li>To directly share feedback with developers&lt;/li>
&lt;/ol>
&lt;p>Before collecting feedback, it is essential that you make sure the project is still active and that someone is actively maintaining or updating the code. A quick search for a tool on GitHub can lead you to the project’s repository. From there, the “Insights” tab provides additional information about the authors contributing to the code, the date of the last release or update, as well as any outstanding issues.&lt;/p>
&lt;p>Developers that have previously worked or are currently working on the project are identified as “Contributors.” The profiles of these developers can be found under the “Contributors” tab, which is under the larger “Insights” tab. Each profile captures the contributors work on the project over time, and any other projects or repositories that they work on. Additionally, some developers will include contact information on their profiles, such as their email address or Twitter handle.&lt;/p>
&lt;p>GitHub can also be used by non-technical users to &lt;strong>submit feedback directly to developers&lt;/strong> via issues.&lt;/p>
&lt;p>An issue is a term GitHub uses primarily as a “bug tracker”, meaning if you encounter a problem with the software, you can submit an issue and the developers (who are in theory monitoring the issues in the queue) will address them according to their internal process and priority level. All issues are public, so this can also be a space to see what challenges or requests other users are submitting. More on GitHub issues can be found here: &lt;a href="https://guides.github.com/features/issues">https://guides.github.com/features/issues&lt;/a>&lt;/p>
&lt;hr>
&lt;p>Learn more! &lt;strong>&lt;a href="http://usable.tools/pdfs/USABLE_UX-Feedback-Collection-Guidebook.pdf">Download the UX Feedback Collection Guidebook: Integrating Feedback Collection from High-risk Users into Existing Training Practices&lt;/a>&lt;/strong>&lt;/p>
&lt;div style="text-align:center">&lt;a href="http://usable.tools/pdfs/USABLE_UX-Feedback-Collection-Guidebook.pdf">&lt;img src="http://usable.tools/images/guidebook-download.png" alt="Download the UX Feedback Guidebook" style="width: 75%; border: 0; padding: 1em;" />&lt;/a>&lt;/div></description></item><item><title>From the Guidebook: Communication Channels for Sharing Feedback</title><link>http://usable.tools/blog/2019-10-04-guidebook-comms-channels/</link><pubDate>Fri, 04 Oct 2019 10:50:48 +0000</pubDate><guid>http://usable.tools/blog/2019-10-04-guidebook-comms-channels/</guid><description>&lt;p>After collecting or documenting user feedback, it is important to select the proper channel of communication for sharing it with the developer(s). Each tool team has a preferred channel for communication. Researching these channels in advance allows you to ensure that you are communicating with the developer or tool team in the most effective way possible. The USABLE team has compiled some of the main channels tool teams prefer to receive feedback or connect directly with users below.&lt;/p>
&lt;ul>
&lt;li>&lt;strong>In-app/In-tool&lt;/strong>: Some tools also offer avenues to provide in-app or in-tool feedback. There may be a chat feature, quick survey, or entire page dedicated to collecting user feedback within the tool.&lt;/li>
&lt;li>&lt;strong>Via the tool’s website&lt;/strong>: Some tools have specific instructions or contact preferences that they list on their website. Do your best to follow these instructions when you can; but also keep in mind that many of these instructions or forms presume that you are reporting a specific “bug” in the tool about something going wrong, as opposed to suggestions to improve the usability or request a new feature. They may not all be applicable or even possible to follow - and that is OK, but it is important to try to provide the data they request when they specify it or explain why you cannot.&lt;/li>
&lt;/ul>
&lt;div style="width: 40%; background-color: #B2CEE6; float:right; padding: 1em; margin: 1em;">&lt;strong>
Learn more about using GitHub at https://usable.tools/blog/2019-10-04-guidebook-github/ &lt;/strong>&lt;/div>
&lt;ul>
&lt;li>&lt;strong>GitHub and other issue or ticket tracking systems&lt;/strong>: Many tool teams store their code on GitHub (&lt;a href="https://github.com">https://github.com&lt;/a>). The platform can be used to identify which individuals are contributing to the code and to share feedback directly through the submission of “issues.” Other tools use other platforms to help them track, prioritize, and discuss issues and feature development (Tor, for example, has a very active issue system at &lt;a href="https://trac.torproject.org/projects/tor/query">https://trac.torproject.org/projects/tor/query&lt;/a>, and enigmail uses SourceForge for its system: https:// sourceforge.net/p/enigmail/bugs/).&lt;/li>
&lt;li>&lt;strong>Email&lt;/strong>: Tool teams typically have a general email account for the tool or project. Some also post the PGP key associated with the account so users can send encrypted emails. Individual developers may also post their personal email accounts.&lt;/li>
&lt;li>&lt;strong>Social Media&lt;/strong>: Several tools have social media accounts, such as Twitter or Facebook, where they post updates and engage with users. Look on the tool’s website or in their profile on GitHub, but be respectful of developers who keep their personal social media accounts separate from their tool development work.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;p>Learn more! &lt;strong>&lt;a href="http://usable.tools/pdfs/USABLE_UX-Feedback-Collection-Guidebook.pdf">Download the UX Feedback Collection Guidebook: Integrating Feedback Collection from High-risk Users into Existing Training Practices&lt;/a>&lt;/strong>&lt;/p>
&lt;div style="text-align:center">&lt;a href="http://usable.tools/pdfs/USABLE_UX-Feedback-Collection-Guidebook.pdf">&lt;img src="http://usable.tools/images/guidebook-download.png" alt="Download the UX Feedback Guidebook" style="width: 75%; border: 0; padding: 1em;" />&lt;/a>&lt;/div></description></item><item><title>From the Guidebook: Tips for Communicating with Developers</title><link>http://usable.tools/blog/2019-10-04-guidebook-communicating-with-developers/</link><pubDate>Fri, 04 Oct 2019 09:50:48 +0000</pubDate><guid>http://usable.tools/blog/2019-10-04-guidebook-communicating-with-developers/</guid><description>&lt;p>Given that many non-technical people do not have experience communicating with developers, the USABLE team worked with partners to compile this list of give quick tips for engaging. Note, it is not mandatory to follow each item step-by-step. The list is meant to give a quick and overarching view of tried and true methods when communicating with the open source developer community.&lt;/p>
&lt;div style="width: 40%; background-color: #B2CEE6; float:right; padding: 1em; margin: 1em;">&lt;strong>
"USABLE conferences are the biggest opportunities we've had to get usability feedback directly from impacted users, trainers, and communities."&lt;/strong> &lt;br /> -- Rob Hansen of Enigmail and GnuPG&lt;/div>
&lt;ul>
&lt;li>Check to ensure someone is actively updating the project. If a project has not been worked on for several months, or even years, this should indicate the project is no longer active or the developers may be less receptive to feedback.&lt;/li>
&lt;li>Always be respectful and highlight features that you appreciate or value, as well as improvements that could be made.&lt;/li>
&lt;li>Establish a personal connection with the developer.&lt;/li>
&lt;li>Use a story or scenario to illustrate why your request/feedback is important.&lt;/li>
&lt;li>Explain how the design change will impact real end-users, or how the current feature has endangered end-users.&lt;/li>
&lt;li>Find the proper channel to communicate with the developer. This may be via email, GitHub issues, or some other channel.&lt;/li>
&lt;li>Some tools have guides on what specific feedback they are looking for and what format they prefer. Research and try to follow these recommendations.&lt;/li>
&lt;li>Document the steps you took that led to the issue. This is important for developers, as they will try to repeat the problem. * Take screenshots or gifs of the problem. Write out a detailed description. Prepare a user story for the specific issue. Keep logs of how often the issue occurs or the number of people impacted.&lt;/li>
&lt;li>If you know how to use GitHub, see if your issue or concern has already been documented. Offer specific suggestions around how the tool could be improved.&lt;/li>
&lt;li>Advocate for more secure and user-friendly tools. Enlist other users to help make your case to the developer.&lt;/li>
&lt;li>Follow-up with the developer. This can be a quick thank you or a general check-in on progress.&lt;/li>
&lt;/ul>
&lt;hr>
&lt;p>Learn more! &lt;strong>&lt;a href="http://usable.tools/pdfs/USABLE_UX-Feedback-Collection-Guidebook.pdf">Download the UX Feedback Collection Guidebook: Integrating Feedback Collection from High-risk Users into Existing Training Practices&lt;/a>&lt;/strong>&lt;/p>
&lt;div style="text-align:center">&lt;a href="http://usable.tools/pdfs/USABLE_UX-Feedback-Collection-Guidebook.pdf">&lt;img src="http://usable.tools/images/guidebook-download.png" alt="Download the UX Feedback Guidebook" style="width: 75%; border: 0; padding: 1em;" />&lt;/a>&lt;/div></description></item><item><title>VLog Q&amp;A with the OKThanks team</title><link>http://usable.tools/blog/2019-10-02-qa-okthanks/</link><pubDate>Thu, 03 Oct 2019 17:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-02-qa-okthanks/</guid><description>&lt;p>This month, we are taking some time to catch up with our UXFund grantees, and learn a little more about their organization.&lt;/p>
&lt;h2 id="qa-with-okthanks">Q&amp;amp;A with OKThanks&lt;/h2>
&lt;p>&lt;a href="https://okthanks.com/">OKThanks&lt;/a> is an organization that focuses on user experience and human-centered design. The USABLE team is thrilled to have worked with them over the last year. As part of our Q&amp;amp;A series, we are excited to share with you a little bit more about their team and organization. Listen to the interview below!&lt;/p>
&lt;div style="text-align: center">&lt;audio controls style="width: 100%">
&lt;source src="http://usable.tools/audio/Vlog_Okthanks_Sept2019.mp3" type="audio/mpeg">
You can download the &lt;a href="http://usable.tools/audio/Vlog_Okthanks_Sept2019.mp3">MP3 interview&lt;/a>
&lt;/audio>
&lt;/div>
&lt;p>&lt;em>&lt;strong>Transcription coming soon!&lt;/strong>&lt;/em>&lt;/p>
&lt;!-- ### Q: What is your tool? And what is your role?
**A:**
--></description></item><item><title>Launch of the UX Feedback Collection Guidebook</title><link>http://usable.tools/blog/2019-10-03-guidebook-launch/</link><pubDate>Thu, 03 Oct 2019 16:50:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-03-guidebook-launch/</guid><description>&lt;p>&lt;strong>Today, we are excited to release a compilation of these activities and resources, the &lt;a href="https://usable.tools/guidebook">UX Feedback Collection Guidebook: Integrating Feedback Collection from High-risk Users into Existing Training Practices&lt;/a>.&lt;/strong>&lt;/p>
&lt;p>Many of the most at-risk communities around the globe rely on open
source privacy and security tools. However, these tools are often
designed, developed, and maintained by individuals or small teams who
have little to no access to their target audience — journalists,
activists, human rights defenders, and other high-risk groups. This
often results in tools that poorly fit the threats, challenges, and/or
accessibility or usability requirements of end-users.&lt;/p>
&lt;p>The USABLE project aims to close this gap by establishing feedback loops
between the communities who make the tools and the communities who use
them.&lt;/p>
&lt;p>Since 2015, USABLE has worked with over 50 trainers from around the
globe, 11 designers and UX experts, and 7 open source tool teams who
build products that focus on privacy and security for high-risk
communities to develop and test feedback collection activities. The goal
was to identify straightforward and time-efficient activities and
resources that would allow digital security trainers to integrate
feedback collection into their existing training frameworks. When done
effectively, the process of capturing and sharing feedback can transform the design and
development of the most commonly used privacy and security tools for
high-risk users.&lt;/p>
&lt;p>&lt;a href="http://usable.tools/guidebook">&lt;img src="http://usable.tools/images/Guidebook-cover.png" alt="UX Feedback Guidebook cover" style="width: 40%; border: 0; float: right; padding: 1em;" />&lt;/a>&lt;/p>
&lt;p>The guidebook is broken down into four thematic sections:&lt;/p>
&lt;ul>
&lt;li>Part I: Collecting Feedback to Better Understand the User&lt;/li>
&lt;li>Part II: Collecting Tool-specific Feedback During Trainings&lt;/li>
&lt;li>Part III: Collecting Feedback Outside of Trainings&lt;/li>
&lt;li>Part IV: Communicating with Developers and Tool Teams&lt;/li>
&lt;/ul>
&lt;p>From background information to facilitation guides to editable
templates, the guidebook provides trainers and facilitators with the
resources required to effectively collect, synthesize, and share
valuable feedback from high-risk users with tool developers.&lt;/p>
&lt;p>&lt;strong>Further details and the full guidebook can be found at &lt;a href="https://usable.tools/guidebook">https://usable.tools/guidebook&lt;/a>&lt;/strong>&lt;/p>
&lt;p>&lt;em>This content is available as a CC-BY 4.0 International license.&lt;/em>&lt;/p></description></item><item><title>Q&amp;A with Accessibility Lab</title><link>http://usable.tools/blog/2019-10-02-qa-a11ylab/</link><pubDate>Wed, 02 Oct 2019 14:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-02-qa-a11ylab/</guid><description>&lt;p>This month, we are taking some time to catch up with our UXFund grantees, and learn a little more about their organization.&lt;/p>
&lt;h2 id="qa-with-accessibility-labhttpsa11ylabcom">Q&amp;amp;A with &lt;a href="https://a11ylab.com/">Accessibility Lab&lt;/a>&lt;/h2>
&lt;h3 id="q-how-did-you-become-involved-with-this-project-what-are-your-motivations-for-this-work">Q: How did you become involved with this project? What are your motivations for this work?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> I became involved when I saw the challenges and barriers that my friends with disabilities had using the internet. My motivation is to increase awareness about digital divide and inclusion of people with disabilities, so they can have equal access to Information and Communication Technologies and better opportunities in education and employment.&lt;/p>
&lt;h3 id="q--how-large-is-your-team-who-else-is-working-on-the-project-full-time-part-time-etc-how-often-do-you-connect-and-via-what-channels">Q: How large is your team? Who else is working on the project (full-time, part-time, etc)? How often do you connect and via what channels?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Normally we are 6 people:&lt;/p>
&lt;table border="0" style="table-layout: fixed; width: 100%; vertical-align: top" >
&lt;thead>
&lt;tr>
&lt;th style="border: 0px;">&lt;img src="http://usable.tools/images/blog/a11ylab-image1.png" alt="nancy"/>&lt;/th>
&lt;th style="border: 0px;">&lt;img src="http://usable.tools/images/blog/a11ylab-image2.png" alt="gabo" />&lt;/th>
&lt;th style="border: 0px;">&lt;img src="http://usable.tools/images/blog/a11ylab-image3.png" alt="alberto" />&lt;/th>
&lt;th style="border: 0px;">&lt;img src="http://usable.tools/images/blog/a11ylab-image4.png" alt="Cris" />&lt;/th>
&lt;th style="border: 0px;">&lt;img src="http://usable.tools/images/blog/a11ylab-image5.png" alt="Pedro" />&lt;/th>
&lt;th style="border: 0px;">&lt;img src="http://usable.tools/images/blog/a11ylab-image6.jpeg" alt="maria" />&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr style="vertical-align: top;">
&lt;td style="border: 0px;">&lt;p>&lt;strong>Nancy Reyes&lt;/strong>&lt;br /> Trainer and Accessibility consultant&lt;/p>&lt;/td>
&lt;td style="border: 0px;">&lt;p>&lt;strong>Gabriel Fernández&lt;/strong>&lt;br /> Developer&lt;/p>&lt;/td>
&lt;td style="border: 0px;">&lt;p>&lt;strong>Alberto Arellano&lt;/strong>&lt;br /> Manager&lt;/p>&lt;/td>
&lt;td style="border: 0px;">&lt;p>&lt;strong>Cris Bori&lt;/strong>&lt;br /> Public Relations&lt;/p>&lt;/td>
&lt;td style="border: 0px;">&lt;p>&lt;strong>Pedro Bori&lt;/strong>&lt;br /> Head of Training and Designer&lt;/p>&lt;/td>
&lt;td style="border: 0px;">&lt;p>&lt;strong>María Martínez&lt;/strong>&lt;br /> Trainer and Usability consultant&lt;/p>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;p>The developer and I are full time and the rest of the team is part time, depending of the budget and projects we have. Sometimes we have more people on the team, for example, more designers, more developers and more people with disabilities (visual and motor disability). We connect every day. Almost all is online, by mail, by phone, whatsapp, Jitsi Meet, etc. Sometimes we meet physically but not always is necessary.&lt;/p>
&lt;h3 id="q-why-do-you-think-its-valuable-to-engage-with-users">Q: Why do you think it’s valuable to engage with users?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Because from the accessibility perspective, users with disabilities will offer the best feedback to understand their experience in the usability and accessibility of any digital content. A designer or developer will understand the importance of their work and see the difference between being able to use it or not at all independently.&lt;/p>
&lt;h3 id="q--what-is-the-best-way-for-userstrainerstool-teams-to-connect-with-your-team">Q: What is the best way for users/trainers/tool teams to connect with your team?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong>&lt;/p>
&lt;ul>
&lt;li>USERS: testing and sharing feedback about the webpage, app or tool.&lt;/li>
&lt;li>TRAINERS: being updated about international standard and new technological solutions.&lt;/li>
&lt;li>TOOL [Developers]: we can work with any tool to see if it is accessible or not, from a technical and non-technical perspective.&lt;/li>
&lt;/ul>
&lt;h3 id="q--what-role-do-trainers-play-in-the-feedback-loop-how-do-you-view-trainers">Q: What role do trainers play in the feedback loop? How do you view trainers?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Trainers have a very important play because they share knowledge about international standard, best practices, solutions and other relevant information so more people can develop accessible websites and apps.&lt;/p>
&lt;p>It is not just about increasing awareness about the digital right of web accessibility, but to offer solutions, tools and knowledge to improve web accessibility and create accessible websites and apps in the future.&lt;/p>
&lt;h3 id="q--has-your-team-ever-used-personas-to-inform-design-or-development">Q: Has your team ever used personas to inform design or development?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> We always use personas to test accessible websites or make audits and offer feedback. Our personas are most commonly blind people and people with motor disability.&lt;/p>
&lt;h3 id="q--where-can-people-look-to-learn-more-about-accessibility">Q: Where can people look to learn more about accessibility?&lt;/h3>
&lt;ul>
&lt;li>&lt;a href="http://a11ylab.com/landing-people">Web Accessibility Campaign&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.w3.org/TR/WCAG21/">Web Content Accessibility Guidelines (WCAG) 2.1&lt;/a>&lt;/li>
&lt;li>&lt;a href="https://www.w3.org/WAI/standards-guidelines/aria/">Accessible Rich Internet Applications&lt;/a>&lt;/li>
&lt;/ul>
&lt;h3 id="q--what-are-the-top-five-things-to-consider-when-designing-a-site-or-tool-with-accessibility-in-mind">Q: What are the top five things to consider when designing a site or tool with accessibility in mind?&lt;/h3>
&lt;ul>
&lt;li>Provide text alternatives for any non-text content.&lt;/li>
&lt;li>Provide alternatives for time-based media, like transcripts, captions, audio-descriptions and sign language.&lt;/li>
&lt;li>Make all functionality available from a keyboard.&lt;/li>
&lt;li>The visual presentation of text, images of text and user interface components must have enough color contrast.&lt;/li>
&lt;li>Make forms with accessible structure and labels relationships for users with assistive technology.&lt;/li>
&lt;/ul>
&lt;h3 id="q--what-are-the-future-plans-for-your-team">Q: What are the future plans for your team?&lt;/h3>
&lt;ul>
&lt;li>Continue with our consultant services and trainings for private sector, government and universities.&lt;/li>
&lt;li>Free or very low-cost trainings for final users.&lt;/li>
&lt;li>Evaluate the accessibility of websites and apps considering the experience of users with disabilities as an awareness campaign.&lt;/li>
&lt;li>Create a digital accessibility observatory.&lt;/li>
&lt;li>Start providing digital accessibility certification:&lt;/li>
&lt;li>To companies and government websites (through a civil organization)&lt;/li>
&lt;li>To individuals like designers and developers (through IAAP)&lt;/li>
&lt;li>Continue with networking sessions inviting people and companies that want to collaborate.&lt;/li>
&lt;li>Create an alliance with the federal office that reviews the implementation of accessible web content with the purpose to certify each government office with the law requirements of web accessibility.&lt;/li>
&lt;li>Create video interviews and infomercials with the testimonies of people who have had the benefits of the web accessibility.&lt;/li>
&lt;li>Obtain the certification from the International Association of Accessibility Professionals (IAAP) for all their team members:&lt;/li>
&lt;li>Certified Professional in Accessibility Core Competency (CPACC) for administrative staff and,&lt;/li>
&lt;li>Web Accessibility Specialist (WAS) for technical personnel&lt;/li>
&lt;li>Start providing information and content for other countries around the world.&lt;/li>
&lt;li>Organize the first “Global Festival of Universal Design and Digital Inclusion”.&lt;/li>
&lt;li>Finish our online course about Web Accessibility in Spanish.&lt;/li>
&lt;/ul></description></item><item><title>Q&amp;A with the KeePassXC team</title><link>http://usable.tools/blog/2019-10-02-qa-keepassxc/</link><pubDate>Wed, 02 Oct 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-02-qa-keepassxc/</guid><description>&lt;p>This month, we are taking some time to catch up with our UXFund grantees, and learn a little more about their organization.&lt;/p>
&lt;h2 id="qa-with-keepassxc">Q&amp;amp;A with KeePassXC&lt;/h2>
&lt;h3 id="q-what-is-your-tool-and-what-is-your-role">Q: What is your tool? And what is your role?&lt;/h3>
&lt;div style="float:right; width: 50%">&lt;a href="https://keepassxc.org/screenshots/">&lt;img src="https://keepassxc.org/images/screenshots/linux/screen_002.png" style="border: 0; padding: 0px; margin: 0px" alt="Screenshot of KeePassXC showing account selection features" />&lt;br />&lt;span class="main-caption small">Screenshot from KeePassXC&lt;/span>&lt;/a>&lt;/div>
&lt;p>&lt;strong>A:&lt;/strong> &lt;a href="https://keepassxc.org/">KeePassXC&lt;/a> is an open source, offline password management tool that is available for Windows, Linux, and macOS. Our key features include the most secure encryption available on the market, Auto-Type technology, randomized password and passphrase generation, browser integration, and full compatibility with other KeePass-based tools. We also support several operating system integrations and advanced features for our more technical users.&lt;/p>
&lt;p>Since forking from KeePassX in October 2016, we have released four major and fifteen minor versions that have introduced significant capability, usability, and security enhancements. Full source code, issue and feature tracking, and integration reviews are handled &lt;a href="https://github.com/keepassxreboot/keepassxc">openly on GitHub&lt;/a>. I co-lead the project development and direction along with Janek Bevendorff (phoerious).&lt;/p>
&lt;h3 id="q-why-should-people-use-a-password-manager-how-can-users-use-kpxc-to-make-their-lives-easierbe-more-secure">Q: Why should people use a password manager? How can users use KPXC to make their lives easier/be more secure?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> A password manager is necessary to ensure you have randomized and unique passwords for every service you log into. This is important because you don’t want a breach of one service to also compromise your security elsewhere. It is impossible to remember unique logins that are complex enough to be resistant to hacks. KeePassXC not only stores this information for you, in a secure way, but it also fills in that information for each site you use automatically.&lt;/p>
&lt;h3 id="q-how-did-you-become-involved-with-this-project-what-are-your-motivations-for-this-work">Q: How did you become involved with this project? What are your motivations for this work?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> I had originally just wanted to bring the browser integration feature to the latest version of KeePassX since I was using it daily. However, it became clear that the original maintainer did not have the time to focus on the application and it was aging quickly. I made the decision to branch from that project, incorporate my work, and bring over all the pending bug fixes and features that the community had contributed over the years, but were never incorporated.&lt;/p>
&lt;p>This created an outpouring of support and recognition from the large number of users who were excited to see their favorite tool get even better. I was deeply motivated by the energy and enthusiasm of the community, which has grown every year since we first launched. I am inspired by the diverse groups that use KeePassXC daily to keep their lives secure.&lt;/p>
&lt;h3 id="q-how-large-is-your-team-who-else-is-working-on-the-project-full-time-part-time-etc-how-often-do-you-connect-and-via-what-channels">Q: How large is your team? Who else is working on the project (full-time, part-time, etc)? How often do you connect and via what channels?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Our core team consists of six individuals who live all over the world; we are all volunteers and work on this project in our free time. Janek and I lead the project by curating our release roadmap and rigorously reviewing code submissions prior to acceptance.&lt;/p>
&lt;p>We have four feature maintainers who are largely responsible for their major contribution to the project. These include the browser extension, command line interface, and SSH agent. We also have a large community of beta testers and deployment specialists who help us roll out releases on a regular basis. It truly takes a small army to keep the project rolling due to our security-centric nature and wide distribution channels.&lt;/p>
&lt;h3 id="q-why-do-you-think-its-valuable-to-engage-with-users">Q: Why do you think it’s valuable to engage with users?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Our application was specifically setup to incorporate user feedback and best practices. The ‘C’ in KeePassXC stands for Community. Users provide us issue reports and feature requests daily. These directly inform development decisions and benefit everyone.&lt;/p>
&lt;h3 id="q--what-is-the-best-way-for-users-to-share-feedback-with-your-team">Q: What is the best way for users to share feedback with your team?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Users should register a GitHub account, it is free, and submit an issue through our project page. If they do not want to do that we will accept feedback through our email at &lt;a href="mailto:team@keepassxc.org">team@keepassxc.org&lt;/a>.&lt;/p>
&lt;h3 id="q--how-has-feedback-previously-been-incorporated-into-development">Q: How has feedback previously been incorporated into development?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> We have over 2,000 closed issues and 900 merged pull requests. These range from simple bug fixes to major new features. The vast majority have been submitted by our user base in both written and code formats.&lt;/p>
&lt;h3 id="q--has-your-team-ever-used-personas-to-inform-design-or-development">Q: Has your team ever used personas to inform design or development?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> We have not specifically used personas, but we do consider the end user when implementing features. This is something we will investigate doing in the future as part of our pull request process for major features.&lt;/p>
&lt;h3 id="q-what-are-the-future-plans-for-the-project">Q: What are the future plans for the project?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Our next major release is version 2.5.0 which incorporates several user interface and accessibility fixes. This release also includes significant improvements to the command line interface and browser integration plugin. The next major release will focus on user interface workflow and styling.&lt;/p></description></item><item><title>UXFund: SecureDrop</title><link>http://usable.tools/blog/2019-10-01-uxfund_securedrop/</link><pubDate>Tue, 01 Oct 2019 14:30:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-01-uxfund_securedrop/</guid><description>&lt;p>&lt;a href="https://securedrop.org/">SecureDrop&lt;/a> is an open source software platform that allows secure sharing and communication between journalists and their sources. Under the UXFund, Internews contracted an individual UX designer to work with the SecureDrop team to support the creation of a user-friendly, integrated SecureDrop workstation.&lt;/p>
&lt;p>After ongoing iterative testing of prototypes, the designer provided experience recommendations with many focused on accessibility such as updating the color palette and typography to improve contrast and legibility, making the header text more intuitive, and enabling keyboard navigation. Additional recommendations can be seen at
&lt;a href="https://github.com/freedomofpress/securedrop-ux/issues/42">https://github.com/freedomofpress/securedrop-ux/issues/42&lt;/a>.&lt;/p>
&lt;p>The designer also met with the project team via video conference to present the workstation client visual design, including explorations for how to carry newly resolved branding into web user interfacess for the Source and Journalist experiences. A screenshot of the client prototype can be seen below.&lt;/p>
&lt;div style="text-align: center">&lt;img src="http://usable.tools/images/blog/securedrop_screenshot.png" alt="SecureDrop interface" style="border: 0; width: 100%; padding: 1em;" />&lt;/a>&lt;/div></description></item><item><title>UXFund: Mailvelope</title><link>http://usable.tools/blog/2019-10-01-uxfund_mailvelope/</link><pubDate>Tue, 01 Oct 2019 14:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-01-uxfund_mailvelope/</guid><description>&lt;p>&lt;a href="https://www.mailvelope.com/en">Mailvelope&lt;/a> is a free software for end-to-end encryption of email traffic which is integrated within browsers as an extension. Through this round of the UXFund, Mailvelope was able to release the latest version of the tool with user-experience (UX) and user-interface (UI) changes that were recommended by a team of UX designers as well as accessibility updates that were recommended by &lt;a href="https://a11ylab.com/">Accessibility Lab&lt;/a>.&lt;/p>
&lt;p>Some of the maintenance updates they made through this grant include the ability for the user to:&lt;/p>
&lt;ul>
&lt;li>Upload and delete keys to the Mailvelope key server within the keyring UI,&lt;/li>
&lt;li>Change the key password,&lt;/li>
&lt;li>Create revocation certificates and upload to key server,&lt;/li>
&lt;li>Change user ID, name, and email, and&lt;/li>
&lt;li>Set a new expiration date for the key.&lt;/li>
&lt;/ul>
&lt;p>&lt;a href="https://www.f209.de/">f209&lt;/a>, a team of UX designers, provided Mailvelope with design proposals for the application and website, ultimately leading them to not just optimize certain parts of Mailvelope, but instead rebrand completely to provide one consistent and improved user experience. Taking these recommendations, along with those from Accessibility Lab’s audit reports, Mailvelope redesigned some of their major interfaces, including: the Mailvelope editor integration in Gmail with improved attachment handling, the file encryption UI, the Mailvelope website, and the extended key maintenance features.&lt;/p>
&lt;p>Additionally, Mailvelope was able to reimplement the layer that is used to integrate with the mail provider website. For the users of mail providers such as Gmail, this has the following benefits:&lt;/p>
&lt;ul>
&lt;li>&lt;strong>Better performance&lt;/strong>: Mailvelope requires less resources to scan the mail provider page for PGP messages. The detection is also much faster. Instead of an up to 2 seconds delay required to detect a message in the previous version, there is now an instant detection.&lt;/li>
&lt;li>&lt;strong>Better compatibility&lt;/strong>: More mail providers are supported, and several message detection corner cases have been fixed.&lt;/li>
&lt;li>&lt;strong>Instant decryption&lt;/strong>: Mailvelope will now instantly decrypt messages without additional user action, since the user’s private key is in the password cache.&lt;/li>
&lt;li>&lt;strong>Improved usability&lt;/strong>: The editor button now has an animation and the words “Write secure email”, helping the user understand the functions of the button.&lt;/li>
&lt;/ul>
&lt;p>The file encryption user interface in the Mailvelope app has also been redesigned, providing a separate section for encryption and decryption in the top-level navigation. Text and file encryption have now been integrated into one UI, with the signing of data supported across all encryption processes.&lt;/p>
&lt;p>Using last quarters accessibility recommendations from Accessibility Lab, the Mailvelope team has also applied recommendations, improving accessibility and design of the Mailvelope website:&lt;/p>
&lt;div style="text-align: center">&lt;a href="https://www.mailvelope.com/en">&lt;img src="http://usable.tools/images/blog/Mailvelope_screenshot.png" alt="Mailvelope website" style="border: 0; width: 100%; padding: 1em;" />&lt;/a>&lt;/div></description></item><item><title>UXFund: The Guardian Project</title><link>http://usable.tools/blog/2019-10-01-uxfund_guardian/</link><pubDate>Tue, 01 Oct 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-01-uxfund_guardian/</guid><description>&lt;p>&lt;em>&lt;a href="https://guardianproject.info/">The Guardian Project&lt;/a>&lt;/em> is a global collective of software developers, designers, advocates, activists, and trainers who develop open source mobile security software and operating system enhancements. &lt;em>&lt;a href="https://guardianproject.info/apps/orbot/">Orbot&lt;/a>&lt;/em> is a free software Proxy server project which allows Android users anonymity on the Internet. Orbot uses Tor to encrypt internet traffic and empowers other apps to use the internet more securely.&lt;/p>
&lt;p>Through their UXFund grant, the Guardian project focused on improving the core efficiency and reliability of Tor running as a service within the Orbot app. Since receiving feedback and learning about the confusion existing users were experiencing on the “VPN” feature of Orbot, they worked to redesign the setup, configuration, and text used to introduce and describe the feature.&lt;/p>
&lt;p>The Guardian Project worked with Okthanks to complete user stories and host listening groups with end-users via encrypted conference calls. The Orbot listening groups were created to provide a space for users to connect with designers and developers and inform them of their needs and concerns as users. The Guardian team selected users in countries where censorship or surveillance are a reality to participate in these calls and will be using the feedback to adapt Orbot to be more useful to these groups.These listening groups, along with Guardian’s market research, have helped inform the user stories.&lt;/p>
&lt;p>Based on the listening group findings, the design team created a new, “mini,” redesign of the Orbot app. After creating an interactive prototype, the team released the beta version of the orbotmini app, which is currently only 4.77 MB (eventually will be 3MB).&lt;/p>
&lt;div style="text-align:center">&lt;img src="http://usable.tools/images/blog/OrbotMini_Screenshot.PNG" alt="Screenshots of the orbotmini beta app "style="width: 60%; height: auto;"/>
&lt;br />*Screenshots of the orbotmini beta app.*
&lt;/div>&lt;br />
Working with Accessibility Lab, Guardian received a full accessibility audit of the Orbot app and website and have launched their new website using a static Hugo framework. You can view their new website at https://guardianproject.info, which uses a clean web template, enabling them to better implement and support accessibility requirements.</description></item><item><title>UXFund: KeePassXC</title><link>http://usable.tools/blog/2019-10-01-uxfund_keepassxc/</link><pubDate>Tue, 01 Oct 2019 10:30:00 +0000</pubDate><guid>http://usable.tools/blog/2019-10-01-uxfund_keepassxc/</guid><description>&lt;p>&lt;a href="https://keepassxc.org/">KeePassXC (KPXC)&lt;/a>, a recipient of one of the UXFund subgrants, is an open source password manager that is maintained by a small group of volunteer developers. Through this grant, the team partnered with &lt;a href="https://a11ylab.com/">Accessibility Lab&lt;/a> and &lt;a href="https://okthanks.com/">Okthanks&lt;/a> to include a significant number of usability and accessibility improvements in their two latest releases, &lt;a href="https://keepassxc.org/download/">KeePassXC 2.4.0 and 2.5.0&lt;/a>.&lt;/p>
&lt;p>In the first few months of the grant, Okthanks conducted a new-user impression study, collecting feedback from new users of the KeePassXC tool. This study led to recommendations for user-experience (UX) and user-interface (UI) improvements to make it easier for users to get started with KPXC. Accessibility Lab also evaluated and provided accessibility recommendations for the KPXC tool, website, and browser extension. With their 2.4.0 release in March 2019 and 2.5.0 release in July 2019, KPXC implemented several of these recommendations, along with community recommended UX improvements, such as improving the database creation process.&lt;/p>
&lt;p>Updates and improvements made throughout the course of this grant included:&lt;/p>
&lt;ul>
&lt;li>KeePassXC-Browser Extension was improved to support screen readers, keyboard-only interaction, and scalability.&lt;/li>
&lt;li>KPXC contracted a developer to perform software development and testing of the KeePassXC-Browser extension, with a focus on implementing the accessibility improvements identified by Accessibility Lab.&lt;/li>
&lt;li>KPXC finalized and released the “Getting Started” guide, with the focus of helping users without any experience understand how to use the application.&lt;/li>
&lt;li>KPXC finalized and released the “User Guide,” which deep dives into the major features of KPXC and ensure users can discover and use critical privacy and collaborative features of the application.&lt;/li>
&lt;li>Three maintenance updates to KeePassXC were released, including 6 GitHub pull requests for user experience updates and 7 * GitHub pull requests for user interface updates. These improvements were a direct result of community feedback and incorporating enhanced workflows suggested by the Okthanks team. Community feedback received also led to the KeePassXC-Browser * Extension update which improved user experience and baseline functionality. The “Getting Started” guide and “User Manual,” developed by the documentation writer contracted under the grant, were incorporated directly into the KeePassXC application.&lt;/li>
&lt;/ul></description></item><item><title>Q&amp;A with Simply Secure</title><link>http://usable.tools/blog/2019-09-26-simplysecureguest/</link><pubDate>Thu, 26 Sep 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-26-simplysecureguest/</guid><description>&lt;ol>
&lt;li>
&lt;p>What is your organization? And what is your role?&lt;/p>
&lt;p>Simply Secure is a design nonprofit based in New York and Berlin. Our work focuses on building technology that centers the needs of vulnerable populations. We work with practitioners to expand their skill set around human-centered design while focusing on user safety and privacy. We share our tools and resources openly for the community to learn from and continue to adapt. I am our Program Manager, which means that I help with program operations and management, but also work with our projects and partners on their usability and design challenges.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>How large is your team? Who else is working on the project (full-time, part-time, etc.)? How often do you connect and via what channels?&lt;/p>
&lt;p>Our core team consists of four people, and we have a network of people helping us with various aspects of our work shout-out to the amazing &lt;em>&lt;a href="http://sanssoucigroup.com/">Sans Souci Group&lt;/a>&lt;/em> for providing on-demand ops support!). My colleagues Georgia, Molly and Ame all have a background in design and many years of experience in both the non-profit and corporate sector, as well as in academia. We are a remote team with an office in Berlin, where three of us show up most days. We connect daily either via Slack or video chat, and we really value our collaborative and yet independent style of working together!&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Why do you think it’s valuable to engage with users?&lt;/p>
&lt;p>&lt;em>Tools that don’t work for their users&lt;/em> &lt;em>&lt;strong>don’t work&lt;/strong>&lt;/em>. Engaging with users is a crucial part of user research, which is the first step to building tools that work for people.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>What is the best way for users/trainers/tool teams to connect with your team?&lt;/p>
&lt;p>We can always be reached at &lt;a href="contact@simplysecure.org">contact@simplysecure.org&lt;/a>, but the best way to connect with us is to join our community of over 400 people interested in the intersection between design, security, open source, and human rights. &lt;em>&lt;a href="https://simplysecure.org/what-we-do/slack/">Join our Slack&lt;/a>&lt;/em>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>How has your team previously worked to incorporate feedback into the design or development process?&lt;/p>
&lt;p>We think feedback can be incorporated in a variety of ways, from having a designated user researcher on the team to systematically writing up UX bug reports. The biggest challenge is to ensure that there are existing structures to incorporate feedback gathered from trainings and elsewhere. We have seen many teams, especially teams working in FOSS (Free and Open-Source Software), where there is no pipeline for user feedback. Moreover, many structures only allow for passive feedback gathering (in the form of issue trackers and incoming mail); very few teams implement active feedback gathering (user interviews, observation, testing), which often leads to more insights and better recommendations.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>What role do trainers play in the feedback loop? How do you view trainers?&lt;/p>
&lt;p>Trainers are in the rare position of being close to users in high-risk contexts, in a way that tool developers often are not. More than that, they frequently witness first-time use of a tool, and can provide first-hand information on usability. This makes their insights extremely valuable! What I also really appreciate is that trainers are leaders in awareness- and capacity-building, and teach people skills rather than workflows. This has the potential to empower people in unknown and unsafe situations, where they can&amp;rsquo;t necessarily rely on a tool and have to take a more holistic approach. Needless to say: it&amp;rsquo;s a really hard but important job, and I&amp;rsquo;m humbled to know so many awesome and dedicated people working as trainers in our field!&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Has your team ever created or used personas to inform design or development?&lt;/p>
&lt;p>Oh yes! We love personas, and have written about them &lt;em>&lt;a href="https://simplysecure.org/blog/personas">here&lt;/a>&lt;/em> and &lt;em>&lt;a href="https://simplysecure.org/blog/design-spot-design-security">here&lt;/a>&lt;/em>. We think they are a crucial part of understanding who you are building your technology for. And we put them up everywhere to remind ourselves of why we are doing our work.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>What are the future plans for your team?&lt;/p>
&lt;p>We are thinking hard about scaling our impact and increasing the sustainability of our space overall. One thing we want to do is experiment with different formats to share our work. As a start, we are making educational videos and hosting monthly community calls about topics in our &lt;em>&lt;a href="https://simplysecure.org/knowledge-base/">Knowledge Base&lt;/a>&lt;/em>. We are also working with funders to make sure usability work is an integral part of the funding process.&lt;/p>
&lt;/li>
&lt;/ol></description></item><item><title>UXFund: Accessibility Lab</title><link>http://usable.tools/blog/2019-09-25-uxfund_alab/</link><pubDate>Wed, 25 Sep 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-25-uxfund_alab/</guid><description>&lt;p>&lt;em>&lt;strong>&lt;a href="https://a11ylab.com/">Accessibility Lab&lt;/a>&lt;/strong>&lt;/em>, based in Mexico, is an organization that works with public and private companies as well as Civil Society Organizations to ensure the inclusion of people with disabilities in the digital world. They specialize in accessibility audits, assessing websites, tools, and resources to make sure they can be accessed by persons with disabilities. Through the UXFund, Internews aimed to expand their capacity to work directly with open source tool teams, providing guidance and specific recommendations to improve the accessibility of tools and websites.&lt;/p>
&lt;h3 id="completed-audits">Completed Audits&lt;/h3>
&lt;p>Through the UXFund grant, Accessibility Lab completed audits and provided recommendations for:&lt;/p>
&lt;ul>
&lt;li>&lt;em>&lt;strong>&lt;a href="https://keepassxc.org">KeePassXC’s&lt;/a>&lt;/strong>&lt;/em> website, desktop tool, and browser extension. Prioritized recommendations were applied and released in KPXC’s most recent update.&lt;/li>
&lt;li>&lt;em>&lt;strong>&lt;a href="https://mailvelope.com/en">Mailvelope’s&lt;/a>&lt;/strong>&lt;/em> website and browser extension. Prioritized recommendations were applied and released with their new website in July 2019.&lt;/li>
&lt;li>&lt;em>&lt;strong>&lt;a href="https://guardianproject.info">Guardian Project’s&lt;/a>&lt;/strong>&lt;/em> Orbot tool website and Android application. Prioritized recommendations will be applied with their next website release.&lt;/li>
&lt;li>&lt;em>&lt;strong>&lt;a href="https://securedrop.org">SecureDrop’s&lt;/a>&lt;/strong>&lt;/em> website and Source &amp;amp; Journalist Experience. Recommendations are expected to be applied in an upcoming release.&lt;/li>
&lt;/ul>
&lt;p>                 &lt;img src="http://usable.tools/images/blog/AL_Textbox1.png" alt="To complete these audits, Accessibility Lab worked with a mobility-impaired person who was able to verify the requirements related to motor disabilities and provide feedback on keyboard navigation requirements such as: skip content, focus order, visual focus, no trap focus, and more. They also worked with a visually-impaired contractor who could provide feedback using NonVisual Desktop Access (NVDA) for web pages, or the TalkBack screen reader for apps, focusing on forms, validations, status messages, and other information that should be communicated through these readers. " style="width: 80%; height: auto;"/>&lt;/p>
&lt;p>Additionally, the Accessibility Lab project lead, Nancy Reyes, attended RightsCon Tunis, and was able to participate in the UX Help Desk alongside the USABLE team and organizations such as Simply Secure, EFF, and Access Now. At RightsCon, Nancy was able to connect with new organizations and explore future collaborations, such as one with Least Authority, which has plans to work with Accessibility Lab on a website audit.&lt;/p>
&lt;h3 id="whats-next-for-accessibility-lab">What&amp;rsquo;s next for Accessibility Lab?&lt;/h3>
&lt;p>Accessibility Lab has begun collaborations with organizations such as the “Inclusion con Equidad” alliance, and “Fundacion Taiyari” alliance. They have also been working with the “Federal Institute of Telecommunications” to provide training focused on creating accessible web content.&lt;/p>
&lt;p>They plan to continue their consultant services and trainings for the private sector, government, and universities, as well as providing digital accessibility certifications to companies and government websites, designers, and developers. They hope to provide information and content for other countries around the world, and organize the first “Global Festival of Universal Design and Digital Inclusion”.&lt;/p></description></item><item><title>UXFund: Okthanks</title><link>http://usable.tools/blog/2019-09-24-uxfund_okthanks/</link><pubDate>Tue, 24 Sep 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-24-uxfund_okthanks/</guid><description>&lt;p>Okthanks, an organization focused on user experience and human-centered design, received a 9 month grant from the USABLE project to expand their capacity working with open-source privacy and security tool teams and digital security trainers around the globe. With this grant, Okthanks worked with tool teams to provide direct support in organizing user engagements, collect feedback from at-risk users, and guide future development of the tools.&lt;/p>
&lt;p>Over the last 9 months, Okthanks has worked with other UXFund grantees such as KeePassXC and the Guardian Project to achieve these goals.&lt;/p>
&lt;p>&lt;em>KeePassXC (KPXC)&lt;/em>: The Okthanks team hosted an in-person study, bringing together 12 participants for a &lt;em>&lt;a href="https://okthanks.com/first-use">&amp;ldquo;First Use&amp;rdquo;&lt;/a>&lt;/em> activity of KeePassXC. The goal behind the feedback session was to find how easy it was to use the tool and any barriers users faced when trying the tool for the first time. Feedback from this activity informed the KPXC team of necessary changes and led to the creation of the &lt;em>&lt;a href="https://keepassxc.org/quickstart/">Quickstart&lt;/a>&lt;/em> Guide, a resource designed to help first time users navigate the tool.&lt;/p>
&lt;p>&lt;em>Guardian Project&lt;/em>: A long-time partner of the Guardian Project, Okthanks worked with the team to create individual activities (translated into Spanish) for three tools they would be introducing in digital security trainings in Colombia- &lt;em>&lt;a href="https://guardianproject.info/apps/org.witness.proofmode/">ProofMode&lt;/a>&lt;/em>, &lt;em>&lt;a href="https://guardianproject.info/apps/org.havenapp.main/">Haven&lt;/a>&lt;/em>, and &lt;em>&lt;a href="https://guardianproject.info/apps/circulo">Circulo&lt;/a>&lt;/em>. The theme of the trainings, which were hosted in the capital city as well as two rural communities, was focused on “creative ways to use your phone to keep yourself, your community, and your territory safe.” Once the trainings were complete, Okthanks created insight reports for each tool to share back with the Guardian Project and their respective partner organizations, Witness and Article 19.&lt;/p>
&lt;h3 id="additional-engagements">Additional Engagements&lt;/h3>
&lt;p>With funding from this grant, the Okthanks team was able to attend the Internet Freedom Festival in Valencia, Spain, where they co-facilitated a session with the USABLE project team, entitled “The Power of Personas.” During this session, the &lt;em>&lt;a href="https://okthanks.com/persona-builder">Persona Builder activity&lt;/a>&lt;/em> was piloted and the Okthanks team was able to receive feedback on other activities shared at the event, ultimately guiding activity updates and improvements for their new &lt;em>&lt;a href="https://okthanks.com/exploratorium">exploratorium&lt;/a>.&lt;/em>&lt;/p>
&lt;img src="http://usable.tools/images/blog/UXFund_Okthanks_Textbox1.png" alt="The Persona Builder activity was developed by the Okthanks team and facilitates a step-by-step process to create a user persona. This activity is useful for tool teams and digital security trainers hoping to better understand the needs of their users, and community members seeking to map their risks and behaviors. " style="width: 50%; height: auto;"/>
&lt;p>At IFF, Okthanks also deployed activities including:&lt;/p>
&lt;ul>
&lt;li>Witness &amp;amp; Guardian Project, ProofMode: First Use&lt;/li>
&lt;li>Greenhost &amp;amp; Free Press Unlimited, Totem: First Impression Cards&lt;/li>
&lt;li>Center for Digital Resilience: First Impression Cards and I&amp;rsquo;m Interested Cards&lt;/li>
&lt;li>OpenArchive, Save: 5 minute flyer&lt;/li>
&lt;li>Article 19 &amp;amp; Guardian Project, Circulo: My Story (Improved User Story)&lt;/li>
&lt;li>IF Community, General understanding: Narrative cards and Persona activity&lt;/li>
&lt;/ul>
&lt;p>Following IFF, the Persona Builder activity was shared with the Tor UX designer for their use in creating personas for their team. Okthanks also worked with Greenhost and Free Press Unlimited to generate activity ideas and present ways feedback could be gathered either through physical trainings or within their online tool, Totem.&lt;/p>
&lt;p>The Okthanks team was also able to provide resources to Localization Lab for their Thai language sprint, including new activities “One Liners,” “Quick Reactions: What’s your Impression?” and “Emoji’s: Will you use it?”&lt;/p>
&lt;p>&lt;em>Website Update and Exploratorium&lt;/em>&lt;/p>
&lt;p>During the last quarter, the Okthanks team focused on making changes and improvements to the frameworks and preparing content for the website. This included a review of all activities developed so far and updating them with any feedback received. They finalized the webpage layout, access to the individual activities, facilitator guides for every activity with instructions on how to run the activity, and for some provided a “no paper trail,” or digital deployment option!&lt;/p>
&lt;p>The Exploratorium is now live and all 12 activities and instructions are ready for download and use. A ‘Guiding Principles’ document was also created, outlining important considerations when conducting user research such as the threat model of a community, which can inform the appropriate way to deploy the activities.&lt;/p>
&lt;p>Additional community resources are also linked on their website, and will continue to be updated as more resources become available.&lt;/p>
&lt;h3 id="check-out-their-new-exploratoriumhttpsokthankscomexploratorium">&lt;em>&lt;a href="https://okthanks.com/exploratorium">Check out their new Exploratorium!&lt;/a>&lt;/em>&lt;/h3></description></item><item><title>USABLE at the 2019 Symposium on Usable Privacy and Security (SOUPS)</title><link>http://usable.tools/blog/2019-09-19-soups/</link><pubDate>Thu, 19 Sep 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-19-soups/</guid><description>&lt;p>The USABLE team facilitated a half-day workshop this past August at the 2019 Symposium on Usable Privacy and Security (SOUPS) in Santa Clara, California. The workshop, entitled “Designing for the Extremes of Risk,” was an interactive exploration of what it means to work with at-risk communities, particularly in the context of designing and developing privacy and security tools. The nearly 25 attendees represented a diverse range of professions, from academics to UX researchers to product teams and engineers.&lt;/p>
&lt;p>The workshop began with a conversation about “high-risk” individuals and communities. After defining high-risk, the project team provided an overview of the USABLE project and an introduction to the UX Feedback Collection Guidebook (to be publicly released in October 2019). The half-day workshop concluded with four breakout sessions to dive deeper into relevant topics, such as:&lt;/p>
&lt;ul>
&lt;li>Working with High-Risk Communities: Barriers and Solutions,&lt;/li>
&lt;li>Trends and Themes Across Demographics of High-Risk Users,&lt;/li>
&lt;li>Building a Community of Practice, and&lt;/li>
&lt;li>Usable Security for Developers: Integrating UX into the Process.&lt;/li>
&lt;/ul>
&lt;p>In addition to organizing and facilitating this half-day workshop, the project team also attended an afternoon session organized by WIPS on Inclusive Privacy and Security. The WIPS team referenced USABLE personas during one of their activities and one breakout group used USABLE persona Marina from Russia as the template for their 3D storyboard creation. See photo below.&lt;/p>
&lt;img src="http://usable.tools/images/blog/Marina_StoryBoar.png" alt="Marina storyboard" style="float: center; margin: 1em; width: 50%;"/>
&lt;p>The next two days of the conference were focused on technical SOUPS sessions. For a quick summary of relevant papers and presentations, check out this blog post we co-authored with our partners in the usability space: &lt;em>&lt;a href="https://simplysecure.org/blog/SOUPS-2019">https://simplysecure.org/blog/SOUPS-2019&lt;/a>&lt;/em>&lt;/p>
&lt;p>Below we have highlighted a few main take-aways from our engagements at SOUPS this year.&lt;/p>
&lt;ul>
&lt;li>From a product perspective, it can be difficult to identify at-risk communities, connect with them, and build the level of trust needed to collect accurate feedback. Using trusted intermediaries, such as digital security trainers, can provide tool teams with access to relevant feedback without jeopardizing the safety of at-risk communities.&lt;/li>
&lt;li>Tool teams can consider offering incentives (such as small stipends) for individuals who participate in user research. If offering incentives, be sure to research local implications for end users. For example, will accepting a stipend impact any government support that low-income participants may be receiving?&lt;/li>
&lt;li>International events and UX convenings are a good entry point for interested parties to meet at-risk users and begin to build trust. It is helpful for people outside the existing Internet Freedom (IF) community to understand what events exist, who attends each one, and what the purpose of these events are.&lt;/li>
&lt;li>Always be clear about what will be shared from meetings or gatherings (participant list, notes, attribution, etc.) and set clear ground rules from the beginning to foster a sense of trust among attendees.&lt;/li>
&lt;li>Co-design is most effective when it is implemented throughout the entire process. Utilize the co-design process not just for feature or tool development, but also developing the larger feedback collection process.&lt;/li>
&lt;li>User personas allow design and development teams to understand users without requiring direct access or communication.&lt;/li>
&lt;li>User engagements or any feedback collection activities should always take place in a trusted environment or location.&lt;/li>
&lt;li>When designing alerts, it is important to consider the cross-cultural interpretation of the language/design. Images and graphics can be used to send a more universal message or serve users who may be illiterate.&lt;/li>
&lt;li>There is no universal catalog for usability security bugs, analogous to the Common Vulnerabilities and Exposures (CVE) catalog for security threats. Are there ways to identify and/or automate the testing of usability failures by referencing “chaos engineering” style approaches (see &lt;a href="https://en.wikipedia.org/wiki/Chaos_engineering#10-18_Monkey)">https://en.wikipedia.org/wiki/Chaos_engineering#10-18_Monkey)&lt;/a>?&lt;/li>
&lt;li>Reframe “edge cases” as “stress cases.” Account for how people operate under stress, as this is a more universally applicable approach. Though levels of stress can differ, all users face stress at some point. (Credit to 18F staff, who originally shared this reframing.)&lt;/li>
&lt;/ul></description></item><item><title>Q&amp;A with the SecureDrop Team</title><link>http://usable.tools/blog/2019-09-13-qa-securedrop2/</link><pubDate>Tue, 10 Sep 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-13-qa-securedrop2/</guid><description>&lt;p>This month, we are taking some time to catch up with our UXFund grantees, and learn a little more about their organization.&lt;/p>
&lt;h2 id="qa-with-securedrop">Q&amp;amp;A with SecureDrop&lt;/h2>
&lt;h3 id="q-what-is-your-tool-what-is-it-used-for-and-what-is-your-role">Q: What is your tool? What is it used for? And what is your role?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> SecureDrop, which is used by more than 65 media organizations around the world to communicate with sources who wish to remain anonymous (e.g., whistleblowers). I am the project lead.&lt;/p>
&lt;h3 id="q-how-did-you-become-involved-with-this-project-what-are-your-motivations-for-this-work">Q: How did you become involved with this project? What are your motivations for this work?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> I first became aware of SecureDrop initially as a user: at a Chicago based non-profit I co-founded - Lucy Parsons Labs - we installed SecureDrop in order to provide the most secure channel available for potential whistleblowers to send us information, primarily focused on the police accountability domain.&lt;/p>
&lt;p>After that I got more involved with Freedom of the Press Foundation - the organization that currently stewards SecureDrop’s development. I became involved right around the time of the 2016 US presidential election, so it was a time when technologies protecting journalists and whistleblowers were getting significantly more interest.&lt;/p>
&lt;p>Knowing how critical these tools can be to prevent journalistic sources from being identified is what keeps me motivated to work on SecureDrop.&lt;/p>
&lt;h3 id="q-how-large-is-your-team-who-else-is-working-on-the-project-full-time-part-time-etc-how-often-do-you-connect-and-via-what-channels">Q: How large is your team? Who else is working on the project (full-time, part-time, etc)? How often do you connect and via what channels?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> Three teams at Freedom of the Press Foundation contribute to SecureDrop:&lt;/p>
&lt;ul>
&lt;li>The core development team (4 people, including myself)&lt;/li>
&lt;li>The support team (2 people), which provides installation help and ongoing support for the 65+ media organizations using SecureDrop;&lt;/li>
&lt;li>The digital security training team (4 people), which provides in-depth security training and consulting services to news organizations, including for SecureDrop.&lt;/li>
&lt;/ul>
&lt;p>In addition, the project is supported by other members of our staff, including our project manager, our CTO, our Security Engineer, and a part-time UX Designer.&lt;/p>
&lt;h3 id="q-why-do-you-think-its-valuable-to-engage-with-users">Q: Why do you think it’s valuable to engage with users?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> We need to make sure that we’re addressing our users’ real needs. What challenges do news organizations encounter when communicating with whistleblowers? How can SecureDrop support them in this process? The only way to answer those questions is to ensure that insights from user feedback, training, support, and user research feed back into the development process.&lt;/p>
&lt;p>For a security product, it’s especially important that there is no disconnect between theoretical security and operational security practices. For example, SecureDrop uses an air-gapped viewing station for securely reviewing documents. If a journalist then takes a photograph of a document with their phone, that photograph of a sensitive document may be uploaded to a cloud or backup service without their knowledge.&lt;/p>
&lt;p>Engaging with users helps us identify these potential disconnects, and think about ways that we can address them through user experience improvements, training, documentation, etc.&lt;/p>
&lt;h3 id="q-what-is-the-best-way-for-users-to-share-feedback-with-your-team">Q: What is the best way for users to share feedback with your team?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> For news organizations and journalists using SecureDrop, we recommend that they get in touch with us via &lt;a href="mailto:securedrop@freedom.press">securedrop@freedom.press&lt;/a> (&lt;em>&lt;a href="https://securedrop.org/sites/default/files/fpf-email.asc">GPG key here&lt;/a>&lt;/em>) and request an account on our &lt;em>&lt;a href="https://support.freedom.press/">support portal&lt;/a>&lt;/em>. Because communications about production use of SecureDrop are inherently sensitive, it’s important to use a secure channel by default.&lt;/p>
&lt;p>For sensitive security issues, we offer &lt;em>&lt;a href="https://bugcrowd.com/freedomofpress">bug bounties&lt;/a>&lt;/em> via Bugcrowd, or researchers can send us an email at &lt;a href="mailto:securedrop@freedom.press">securedrop@freedom.press&lt;/a> (&lt;em>&lt;a href="https://securedrop.org/sites/default/files/fpf-email.asc">GPG key here&lt;/a>&lt;/em>).&lt;/p>
&lt;p>For less sensitive communications, you can find us &lt;em>&lt;a href="https://gitter.im/freedomofpress/securedrop">on Gitter&lt;/a>&lt;/em>, and we encourage users to &lt;em>&lt;a href="https://github.com/freedomofpress/securedrop/issues/new/choose">open issues on GitHub&lt;/a>&lt;/em>, including for feature requests.&lt;/p>
&lt;h3 id="q-how-has-feedback-previously-been-incorporated-into-development">Q: How has feedback previously been incorporated into development?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> An example feature that is directly responsive to user feedback is the ability to administer the instance via the local network instead of using Tor which is how administrators access SecureDrop by default. This reduces the amount of time administrators spend working on their SecureDrop when it’s physically co-located in the newsroom.&lt;/p>
&lt;p>The feedback loop is often very fast when it comes to documentation changes: if a news organization stumbles over parts of our docs, it’s not uncommon for a fix to be incorporated a day or two later.&lt;/p>
&lt;h3 id="q-what-role-do-trainers-play-in-the-feedback-loop-how-do-you-view-trainers">Q: What role do trainers play in the feedback loop? How do you view trainers?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> FPF’s training team is integral to the success of SecureDrop. Given the complexity of the software and the security risks involved, engaging with journalists and administrators directly is the best way to ensure the system is used securely and effectively. The training team routinely shares insights with other SecureDrop team members, including in a debrief after any on-site with a news organization. The team also directly participates in documentation edits and reviews, updates to the threat model, UX discussions, etc.&lt;/p>
&lt;p>The FPF training team also creates &lt;em>&lt;a href="https://freedom.press/training/">digital security guides&lt;/a>&lt;/em> which frequently have relevance to SecureDrop, and which are cross-referenced in the SecureDrop documentation.&lt;/p>
&lt;h3 id="q-has-your-team-ever-used-personas-to-inform-design-or-development">Q: Has your team ever used personas to inform design or development?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> We currently don’t use personas, but are planning to do so in the near future.&lt;/p>
&lt;h3 id="q-what-are-the-future-plans-for-the-project">Q: What are the future plans for the project?&lt;/h3>
&lt;p>&lt;strong>A:&lt;/strong> We are working on a new project, the &lt;em>&lt;a href="https://github.com/freedomofpress/securedrop-workstation">SecureDrop Workstation&lt;/a>&lt;/em>, based on &lt;em>&lt;a href="https://www.qubes-os.org/">Qubes OS&lt;/a>&lt;/em>. The SecureDrop Workstation provides an integrated environment for connecting to SecureDrop and reviewing documents, using Virtual Machines to ensure documents are viewed in a secure, networkless environment that is destroyed after use.
This includes the development of a &lt;em>&lt;a href="https://github.com/freedomofpress/securedrop-client">graphical client application&lt;/a>&lt;/em>. &lt;em>&lt;a href="https://usable.tools/">Usable.tools&lt;/a>&lt;/em> has directly funded the work of one of our contributors, Nina Alter, on the user experience design and research for this effort, which has been instrumental in advancing it.&lt;/p>
&lt;p>We are planning to pilot the SecureDrop Workstation with select newsrooms later this year. If the pilot is successful, the SecureDrop Workstation has the potential to become a secure working environment for the most sensitive work journalists are engaged in—perhaps even including other communication tools that are commonly used for tip lines like Signal.&lt;/p></description></item><item><title>USABLE at RightsCon Tunis</title><link>http://usable.tools/blog/2019-08-27-usable-at-rightscon2019/</link><pubDate>Tue, 27 Aug 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-08-27-usable-at-rightscon2019/</guid><description>&lt;p>In June 2019, the USABLE team attended &lt;strong>&lt;a href="https://www.rightscon.org/past-events/tunis-2019/">RightsCon 2019&lt;/a>&lt;/strong> in Tunis. In addition to having face to face conversations and meetings with kay UX players in the Internet Freedom community, the team was able to co-facilitate a UX and Human Rights Zero Day event alongside &lt;strong>&lt;a href="https://www.accessnow.org/">AccessNow&lt;/a>&lt;/strong>, &lt;strong>&lt;a href="https://simplysecure.org">Simply Secure&lt;/a>&lt;/strong>, and the &lt;strong>&lt;a href="https://www.eff.org/">Electronic Frontier Foundation&lt;/a>&lt;/strong>.&lt;/p>
&lt;p>The morning of this full day event was focused on individual introductions and a mentoring/paired problem-solving activity, whereas the afternoon held participant-led breakout sessions with topics such as collecting user feedback, funding UX sustainability, queer interfaces &amp;amp; internet, and working in high-stress environments. The full-day event brought together a group of 30-35 designers, UX researchers and practitioners, tool team representatives, and digital security trainers to grow a community that advocates for rights-respecting and consent-based user experiences.&lt;/p>
&lt;!-- &lt;img src="http://usable.tools/images/blog/RC2019_Quote.png" alt="Quote from UX zero-day participant, The USABLE project by Internews is an example of how we can ensure continued support for usability work which would benefit users of open source tools as well as the creators of these tools" style="float: right; margin: .5em;"/> -->
&lt;p>The following day, we co-hosted a UX help desk at RightsCon, where RightsCon attendees were able to learn about UX organizations, receive resources from Okthanks and Accessibility Lab, and connect with individuals from these organizations.&lt;/p>
&lt;p>Our program officer, Ashley, also facilitated a meetup session at RightsCon entitled “&lt;strong>&lt;a href="https://rightscon2019.sched.com/event/Pvlh/creative-ways-to-support-diverse-tool-teams">Creative Ways to Support Diverse Tool Teams&lt;/a>&lt;/strong>,” where tool team representatives and community members met with donors to discuss their limitations and discuss potential solutions. The session was attended by smaller organizations and provided a good starting point for new solutions.&lt;/p></description></item><item><title>Announcing the Second Round of UXFund Grantees!</title><link>http://usable.tools/blog/2019-08-27-uxfund-results/</link><pubDate>Mon, 26 Aug 2019 08:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-08-27-uxfund-results/</guid><description>&lt;p>The USABLE team is excited to announce the second round of UXFund grantees. These teams will receive small grants for usability and accessibility enhancements, as well as for organizing targeted engagements with at-risk users. After a robust review process, six organizations were selected.&lt;/p>
&lt;p>Profiles of this round of UXFund grantees can be found below.&lt;/p>
&lt;img src="http://usable.tools/images/logos/MailvelopeLogo.png" alt="Mailvelope Logo" style="float: left; margin: .5em; width: 30%;"/>
&lt;p>&lt;strong>&lt;a href="https://www.mailvelope.com/en/about">Mailvelope&lt;/a>&lt;/strong> &amp;ndash; &lt;a href="https://www.mailvelope.com">https://www.mailvelope.com&lt;/a> is a free browser plugin for Chrome and Firefox that enables end-to-end encryption integrating directly with your web-based mail provider, whether you are using Gmail, Yahoo! Mail, or Microsoft webmail. Mailvelope is an open-source project currently hosted on &lt;a href="https://github.com/mailvelope/mailvelope">github&lt;/a>.&lt;/p>
&lt;br clear="both" />
&lt;hr>
&lt;img src="http://usable.tools/images/logos/KeePassXCLogo.png" alt="KeePassXC Logo" style="float: left; margin: .5em; width: 30%; "/>
&lt;p>&lt;strong>&lt;a href="https://keepassxc.org">KeePassXC&lt;/a> (KPXC)&lt;/strong> &amp;ndash; &lt;a href="https://keepassxc.org">https://keepassxc.org&lt;/a> is a password manager that allows users to store passwords safely and auto-type them into everyday websites and applications. KPXC is an actively developed cross-platform port of the original KeePass application. KPXC is an open-source project currently hosted on &lt;a href="https://github.com/keepassxreboot/keepassxc">github&lt;/a>.&lt;/p>
&lt;br clear="both" />
&lt;hr>
&lt;p>&lt;img src="http://usable.tools/images/logos/OkthanksLogo.png" alt="Okthanks Logo" style="float: left; margin: .5em; width: 30%; "/> &lt;strong>&lt;a href="https://okthanks.com">Okthanks&lt;/a>&lt;/strong> &amp;ndash; &lt;a href="https://okthanks.com">https://okthanks.com&lt;/a> is an organization focused on user experience and human-centered design. They work with tool teams to provide UX/UI support, including organizing user engagements, collecting feedback from at-risk users, and recommending specific changes or enhancements to tools. Under this grant, Okthanks will expand their capacity to work with open source privacy and security tool teams, as well as digital security trainers around the globe.&lt;/p>
&lt;br clear="both" />
&lt;hr>
&lt;img src="http://usable.tools/images/logos/A11Logo.png" alt="Accessibility Lab Logo" style="float: left; margin: .5em; width: 30%; "/>
&lt;p>&lt;strong>&lt;a href="https://a11ylab.com/en">Accessibility Lab&lt;/a>&lt;/strong> &amp;ndash; &lt;a href="https://a11ylab.com/en">https://a11ylab.com/en&lt;/a> is an organization based in Mexico which specializes in web accessibility audits and trainings. Under this second round of the UXFund, Internews is supporting Accessibility Lab as they expand their capacity to work directly with open source tool teams. In addition to conducting accessibility audits, the Accessibility Lab team will also provide guidance to tool teams and specific recommendations to improve the accessibility of tools and websites.&lt;/p>
&lt;br clear="both" />
&lt;hr>
&lt;img src="http://usable.tools/images/logos/SecureDropLogo.png" alt="SecureDrop Logo" style="float: left; margin: .5em; width: 30%; "/>
&lt;p>&lt;strong>&lt;a href="https://securedrop.org/overview/">SecureDrop&lt;/a>&lt;/strong> &amp;ndash; &lt;a href="https://securedrop.org/overview/">https://securedrop.org/overview/&lt;/a> is an open source software platform that allows secure sharing and communication between journalists and their sources. SecureDrop is managed by Freedom of the Press Foundation and is hosted on &lt;a href="https://github.com/freedomofpress/securedrop">GitHub&lt;/a>.&lt;/p>
&lt;br clear="both" />
&lt;hr>
&lt;img src="http://usable.tools/images/logos/GuardianLogo.png" alt="The Guardian Project Logo" style="float: left; margin: .5em; width: 30%;"/>
&lt;p>&lt;strong>&lt;a href="https://guardianproject.info/apps/orbot">The Guardian Project&lt;/a>&amp;rsquo;s Orbot&lt;/strong> &amp;ndash; &lt;a href="https://guardianproject.info/apps/orbot">https://guardianproject.info/apps/orbot&lt;/a> is a global collective of software developers, designers, advocates, activists, and trainers who develop open source mobile security software and operating system enhancements. &lt;strong>Orbot&lt;/strong> is a free software Proxy server project which allows Android users anonymity on the Internet. Orbot is an open-source project currently hosted on &lt;a href="https://github.com/guardianproject">github&lt;/a>.&lt;/p></description></item><item><title>Announcing New USABLE Website!</title><link>http://usable.tools/blog/2019-09-10-website-launch/</link><pubDate>Sat, 10 Aug 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-10-website-launch/</guid><description>&lt;p>New USABLE Website&lt;/p>
&lt;p>We’re excited to announce the launch of our re-designed USABLE website!&lt;/p>
&lt;p>This new site features a clear breakdown of the USABLE project, including descriptions of the various communities we partner with in different capacities. Visitors can easily navigate through user personas, explore USABLE’s involvement at recent events, and find out more about the organizations we work with.&lt;/p>
&lt;p>Throughout the month of September, we will be featuring guest blog posts from some of our partners including &lt;a href="https://okthanks.com">Okthanks&lt;/a>, &lt;a href="https://keepassxc.org">KeePassXC&lt;/a>, &lt;a href="https://securedrop.org">SecureDrop&lt;/a>, and &lt;a href="https://a11ylab.com">Accessibility Lab&lt;/a>.&lt;/p>
&lt;p>To check out the full site, visit &lt;a href="https://usable.tools">https://usable.tools&lt;/a>.&lt;/p>
&lt;p>&lt;strong>A huge thank you to Justin DeBlois for the design of the site, and Squiggy Rubio for development!&lt;/strong>&lt;/p></description></item><item><title>USABLE Personas</title><link>http://usable.tools/blog/2019-09-13-usable-personas/</link><pubDate>Tue, 16 Jul 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-13-usable-personas/</guid><description>&lt;p>The USABLE project has harnessed the knowledge of the digital security training community to build personas of high-risk users from around the globe. This has allowed the training community to play a critical role in communicating high-risk groups’ needs and use-cases for products directly to developers.&lt;/p>
&lt;p>Too often developers in the open source community are constrained in their understanding of users’ needs, making decisions based on their life experiences, assumptions, and their local environments. However, these all may be dramatically different than the experiences of high-risk groups using their products. Whether they are designing for a human rights activist in China or a journalist reporting on the frontlines in Crimea, for developers to design products that are useful and usable, they must better understand who their users are, their motivations, and their willingness to adopt such important security tools.&lt;/p>
&lt;p>Personas allow developers to better understand the threats, risks, and general activities of their ideal user. Personas pull out patterns of real users, and are not based on a single one person’s experience or circumstance. They are used to communicate a profile of characteristics, enabling developers to build a product based on real needs, rather than making assumptions. Personas are valuable in the design process because they allow for tool developers to make informed design decisions during the development process, facilitate the development of scenarios that simulate how an end-user would use the product, and push development teams to allocate resources based on real needs.&lt;/p></description></item><item><title>The USABLE Response</title><link>http://usable.tools/blog/2019-09-13-usable-response/</link><pubDate>Fri, 12 Jul 2019 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2019-09-13-usable-response/</guid><description>&lt;p>USABLE aims to create sustainable feedback loops among digital security trainers working with at-risk communities, open source tool developers, and user-experience (UX) and design experts. These successful feedback loops lead to more localized and usable tools, ultimately better equipping at-risk individuals and organizations to respond to existing and emerging digital threats.&lt;/p>
&lt;p>Communities of security trainers around the globe are uniquely positioned to bridge high-risk civil society groups and tool developers. Trainers have extensive knowledge surrounding the threats faced by their communities, the risks they take, and the challenges they have with specific tools. Through a series of regional workshops, USABLE enhanced digital security trainers’ ability to integrate feedback collection activities within their existing trainings, while building up their capacity to communicate directly with tool developers about specific usability roadblocks hindering the adoption of important security practices.&lt;/p>
&lt;p>Following the regional workshops, trainers put what they learned into practice, implementing Tool Feedback Sessions during their trainings and sharing this feedback with developers. By formalizing and expanding feedback collection, USABLE benefits at-risk users, trainers, and the open source developer community. Developers receive improved, higher-quality, and prioritized feature and tool modification requests, trainers have a direct path to improve the tools they train on, and voices of vulnerable populations are amplified. The result is more security and privacy tools that are easy-to-use for those who need them most.&lt;/p>
&lt;p>To date, USABLE has reached more than 400 end-users, jump-starting an important feedback loop that was previously missing.&lt;/p>
&lt;table>
&lt;thead>
&lt;tr>
&lt;th>Number of Trainings&lt;/th>
&lt;th>Number of End Users&lt;/th>
&lt;th>Pieces of Feedback Collected&lt;/th>
&lt;th>User Personas Created&lt;/th>
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>44&lt;/td>
&lt;td>432&lt;/td>
&lt;td>148&lt;/td>
&lt;td>49&lt;/td>
&lt;/tr>
&lt;tr>
&lt;td>  &lt;/td>
&lt;td>&lt;/td>
&lt;td>&lt;/td>
&lt;td>&lt;/td>
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;p>In parallel, USABLE provided direct support to open source developer teams through two rounds of the UX Fund support, which offers targeted small grants for user-driven usability and accessibility improvements for open source digital security and privacy tools. As trainers continue to share collected feedback with developers, they not only improve developers’ understanding of their users, but also allow developers to capture and implement tool changes that result in more user-friendly and useful products.&lt;/p>
&lt;p>In 2018, the USABLE project hosted its second UXForum, a multi-day event that brought together key communities including human rights groups, trainers, open source and private sector developers, and design experts to continue devising ways to scale and sustain these feedback loops.&lt;/p></description></item><item><title>Blog</title><link>http://usable.tools/blog/</link><pubDate>Mon, 20 May 2019 23:50:48 -0700</pubDate><guid>http://usable.tools/blog/</guid><description>&lt;h1 id="blog">Blog&lt;/h1>
&lt;p>Check out the latest updates from the USABLE project and partners!&lt;/p></description></item><item><title>Events</title><link>http://usable.tools/events/</link><pubDate>Mon, 20 May 2019 23:50:48 -0700</pubDate><guid>http://usable.tools/events/</guid><description>&lt;h1 id="events">Events&lt;/h1>
&lt;p>Check out the latest updates from the USABLE project and partners!&lt;/p></description></item><item><title>Personas</title><link>http://usable.tools/personas/</link><pubDate>Mon, 20 May 2019 23:50:48 -0700</pubDate><guid>http://usable.tools/personas/</guid><description>&lt;h1 id="personas">Personas&lt;/h1>
&lt;p>Personas, or profiles of end users, play an important role in the design process and allow developers to better understand community needs and facilitate the creation of user stories and more concrete use-cases for their products. In some of the most challenging security environments in the world, understanding the users capacity, threats, risks, and strengths can be difficult. The USABLE project has harnessed the knowledge of the digital security training community to build personas of high-risk users from around the globe. Learn more about USABLE Personas here.&lt;/p></description></item><item><title>USABLE at IFF 2019</title><link>http://usable.tools/events/usable-at-iff-2019/</link><pubDate>Mon, 20 May 2019 23:50:48 -0700</pubDate><guid>http://usable.tools/events/usable-at-iff-2019/</guid><description>&lt;p>The USABLE team attended the 2019 Internet Freedom Festival in Valencia, Spain. During the week, the team connected with digital security trainers, open source tool teams, and user-experience (UX) experts to discuss past, current, and future USABLE work.&lt;/p>
&lt;p>USABLE partnered with Okthanks to co-facilitate a session entitled “The Power of Personas.” The one-hour session provided a general overview of user personas and featured multiple examples, including &lt;a href="https://usable.tools/personas">USABLE personas&lt;/a> and &lt;a href="https://okthanks.com/blog/peronaslatin-america">Okthanks personas&lt;/a>. The remainder of the session focused on the process of creating user personas, demonstrated via a group activity.&lt;/p>
&lt;p>The Persona Builder activity was developed by the Okthanks team, and facilitates a step-by-step process to create a user persona. This activity is useful for tool teams and digital security trainers hoping to better understand the needs of their users, and community members seeking to map their risks and behaviors.&lt;/p></description></item><item><title>USABLE at ILGA World</title><link>http://usable.tools/events/usable-at-ilga-world/</link><pubDate>Mon, 20 May 2019 23:50:48 -0700</pubDate><guid>http://usable.tools/events/usable-at-ilga-world/</guid><description>&lt;p>The USABLE team attended ILGA World 2019, a bi-annual convening of LGBTQIA advocates and funders from all over the globe. Attending this conference allowed the USABLE team to meet with LGBTQI users, discuss the tools that are currently being used in the field, and better understand the threats that this particular community is facing in different parts of the world. Ultimately, this information shapes the tool teams that the USABLE team works with and expand the network of at-risk users with whom the project team can connect relevant developers.&lt;/p>
&lt;p>In partnership with Grindr for Equality, the USABLE team co-organized a session entitled “Protecting Ourselves in a Digital World: The Basics of Digital Security and Online Safety.” The first component was a quick activity designed to capture current practices, threats, and questions of the community members in attendance. Participants were given three different colors of sticky notes and asked to spend 3-5 minutes documenting the following:&lt;/p>
&lt;ol>
&lt;li>What tools or practices are you currently using to protect yourselves online?&lt;/li>
&lt;li>What are the current threats facing you or your community?&lt;/li>
&lt;li>What questions do you have about digital security?&lt;/li>
&lt;/ol>
&lt;p>During the second component of the session, the USABLE team provided attendees with five simple steps they could take immediately to improve their digital hygiene. Azza Sultan, Associate Director at Grindr for Equality, then briefly presented the current security features offered by Grindr, as well as an overview of future features that they hope to develop soon.&lt;/p>
&lt;p>The final component required the attendees to divide into two smaller groups. One group focused on providing tool-specific feedback on Jitsi Meet. Attendees used the task-ranking worksheet developed during the regional UX Workshops to document their thoughts and feedback. The second group focused on providing feedback on Grindr’s security features.&lt;/p>
&lt;p>The session was very well attended and everyone repeatedly voiced the need for more conversations around digital security in this space.&lt;/p></description></item><item><title>Bangladesh: "Habibur Rahman Sujon"</title><link>http://usable.tools/personas/bd_sujon/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/bd_sujon/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Habibur is in his twenties and identifies as a &lt;strong>Muslim gay&lt;/strong> man. He lives in a small town where he must constantly hide his sexuality. Recently, Habibur went to Dhaka, the capital of Bangladesh, to attend a party for gay men. Police &lt;strong>raided&lt;/strong> the party and he and some of his friends were &lt;strong>arrested&lt;/strong>. The police outed them as gay men in front of the media.&lt;/p>
&lt;p>Habibur has an &lt;strong>&amp;ldquo;anonymous&amp;rdquo; Facebook profile&lt;/strong> that he uses to connect with other gay men. He is an active member of a closed Facebook group for gay Bangladesh men. He often &lt;strong>attends events&lt;/strong> that are posted in this group. Many people do not have access to a smart phone in his remote village, so he relies on Facebook groups to stay connected to other people in the LGBT community.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Habibur needs to be able to &lt;strong>connect&lt;/strong> with other members of the LGBT community, without fearing for his safety.&lt;/p>
&lt;p>He is interested in learning more about how to &lt;strong>safely&lt;/strong> use online dating tools.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Habibur&amp;rsquo;s &lt;strong>identity was revealed&lt;/strong> when he was &lt;strong>arrested&lt;/strong> during the raid of a party. Bullying and social harassment increased significantly following this incident, particularly within his university.&lt;/p>
&lt;p>LGBT people are extremely &lt;strong>vulnerable&lt;/strong> when using social media or dating applications.&lt;/p>
&lt;p>Many of the risk mitigation materials that currently exist are only available in English. Habibur only speaks Bangla and therefore has &lt;strong>limited resources&lt;/strong> available to protect himself.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Habibur owns a smart phone and knows how to use &lt;strong>mobile applications&lt;/strong>.&lt;/p>
&lt;p>He understands the basics of the Internet and he is able to &lt;strong>send and receive emails&lt;/strong>.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I &lt;strong>safely navigate&lt;/strong> Facebook groups and dating applications for the LGBT
community?&lt;/p>
&lt;p>Are there &lt;strong>risk mitigation materials&lt;/strong> available in my native language of Bangla?&lt;/p></description></item><item><title>Bangladesh: "Tabassum"</title><link>http://usable.tools/personas/bd_tabassum/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/bd_tabassum/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Tabassum identifies as a &lt;strong>lesbian&lt;/strong> and has recently become an active voice for the rights of the LGBT community in Bangladesh. During the day, she works as a clerk at a local bank. She volunteers at an &lt;strong>unregistered&lt;/strong> LGBT rights organization. She also works with other activist groups for local and international &lt;strong>advocacy&lt;/strong>. She is out to a few of her friends, but not to her colleagues or family.&lt;/p>
&lt;p>In order to conduct meetings with other LGBT activists and the community, Tabassum needs to rely heavily on &lt;strong>messaging applications&lt;/strong> like Facebook Messenger and WhatsApp. She also uses her personal email regularly to communicate with ally organizations.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Tabassum wants to &lt;strong>advance the LGBT rights movement&lt;/strong> in Bangladesh by repealing Section 377.&lt;/p>
&lt;p>She also wants to &lt;strong>raise awareness&lt;/strong> and implement sensitization programs designed to create an accepting and inclusive society.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Homosexuality is &lt;strong>illegal&lt;/strong> in Bangladesh and LGBT activists can be &lt;strong>arrested&lt;/strong> by authorities according to Section 377 of the law.&lt;/p>
&lt;p>There have been reports that activists are under &lt;strong>digital surveillance&lt;/strong> from both the government and religious militant groups. These activists are being &lt;strong>tracked&lt;/strong> through social media.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Tabassum has a strong peer activist &lt;strong>network for support&lt;/strong>.&lt;/p>
&lt;p>She knows which communication tools use &lt;strong>encryption&lt;/strong> and which do not.&lt;/p>
&lt;p>She always meets other activists in &lt;strong>public places&lt;/strong> or a &lt;strong>secure home&lt;/strong>.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How do I know if I am under &lt;strong>surveillance&lt;/strong>?&lt;/p>
&lt;p>How can I stop information from being &lt;strong>leaked&lt;/strong> to other people?&lt;/p></description></item><item><title>China: "L. N."</title><link>http://usable.tools/personas/cn-ln/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/cn-ln/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>L.N. is in her early 20s, and is outgoing and charismatic. She lives in a major metropolitan area in &lt;strong>mainland China&lt;/strong>, and is a recent college graduate with many social connections; fluent in Cantonese and Mandarin, and proficient in English.&lt;/p>
&lt;p>L. N. is a key member of an active &lt;strong>women’s rights group&lt;/strong> in China that has gained national and international media attention for some of its activities. She is committed to activism aimed at &lt;strong>promoting the social and cultural change&lt;/strong> necessary to bring about &lt;strong>equal rights for women in China&lt;/strong>.&lt;/p>
&lt;p>She has come &lt;strong>under pressure&lt;/strong> to get married. Her resistance to this this pressure found expression in several videos that she co-produced with her group and posted on WeChat. These &lt;strong>videos were widely shared&lt;/strong> and led to a larger conversation throughout social media on the topic of women’s place in Chinese society. This attention has caused L.N., as well as members of the rights group, to come under &lt;strong>closer scrutiny&lt;/strong> by the authorities.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Ongoing ability to speak freely and &lt;strong>advocate&lt;/strong> for women&amp;rsquo;s rights&lt;/p>
&lt;p>Maintaining &lt;strong>social connections&lt;/strong> with network of fellow activists&lt;/p>
&lt;p>Finding &lt;strong>secure communication tools&lt;/strong> that work reliably to share with networks&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Activism brings constant and sophisticated surveillance, and can lead to restrictions on freedom of movement and association, including loss of employment and &lt;strong>imprisonment&lt;/strong>.&lt;/p>
&lt;p>Digital devices are often confiscated with sensitive data, media, and private personal networks exposed.&lt;/p>
&lt;p>&lt;strong>Social isolation&lt;/strong> and related depression stem from an inability to communicate privately, and a real fear that friends and family will also be targeted.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Highly trained on digital security tools and techniques.&lt;/p>
&lt;p>Conducts highly sophisticated, thoughtful &lt;strong>analysis of threats and choice of tools&lt;/strong>.&lt;/p>
&lt;p>Incredibly savvy on &lt;strong>operational security&lt;/strong> and maintains separate mobile devices for regular activities for secure conversations&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How do I communicate with individuals not already on secure communication channels?&lt;/p>
&lt;p>Are there secure tools that &lt;strong>do not require VPN&lt;/strong> to access?&lt;/p>
&lt;p>How can I &lt;strong>collaborate&lt;/strong> securely with inner circle?&lt;/p>
&lt;p>How can I protect my data - on my phone and my computer - against &lt;strong>confiscation&lt;/strong>?&lt;/p></description></item><item><title>China: "Z. W."</title><link>http://usable.tools/personas/cn-zw/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/cn-zw/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Z.W. is highly educated, and also respected and accomplished professional with many connections. He is &lt;strong>reflective, respectful, careful, principled&lt;/strong> and is in his late 40s with wife and two children. He is fluent in Mandarin, Cantonese, English.&lt;/p>
&lt;p>Z. W. recently &lt;strong>posted an article&lt;/strong> perceived as &lt;strong>critical of government authorities&lt;/strong> about a land-grab case occurring on the outskirts of a town in his hometown province. Due to Z.W.’s international connections, previous political statements he has made, his influential position as an academic, and the popularity of the current article he wrote, he was recently &lt;strong>visited by government authorities&lt;/strong> and &lt;strong>detained for questioning&lt;/strong>. Several suspicious activities—including &lt;strong>phishing emails&lt;/strong>, and questions from the authorities directed to him about topics not widely known by others—make him certain he is under &lt;strong>active surveillance&lt;/strong>. He is currently investigating moving his family out of the country to ease pressures and is exploring opportunities.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Means to &lt;strong>communicate securely&lt;/strong> with family and network both &lt;strong>inside and outside of China&lt;/strong>, both now and if he emigrates.&lt;/p>
&lt;p>Ability to make purchases that are &lt;strong>not traced back&lt;/strong> to him (e.g, new devices, travel, etc.).&lt;/p>
&lt;p>Ability to &lt;strong>lock down his accounts&lt;/strong> to prevent further surveillance, without raising his profile or drawing attention.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Accessing and downloading secure tools and applications &lt;strong>could be considered a criminal offence&lt;/strong> due to new NGO and other related laws.&lt;/p>
&lt;p>&lt;strong>Surveillance of network activity&lt;/strong> and digital devices confiscated.&lt;/p>
&lt;p>&lt;strong>Imprisonment, torture&lt;/strong>, and the mental and physical health issues afterwards.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Trained on digital security tools and techniques; will implement techniques and tools if they work reliably, are usable (i.e., meet the &lt;strong>basic usability standards&lt;/strong> offered by tools such as WeChat, OneDrive, etc.)&lt;/p>
&lt;p>Comfortable with and regularly uses social media.&lt;/p>
&lt;p>Regularly accesses databases and conducts fairly complex data analysis in support of academic research work.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I maintain social connections with my international network without secure communication methods?&lt;/p>
&lt;p>How can I convince my personal networks to use recommended secure communication tools (e.g., PGP, ChatSecure, Jitsi, etc) when these tools are considered &lt;strong>too onerous&lt;/strong> to setup or so &lt;strong>unreliable&lt;/strong> in functionality and service?&lt;/p></description></item><item><title>Cuba: "Yasmany"</title><link>http://usable.tools/personas/cu_yasmany/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/cu_yasmany/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Yasmany is a married man in his thirties. He is a &lt;strong>journalist&lt;/strong> based in Cuba and a &lt;strong>vocal advocate&lt;/strong> for Afro-Cuban rights. He uses public transportation to reach his sources and often has to pass through security checkpoints.&lt;/p>
&lt;p>He uses technology to &lt;strong>communicate&lt;/strong> with his colleagues, family, and friends. He also uses his &lt;strong>mobile device&lt;/strong> to record interviews and take pictures. Yasmany has grown accustomed to habitual &lt;strong>harassment&lt;/strong> from the police.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Yasmany needs to &lt;strong>protect&lt;/strong> himself and his stories from the government.&lt;/p>
&lt;p>He needs to &lt;strong>communicate securely&lt;/strong> with his sources and keep his files safe.&lt;/p>
&lt;p>He needs to be able to &lt;strong>record&lt;/strong> interviews on his mobile device.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>&lt;strong>Limited internet connectivity&lt;/strong> and expensive data plans restrict Yasmany&amp;rsquo;s options when it comes to communication.&lt;/p>
&lt;p>Most of the computers he has access to have government &lt;strong>spyware&lt;/strong> that can track and record both online and offline activity.&lt;/p>
&lt;p>He is the subject of &lt;strong>raids&lt;/strong> and sometimes his devices are searched at &lt;strong>security checkpoints&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>He is &lt;strong>aware&lt;/strong> of the risks that he faces.&lt;/p>
&lt;p>He makes sure he does not disclose &lt;strong>sensitive information&lt;/strong> in calls and text messages.&lt;/p>
&lt;p>He always &lt;strong>updates&lt;/strong> the software on his devices.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>Can the &lt;strong>government&lt;/strong> read my communications?&lt;/p>
&lt;p>Can I &lt;strong>delete&lt;/strong> the content on my phone before handing it over to the &lt;strong>police&lt;/strong>?&lt;/p></description></item><item><title>Dominican Republic: "Jackefine"</title><link>http://usable.tools/personas/do_jackefine/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/do_jackefine/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Jackefine is a woman in her mid-twenties living in the capital of the Dominican Republic. She is currently attending &lt;strong>university&lt;/strong> and working as an administrative assistant. In her free time, she supports &lt;strong>feminist causes.&lt;/strong>&lt;/p>
&lt;p>Until recently she lived with her family, but she now lives with a friend. Her favorite social network is &lt;strong>Facebook,&lt;/strong> which she uses to confidently publish her daily activities. She has a mobile data plan that allows her to use Facebook and &lt;strong>WhatsApp.&lt;/strong>&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She wants to learn how to use &lt;strong>social networks&lt;/strong> and applications to express herself in safe ways.&lt;/p>
&lt;p>She wants to be able to explore her sexuality without facing &lt;strong>harassment online.&lt;/strong>&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Explicit, sexual content of Jackefine was &lt;strong>published on social media&lt;/strong> and other platforms by her ex-boyfriend.&lt;/p>
&lt;p>She is now receiving a wave of &lt;strong>offensive and sexist messages.&lt;/strong>&lt;/p>
&lt;p>Her phone was also &lt;strong>compromised&lt;/strong> and the photos were sent to all of her contacts.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Jackefine owns various devices, including a &lt;strong>mobile phone&lt;/strong> and a &lt;strong>tablet.&lt;/strong>&lt;/p>
&lt;p>She has a very strong &lt;strong>support network&lt;/strong> of friends and coworkers.&lt;/p>
&lt;p>She is an experienced woman and she &lt;strong>knows her rights.&lt;/strong>&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What do I need to do to &lt;strong>express myself safely&lt;/strong>?&lt;/p>
&lt;p>Are there applications that allow you to &lt;strong>protect your identity&lt;/strong> when sending elicit photos?&lt;/p>
&lt;p>How can I prevent the spreading of my photos &lt;strong>without my consent&lt;/strong>?&lt;/p></description></item><item><title>Indonesia: "Ayu"</title><link>http://usable.tools/personas/id_ayu/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/id_ayu/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Ayu is in her early twenties and identifies as a &lt;strong>Muslim transwoman&lt;/strong>. She grew up in a small village and is part of a conservative family. After facing &lt;strong>violence and harassment&lt;/strong>, she dropped out of high school and fled to Jakarta.&lt;/p>
&lt;p>She currently works as a &lt;strong>sex worker&lt;/strong> and serves as an advocate for the &lt;strong>LGBTQI community&lt;/strong>.&lt;/p>
&lt;p>She uses the same &lt;strong>social media networks&lt;/strong> and platforms for her sex work, activism, and to connect with friends and family. So me of these applications are &lt;strong>location-based&lt;/strong> and use her real photo.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Ayu wants to continue her work and activism without &lt;strong>risking her life&lt;/strong> or &lt;strong>endangering&lt;/strong> the people around her.&lt;/p>
&lt;p>She needs to develop &lt;strong>cost-effective&lt;/strong> strategies to keep her work and activism separate from her personal life and to ensure that her &lt;strong>information is secure&lt;/strong>.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>She faces daily &lt;strong>online harassment&lt;/strong> and attacks based on her identity as a transwoman, a sex worker, and an activist.&lt;/p>
&lt;p>People, including the government and religious conservatives, can &lt;strong>collect information&lt;/strong> about Ayu from her online accounts and use it to persecute and attack her both online and physically.&lt;/p>
&lt;p>She invites clients to her home which poses a &lt;strong>physical danger&lt;/strong> to her.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Ayu is &lt;strong>tech savvy&lt;/strong> in terms of using and navigating applications on her Android phone.&lt;/p>
&lt;p>She works independently and has the power to choose her clients.&lt;/p>
&lt;p>She is very committed to activism and is a &lt;strong>strong voice&lt;/strong> within the community.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I use &lt;strong>social media&lt;/strong> for my work, my activism, and personal life securely?&lt;/p>
&lt;p>How can I respond to &lt;strong>online attacks&lt;/strong>?&lt;/p>
&lt;p>How can I separate my personal and professional lives?&lt;/p></description></item><item><title>Indonesia: "Husna"</title><link>http://usable.tools/personas/id_husna/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/id_husna/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Husna is an Indonesian woman in her mid twenties. She is an advocate for both &lt;strong>freedom of expression&lt;/strong> and &lt;strong>religious freedom&lt;/strong>. For many years, she has worked on issues related to peace building, deradicalization, and journalism that supports the peace process.&lt;/p>
&lt;p>She uses social media to &lt;strong>spread messages and information&lt;/strong> to the general public. She also uses social media to &lt;strong>coordinate activities&lt;/strong> for different minority rights groups. The various groups are using Facebook, including Facebook Messenger, to coordinate their activities. The groups use Twitter to &lt;strong>gain more public interest and support&lt;/strong>.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Husna hopes for a better society.&lt;/p>
&lt;p>She hopes that Indonesia will protect &lt;strong>pluralism&lt;/strong>.&lt;/p>
&lt;p>She wants to make sure that the government does not pass &lt;strong>discriminatory policies&lt;/strong> against minority religions.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>There are often government agents or intelligence officers &lt;strong>physically present&lt;/strong> at the events Husna helps coordinate.&lt;/p>
&lt;p>She is at risk of &lt;strong>attacks&lt;/strong> from paramilitary groups.&lt;/p>
&lt;p>State actors use &lt;strong>surveillance&lt;/strong> to track Husna.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Husna is a very brave advocate.&lt;/p>
&lt;p>She believes strongly in the values of pluralism.&lt;/p>
&lt;p>She supports and has access to a &lt;strong>large network&lt;/strong> of people that have different beliefs.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I keep myself &lt;strong>safe&lt;/strong> while using Facebook and other &lt;strong>social media&lt;/strong> sites?&lt;/p>
&lt;p>How can I keep myself safe while the &lt;strong>government is monitoring&lt;/strong> me?&lt;/p>
&lt;p>What type of chat applications or &lt;strong>communication channels&lt;/strong> are safe for us to use?&lt;/p></description></item><item><title>Jordan: "Ahmed"</title><link>http://usable.tools/personas/jo_ahmed/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/jo_ahmed/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Ahmed is a &lt;strong>student&lt;/strong> at a Jordanian university. He is concerned about the state of affairs in his country and he wants to &lt;strong>raise awareness&lt;/strong> about what is happening.&lt;/p>
&lt;p>Ahmed always tries to express his concerns &lt;strong>securely and anonymously&lt;/strong>, usually relying on social media networks to do so. He has not yet faced any prosecution or retaliation.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>He wants to oe able to express himself &lt;strong>freely and securely&lt;/strong>.&lt;/p>
&lt;p>He wants to communicate securely using WhatsApp and &lt;strong>anonymously&lt;/strong> using faoebook.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>He fears that being vocal about his opinions online will endanger his safety and might lead to &lt;strong>arrest&lt;/strong>.&lt;/p>
&lt;p>He fears that expressing opimions that are different will &lt;strong>alienate&lt;/strong> him in his society.&lt;/p>
&lt;p>He is worried he may be &lt;strong>surveilled&lt;/strong> or his devices may be &lt;strong>confiscated&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Ahmed owns a &lt;strong>smart phone&lt;/strong>.&lt;/p>
&lt;p>He is familiar with using &lt;strong>social media networks&lt;/strong> for communication.&lt;/p>
&lt;p>He can write and understand some &lt;strong>English&lt;/strong>.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I be &lt;strong>anonymous&lt;/strong> on facebook?&lt;/p>
&lt;p>How can I protect myself from &lt;strong>surveillance&lt;/strong>?&lt;/p>
&lt;p>How can I make sure messages to my friends are only read by the &lt;strong>intended recipient&lt;/strong>?&lt;/p></description></item><item><title>Kenya: "Alexandria Christian"</title><link>http://usable.tools/personas/ky_alexandria/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ky_alexandria/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Alexandria is based in Nairobi, Kenya. She is married and in her late twenties with a young child. She is a &lt;strong>lawyer&lt;/strong> by profession, but is also a &lt;strong>champion of women&amp;rsquo;s rights&lt;/strong>. She has been very vocal about FGM and has received some backlash for her activism.&lt;/p>
&lt;p>As part of her anti-FGM work, Alexandria uses an application that enables volunteers to rescue young girls and relocate them. Alexandria is responsible for &lt;strong>coordinating the volunteers.&lt;/strong>&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>I need to be able to &lt;strong>track&lt;/strong> the movement to my volunteers.&lt;/p>
&lt;p>I need an application which has an &lt;strong>emergency button&lt;/strong> for when there is no time to communicate.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Alexandria&amp;rsquo;s child has been downloading apps on her phone without her knowledge. The downloaded software included &lt;strong>malware,&lt;/strong> which &lt;strong>compromised sensitive information&lt;/strong> stored on her device. The malware is also capable of downloading and installing other apps and can do so without detection. Alexandria does not know how much information has been &lt;strong>leaked&lt;/strong> so far, but the volunteers are vulnerable to attacks since their identities have been revealed.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Alexandria makes sure that her software is always updated.&lt;/p>
&lt;p>She also makes sure that all volunteer files are &lt;strong>encrypted&lt;/strong> and is able to use the application to spread her message and get more people involved in anti-FGM efforts.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>Can I still &lt;strong>safely&lt;/strong> use my phone after deleting all the apps?&lt;/p>
&lt;p>What can I do to &lt;strong>avoid&lt;/strong> such incidents in the future?&lt;/p></description></item><item><title>Kenya: "Mary"</title><link>http://usable.tools/personas/ky_mary/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ky_mary/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Mary is a &lt;strong>digital security trainer, gender policy expert, and a research consultant&lt;/strong> with many years of experience conducting research for different organizations. She also trains activists and local communities on skills for adopting strategic non-violence and movement building to affect social change. She works as an &lt;strong>IT assistant&lt;/strong> for an organization that promotes environmental rights. Recently, the organization was hit by &lt;strong>ransomware&lt;/strong> and they lost a lot of information.&lt;/p>
&lt;p>She uses a &lt;strong>laptop for work and trainings&lt;/strong> and uses &lt;strong>bitlocker and Veracrypt&lt;/strong> to encrypt files and drives. She makes sure to use secure plug-ins in browser to enhance security. She also uses a cellphone daily and occasionally uses &lt;strong>social media.&lt;/strong>&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Mary wants to learn more about ethical hacking in order to help human rights defenders better protect their systems. Since her organization was recently attacked by ransomware, she wants to make sure she has the best antivirus possible to &lt;strong>protect their network and data.&lt;/strong> She would like to &lt;strong>strengthen her organization&amp;rsquo;s IT policies,&lt;/strong> including back up procedures, to prevent this from happening again.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>&lt;strong>Distributed Denial of Service (DDOS)&lt;/strong> attacks have been happening to other Human Rights Organizations in the region.&lt;/p>
&lt;p>&lt;strong>Spam and phishing&lt;/strong> emails and SMS messages are often received by members of her organization.&lt;/p>
&lt;p>&lt;strong>Physical security&lt;/strong> is a concern, as office and home break ins are common in the area.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Mary is able to train others in digital security, including those in her organization.&lt;/p>
&lt;p>She uses &lt;strong>file encryption and a password manager&lt;/strong> to store strong passwords.&lt;/p>
&lt;p>She has a &lt;strong>strong technical background,&lt;/strong> and can install and configure different operating systems.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can &lt;strong>internet of things&lt;/strong> devices be secured?&lt;/p>
&lt;p>How can I stop or minimize spam emails in my gmail inbox?&lt;/p></description></item><item><title>Kenya: Denis</title><link>http://usable.tools/personas/ky_denis/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ky_denis/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Denis is an &lt;strong>IT Officer and project manager&lt;/strong> in his early 30s. He does work for an organization that works towards the realization of environmental and human rights for the economically marginalized communities around extractive industries and toxic sites.&lt;/p>
&lt;p>Denis is married and has one daughter. In his free time, he works on &lt;strong>designing a tool&lt;/strong> that his community can use to report cases on industries that toxify the environment.&lt;/p>
&lt;p>He uses his &lt;strong>computer and cell phone&lt;/strong> daily, and uses &lt;strong>KeePassXC&lt;/strong> to manage his passwords and &lt;strong>Tresorit&lt;/strong> to back up the organization&amp;rsquo;s data.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Denis wants to become a &lt;strong>computer and data security expert&lt;/strong> in order to help his community learn how to store their data and keep their computers safe. With his knowledge in programming, he wants to &lt;strong>develop a tool&lt;/strong> that can track manufacturing industries in his country.&lt;/p>
&lt;p>His other goal is to have a &lt;strong>secure communication channel&lt;/strong> for the organization that can be used for reporting cases and complaints from the community to the office.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>&lt;strong>Surveillance&lt;/strong> of phone calls and the hacking of organization&amp;rsquo;s online accounts.&lt;/p>
&lt;p>His &lt;strong>physical security&lt;/strong> is at risk, as targeted office break-ins are common in his city.&lt;/p>
&lt;p>His &lt;strong>laptop and phone may be stolen&lt;/strong> during a break-in or robbery.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>He can &lt;strong>train others&lt;/strong> to create strong passwords and enable two-factor authentication.&lt;/p>
&lt;p>He is able to &lt;strong>identify a computer threat&lt;/strong> and clean it. He can use any computer programming language.&lt;/p>
&lt;p>He is known as a &lt;strong>trusted technical expert&lt;/strong> in his community.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I &lt;strong>encrypt my phone calls&lt;/strong> free of cost?&lt;/p>
&lt;p>How can I be anonymous online?&lt;/p>
&lt;p>What is the best tool to &lt;strong>recover deleted data?&lt;/strong>&lt;/p></description></item><item><title>Kenya: Peter</title><link>http://usable.tools/personas/ky_peter/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ky_peter/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Peter is a health worker in his community and also works for an &lt;strong>environmental and human rights advocacy&lt;/strong> organization based in Mombasa, Kenya as a researcher. His day to day activities include researching the possible dangers that industrial waste can cause to humans and the environment. He lives with his wife, two sons, and one daughter.&lt;/p>
&lt;p>Peter uses a &lt;strong>laptop for work&lt;/strong> daily, and a cellphone to communicate with colleagues as well as his family. He uses &lt;strong>dropbox&lt;/strong> to store findings from the field, and uses &lt;strong>Skype&lt;/strong> often to communicate with colleagues and partners.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Peter&amp;rsquo;s biggest concern is the &lt;strong>privacy&lt;/strong> of his patients. He wants to make sure that he is using a &lt;strong>secure application&lt;/strong> that can store the details of patients securely, in order to &lt;strong>protect their privacy.&lt;/strong> He would also like to have an application that can monitor the supply of government drugs in hospitals to ensure that they are adequately stocked.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>As an environmentalist, he is at risk of being &lt;strong>targeted and cyber-bullied&lt;/strong>&lt;/p>
&lt;p>If his &lt;strong>devices are stolen,&lt;/strong> all of his research data will be at risk&lt;/p>
&lt;p>As a healthcare professional, he is at risk of &lt;strong>patients&amp;rsquo; data leaking&lt;/strong>&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>He is aware of the risks that he faces if he does not take steps to protect his accounts.&lt;/p>
&lt;p>He uses &lt;strong>2fa on Facebook and Gmail&lt;/strong> accounts to keep them secure.&lt;/p>
&lt;p>He is a &lt;strong>great communicator,&lt;/strong> and can make presentations for those in his community.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What is the &lt;strong>best tool to encrypt my data&lt;/strong> on my computer?&lt;/p>
&lt;p>How can I protect the details of patients from being stolen and leaked?&lt;/p>
&lt;p>How can I &lt;strong>bypass blocked content&lt;/strong> on the internet?&lt;/p></description></item><item><title>Lebanon: "Lara"</title><link>http://usable.tools/personas/lb_lara/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/lb_lara/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Lara is a Lebanese woman in her late twenties. She works as a &lt;strong>journalist&lt;/strong> and is also a &lt;strong>well-informed activist&lt;/strong>. She stays up-to-date on all current events and the latest news updates.&lt;/p>
&lt;p>As a result of her activism, she has been &lt;strong>targeted&lt;/strong> by the government and other entities.&lt;/p>
&lt;p>She uses &lt;strong>chat applications&lt;/strong> like WhatsApp to communicate with her colleagues and connect with sources for her reporting.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She needs to &lt;strong>communicate securely&lt;/strong> with her contacts and sources.&lt;/p>
&lt;p>She wants to &lt;strong>better understand&lt;/strong> how to safely use the applications she is already using.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>She has previously been the target of &lt;strong>&amp;ldquo;man in the middle&amp;rdquo;&lt;/strong> attacks.&lt;/p>
&lt;p>She could be &lt;strong>imprisoned&lt;/strong> as a result of defamation.&lt;/p>
&lt;p>She often receives &lt;strong>phishing&lt;/strong> links.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>She believes that she has &lt;strong>nothing to hide&lt;/strong>.&lt;/p>
&lt;p>She writes bold articles that &lt;strong>educate&lt;/strong> and &lt;strong>inspire others&lt;/strong>.&lt;/p>
&lt;p>She knows that unencrypted apps are the most &lt;strong>vulnerable&lt;/strong> in terms of security.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>Is it &lt;strong>safe&lt;/strong> to use WhatsApp?&lt;/p>
&lt;p>Is there &lt;strong>another application&lt;/strong> that I should be using for secure communication?&lt;/p>
&lt;p>How can I encourage other people to use &lt;strong>secure applications&lt;/strong>?&lt;/p></description></item><item><title>Mexico: "Maria"</title><link>http://usable.tools/personas/mx-m/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/mx-m/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Maria is in her mid 30’s and is passionate in &lt;strong>advocating for the rights of people with disabilities&lt;/strong> in Mexico. She has been &lt;strong>blind since she was very young&lt;/strong> and faces a slew of accessibility challenges when using technology in her work and personal life. She must use a &lt;strong>screen reader&lt;/strong> to navigate her laptop and mobile devices, using a free and open-source version for Windows called, NVDA, and the built-in reader for iPhone, called, VoiceOver.&lt;/p>
&lt;p>Maria and her colleagues face &lt;strong>unique privacy and security concerns&lt;/strong> both as activists and as persons who are blind because their &lt;strong>inability to autonomously handle their most sensitive information&lt;/strong> makes it impossible to handle such information securely. They are also more susceptible to other forms of digital attacks, as &lt;strong>software is not consistently accessible&lt;/strong> and navigable –- making it hard to pinpoint or identify abnormal activity sometimes on their devices (e.g. pop-ups, advertisements vs malware and viruses).&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Advance accessibility for all persons with disabilities through &lt;strong>public advocacy&lt;/strong> and policy changes in both the public and private sectors and through the &lt;strong>promotion of accessibility standards&lt;/strong> and testing products using the free and open-source screen reader, NVDA and VoiceOver.&lt;/p>
&lt;p>Develop a strategy and build the capacity of users with disabilities to &lt;strong>prevent misuse of their data&lt;/strong> and &lt;strong>personal rights.&lt;/strong>&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>From digital security tools to normal tasks like checking bank statements, online shopping, or captchas; &lt;strong>tools that are inaccessible are not usable.&lt;/strong> This requires Maria to rely on and &lt;strong>share private information&lt;/strong> with family and colleagues.&lt;/p>
&lt;p>Loss of information, fraudulent sites, malware, and webcam activation can happen without accessible alerts informing the user.&lt;/p>
&lt;p>When people with disabilities cannot complete tasks online, they must go to a location in-person, which can lead to physical threats due to infrastructure problems.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Very &lt;strong>comfortable with technology&lt;/strong> and developing ways to &lt;strong>work around accessibility problems&lt;/strong> to accomplish tasks.&lt;/p>
&lt;p>Committed to supporting the rights of persons with disabilities and increasing awareness of these accessibility issues in technology.&lt;/p>
&lt;p>Interested in fostering a community of people with disabilities with whom to share experiences and ideas about improvements that can be made to &lt;strong>improve technologies and make them accessible.&lt;/strong>&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How do I determine which websites and tools are accessible and secure?&lt;/p>
&lt;p>If a security tool is not accessible, what are my best alternatives?&lt;/p>
&lt;p>Who can I contact about making this tool more accessible or if it is not working properly with NVDA or VoiceOver?&lt;/p></description></item><item><title>Nepal: "Chumi"</title><link>http://usable.tools/personas/np_chumi/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/np_chumi/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Chumi is a &lt;strong>lesbian&lt;/strong> woman in her mid thirties. She grew up in a small town in Nepal, but now lives in the capital and works at an organization focused on advancing the &lt;strong>rights of LGBT people&lt;/strong>. Her organization advocates for gender equality and LGBT inclusive environments around the country.&lt;/p>
&lt;p>She uses Facebook, WhatsApp, and email to &lt;strong>communicate&lt;/strong> with community members, &lt;strong>collect stories&lt;/strong> from the community, provide real-time &lt;strong>counseling&lt;/strong>, and &lt;strong>share legal updates&lt;/strong>.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She wants LGBTI community members to be able to live in society with &lt;strong>dignity&lt;/strong>.&lt;/p>
&lt;p>She wants to make others &lt;strong>aware&lt;/strong> of laws.&lt;/p>
&lt;p>She wants to &lt;strong>protect&lt;/strong> herself, the people she works with, and her information.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>She has received &lt;strong>death threats&lt;/strong> due to her advocacy for the LGBTI community.&lt;/p>
&lt;p>Her &lt;strong>personal information&lt;/strong> is on the internet and is published frequently by the media, which means other people have access to it.&lt;/p>
&lt;p>She is &lt;strong>harassed&lt;/strong> online because of her LGBTI identity.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Chumi has strong &lt;strong>advocating power&lt;/strong> and a lot of community members who support her activities.&lt;/p>
&lt;p>She is very &lt;strong>active online&lt;/strong> and the media looks to her as a &lt;strong>trusted source of information&lt;/strong>.&lt;/p>
&lt;p>She has a lot of experience using technology.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can people &lt;strong>safely tell their stories&lt;/strong> on social media? Do people have to make anonymous accounts?&lt;/p>
&lt;p>What is the safest way to &lt;strong>video conference&lt;/strong> with community members?&lt;/p>
&lt;p>Which tools are &lt;strong>secure&lt;/strong>? Which should I &lt;strong>recommend&lt;/strong> for community members?&lt;/p></description></item><item><title>Nepal: "Maya"</title><link>http://usable.tools/personas/np_maya/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/np_maya/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Maya is a Nepalese woman in her early thirties. She is an &lt;strong>information advocate&lt;/strong>, an avid researcher, and is very active on Twitter and Facebook.&lt;/p>
&lt;p>She is a well-known journalist in Nepal with many Twitter and other &lt;strong>social media&lt;/strong> followers. She primarily writes about &lt;strong>politics&lt;/strong>, sharing news and tweets related to political events or incidents happening in the country. Often times, she investigates and reports on her stories by physically going to the location of the incident or where the event is taking place, putting her at risk of &lt;strong>physical harm&lt;/strong>. When she publishes her stories, many times they are seen as &lt;strong>sensitive&lt;/strong> or &lt;strong>controversial&lt;/strong> in nature.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Maya believes in the &lt;strong>right to information&lt;/strong> and is therefore committed to sharing sensitive information with the public.&lt;/p>
&lt;p>As she has already been a victim of violence, she prioritizes the &lt;strong>safety&lt;/strong> of herself as well as those she works with.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>She often shares &lt;strong>sensitive information&lt;/strong> about important and powerful figures in Nepal.&lt;/p>
&lt;p>She covers &lt;strong>controversial issues&lt;/strong> from corruption to migration.&lt;/p>
&lt;p>She takes the same route every day. She is concerned that she will be &lt;strong>stalked or harassed&lt;/strong> on her commute.&lt;/p>
&lt;p>Her devices could be &lt;strong>confiscated&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Maya has strong research skills.&lt;/p>
&lt;p>She is known by many as a pioneer of the right to information and is regarded as one of the most &lt;strong>credible sources&lt;/strong> in Nepal.&lt;/p>
&lt;p>She uses her Android phone for public uses and her iPhone for personal uses.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I &lt;strong>protect my devices&lt;/strong>?&lt;/p>
&lt;p>How can I have &lt;strong>free mobility&lt;/strong> despite being very active on social media?&lt;/p>
&lt;p>How can I &lt;strong>protect information&lt;/strong> about myself and my friends?&lt;/p></description></item><item><title>Nicaragua: "Esteban Ramirez"</title><link>http://usable.tools/personas/ni_esteban/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ni_esteban/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Esteban is a &lt;strong>journalist&lt;/strong> in his mid-twenties. He works at a small newspaper in Managua, Nicaragua. He reports on thematic issues, often using &lt;strong>public transportation&lt;/strong> to meet with sources.&lt;/p>
&lt;p>As a journalist, he relies on technology to &lt;strong>communicate&lt;/strong> with his sources. He wants to improve his digital security to ensure that he is not endangering himself or those he interviews.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Esteban needs a &lt;strong>secure chat&lt;/strong> platform to use when communicating with his sources, many of whom are people at risk.&lt;/p>
&lt;p>He wants to be sure that his &lt;strong>data and conversations&lt;/strong> are not revealed to third parties.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Esteban&amp;rsquo;s sources have &lt;strong>limited access&lt;/strong> to the internet and little knowledge about safe applications.&lt;/p>
&lt;p>Esteban and his sources use devices with &lt;strong>low storage&lt;/strong> capacity.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Esteban has &lt;strong>connections&lt;/strong> within the technological community, including with developers and bloggers.&lt;/p>
&lt;p>He is constantly &lt;strong>up-to-date&lt;/strong> with new technology.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What applications will allow me to &lt;strong>securely communicate&lt;/strong> with my sources?&lt;/p>
&lt;p>Are there tools that are &lt;strong>easy to use&lt;/strong>?&lt;/p></description></item><item><title>Russia: "Marina"</title><link>http://usable.tools/personas/ru_marina/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ru_marina/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Marina is in her mid-thirties and works as an activist, blogger, and local community organizer.&lt;/p>
&lt;p>She uses different technologies to post about local issues, to &lt;strong>communicate&lt;/strong> with fellow activists, and to &lt;strong>organize protests&lt;/strong>.&lt;/p>
&lt;p>She often takes photos to post on social media and has organized &lt;strong>petitions&lt;/strong> that are sent to local administrators.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She wants her voice to be heard by the community.&lt;/p>
&lt;p>She also wants to use tools that are &lt;strong>easily accessible&lt;/strong> for other activists and community members.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Local authorities launch &lt;strong>DDoS attacks&lt;/strong> and employ trolls and hackers against her Facebook account.&lt;/p>
&lt;p>Police can &lt;strong>arrest&lt;/strong> Marina and &lt;strong>confiscate&lt;/strong> her phone.&lt;/p>
&lt;p>Her followers and supporters could face &lt;strong>persecution&lt;/strong> if exposed.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>She is knowledgeable about &lt;strong>social networks&lt;/strong> and social applications.&lt;/p>
&lt;p>She is &lt;strong>internet savvy&lt;/strong> and is fluent in English.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I prevent the identities of supporters from being &lt;strong>leaked&lt;/strong>?&lt;/p>
&lt;p>How can I protect my Facebook, email, and IM from hackers and prevent them from being &lt;strong>blocked&lt;/strong>?&lt;/p></description></item><item><title>Russia: "Sasha"</title><link>http://usable.tools/personas/ru_sasha/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ru_sasha/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Sasha is in his early thirties and works as a systems administrator at a civil society organization. He is very &lt;strong>skeptical&lt;/strong> and has a &lt;strong>critical approach&lt;/strong> to everything.&lt;/p>
&lt;p>He relies on technology to keep his organization &lt;strong>safe&lt;/strong>.&lt;/p>
&lt;p>After work, he sometimes attends concerts, plays computer games, or hangs out with friends.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Though he would never show it, he is an activist and he believes it is his duty to keep the organization &lt;strong>safe&lt;/strong>.&lt;/p>
&lt;p>He believes that everything should be very well &lt;strong>organized&lt;/strong> and work correctly.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>His organization works on politically sensitive issues li1ke &lt;strong>hacking, protests, eavesdropping, and provocations&lt;/strong>.&lt;/p>
&lt;p>Pro-government youth movements are regularly &lt;strong>verbally attacking&lt;/strong> his colleagues and sometimes unexpected office visits from pro-government stations occur. Sasha&amp;rsquo;s colleagues are not tech-savvy and they often make a lot of &lt;strong>critical digital security mistakes&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>He is skilled with technology and views everything through a critical lens.&lt;/p>
&lt;p>He has access to his entire organization&amp;rsquo;s &lt;strong>network&lt;/strong>, which he set up by himself.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I &lt;strong>teach&lt;/strong> all of my organization&amp;rsquo;s employees better digital security practices (use of &lt;strong>strong passwords&lt;/strong>, &lt;strong>2-factor authentication&lt;/strong>, etc.)?&lt;/p>
&lt;p>How can I be sure that people will &lt;strong>use&lt;/strong> the tools I train them on?&lt;/p></description></item><item><title>Sudan: "Fatima"</title><link>http://usable.tools/personas/sd_fatima/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/sd_fatima/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Fatima is in her late twenties and is an &lt;strong>advocate for women&amp;rsquo;s rights&lt;/strong> in Sudan. She works with students from the local university and other local women, advising them on funding opportunities.&lt;/p>
&lt;p>She relies on her phone and computer to &lt;strong>stay connected&lt;/strong> with the community and to &lt;strong>store important data&lt;/strong>. She also uses Skype to communicate with women remotely.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She wants to make FGM and child marriage illegal in Sudan.&lt;/p>
&lt;p>She wants to &lt;strong>raise awareness&lt;/strong> about gender-based violence and domestic violence.&lt;/p>
&lt;p>She wants to help women in her country &lt;strong>raise their voices&lt;/strong>.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Working on these issues makes her a target of phone tapping, email hacking, and home raids. If targeted, her &lt;strong>data could be Lost or compromised&lt;/strong>.&lt;/p>
&lt;p>She is also at risk of &lt;strong>verbal and physical abuse or arrest&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Fatima has knowledge of the community and has many &lt;strong>strong relationships&lt;/strong>.&lt;/p>
&lt;p>She is also &lt;strong>familiar with technology&lt;/strong> and she is comfortable using it.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What can I do to make sure I do not &lt;strong>lose my data&lt;/strong>?&lt;/p>
&lt;p>If needed, what ways can I &lt;strong>hide sensitive information&lt;/strong> on my laptop?&lt;/p>
&lt;p>How can I make sure everyone is &lt;strong>safe&lt;/strong> when they contact me?&lt;/p></description></item><item><title>Syria: "Majeed"</title><link>http://usable.tools/personas/sy_majeed/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/sy_majeed/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Majeed is a civil society activist who works with a &lt;strong>large network&lt;/strong> of Syrian activists involved in efforts to advocate for democracy. He is well respected within this community.&lt;/p>
&lt;p>He needs to use a plethora of &lt;strong>communication applications&lt;/strong> to coorainate with activists and influencers. Communication is critical to their cause and success.&lt;/p>
&lt;p>Majeed is most concerned that he will become a &lt;strong>target&lt;/strong> of the Syrian government and their allies.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Majeed needs to maintain contact with many activists, but wants to &lt;strong>reduce the number of applications&lt;/strong> he uses.&lt;/p>
&lt;p>He also needs to reduce the &lt;strong>risks&lt;/strong> he faces and exposes others to.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>He is afraid that personal information or incriminating data about him or his network will be &lt;strong>exposed&lt;/strong>.&lt;/p>
&lt;p>He is worried about &lt;strong>losing contact&lt;/strong> with people due to application deprecation.&lt;/p>
&lt;p>It is also possible that Majeed&amp;rsquo;s devices could be &lt;strong>lost or confiscated&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Majeed is computer and mobile literate and is also aware of &lt;strong>digital threats&lt;/strong>.&lt;/p>
&lt;p>He is well respected and is considered a &lt;strong>leader&lt;/strong> in the community.&lt;/p>
&lt;p>He is not dependent on the &lt;strong>government internet&lt;/strong>.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>There are so many &lt;strong>communication applications&lt;/strong> out there. How do I know which is the best?&lt;/p>
&lt;p>The more applications I use, the more I am &lt;strong>exposed to risk&lt;/strong> if one is compromised. How can I mitigate that?&lt;/p></description></item><item><title>Syria: "Marwa"</title><link>http://usable.tools/personas/sy_m/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/sy_m/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Marwa is a 20-year-old journalist who grew up in Syria, later moving to a neighboring country due to increased violence in her region.&lt;/p>
&lt;p>This experience has made her &lt;strong>resilient and quick to adapt&lt;/strong>. Although she has fled the physical danger of conflict in Syria, she now faces new threats because of her profession, from &lt;strong>targeted surveillance&lt;/strong> to &lt;strong>advanced malware&lt;/strong>, as well as an increasing number of border skirmishes and &lt;strong>assassination attempts&lt;/strong> on journalists.&lt;/p>
&lt;p>She uses a wide-range of applications, but most notably Facebook, to share her stories with a broader audience inside and outside of Syria. She is often willing to take risks and has been &lt;strong>desensitized&lt;/strong> to a point where securing her data is not a high priority most of the time.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She needs to &lt;strong>communicate and share&lt;/strong> what is happening in Syria as efficiently as she can, sometimes as a form of criticism or dissent, but mostly to &lt;strong>disseminate information&lt;/strong> and &lt;strong>raise awareness&lt;/strong>.&lt;/p>
&lt;p>She also requires regular communication with her &lt;strong>vast network&lt;/strong> of friends and followers (some of whom she does not necessarily know personally).&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>&lt;strong>Phishing attacks&lt;/strong> and &lt;strong>malware&lt;/strong> exposure to her devices both from &lt;strong>state and non-state actors&lt;/strong>.&lt;/p>
&lt;p>&lt;strong>Surveillance&lt;/strong> of her communication by both the hostcountry and Syria and &lt;strong>misinformation&lt;/strong> about their capabilities.&lt;/p>
&lt;p>&lt;strong>Imprisonment&lt;/strong> and unintentionally putting others at risk through their connection with her, particularly family.&lt;/p>
&lt;p>Revealing networks due to &lt;strong>device confiscation&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>&lt;strong>Fearless journalist&lt;/strong> with a strong voice and a powerful message.&lt;/p>
&lt;p>Very &lt;strong>adaptable&lt;/strong> to a range of circumstances.&lt;/p>
&lt;p>Committed to returning home and supporting her people in the meantime.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I trust that what you’re telling me is true?&lt;/p>
&lt;p>How do I &lt;strong>secure my social networks&lt;/strong>? And how can communicate with my network if they don’t use a particular tool?&lt;/p>
&lt;p>Getting my message out is more important than security. What are some ways I can &lt;strong>balance&lt;/strong> this?&lt;/p>
&lt;p>How can I protect myself and my friends?&lt;/p></description></item><item><title>Uganda: "Jomeo Richard""</title><link>http://usable.tools/personas/ug_jomeo/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ug_jomeo/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Jomeo is in his late twenties and based in Uganda. He works with &lt;strong>anti-corruption&lt;/strong> groups to create &lt;strong>public awareness&lt;/strong> about the ongoing and severe violations and abuses of human rights by both public and private individuals.&lt;/p>
&lt;p>His work involves &lt;strong>monitoring and documenting human rights violations&lt;/strong> and corruption through digital media.&lt;/p>
&lt;p>He is not very experienced in the use of technology to collect sensitive information, but he has used Signal and PGP to communicate securely with his contacts. The group he works with has some technical capacity and experience with digital security.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Jomeo wants to continue to use the internet as a primary medium to expose corruption.&lt;/p>
&lt;p>He needs to &lt;strong>build his capacity&lt;/strong> to promote governance, human rights, accountability, and transparency through social media and avid blogging. He also needs to maintain a &lt;strong>secure&lt;/strong> environment to protect his work and his sources.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>He is the target of &lt;strong>intimidation&lt;/strong> and &lt;strong>harrassment&lt;/strong> by police.&lt;/p>
&lt;p>Office and home &lt;strong>raids&lt;/strong> lead to the &lt;strong>confiscation&lt;/strong> of phones, laptops, flash disks, modems, and soft and hard copies of documents by security operatives.&lt;/p>
&lt;p>&lt;strong>Surveillance&lt;/strong> is a concern, as phones have been tapped. Other concerns include &lt;strong>imprisonment&lt;/strong> and degradation of the organization.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Jomeo has previously attended &lt;strong>security trainings&lt;/strong>. He learned how to maintain strong passwords, enable 2-step verification, and how to securely communicate via encryption.&lt;/p>
&lt;p>He also backs up confidential documents to ensure &lt;strong>safe storage&lt;/strong>.&lt;/p>
&lt;p>His groups are helping keep him up-to-date with digital security measures.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What can happen to me if I am &lt;strong>arrested&lt;/strong> without my colleagues knowledge?&lt;/p>
&lt;p>How can I &lt;strong>communicate&lt;/strong> with my contacts about the arrest?&lt;/p></description></item><item><title>Uganda: "Paul Mukasa"</title><link>http://usable.tools/personas/ug-pm/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ug-pm/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Paul is LGBTI in Uganda, where it is &lt;strong>illegal&lt;/strong> and not socially accepted. He faces both &lt;strong>ostracism and physical risk.&lt;/strong>&lt;/p>
&lt;p>Paul and his organization work with politicians and civil society leaders to improve the acceptance of LGBTI issues across Uganda.&lt;/p>
&lt;p>Paul is currently leading an internal project at his organization to improve their &lt;strong>security practices&lt;/strong> - both at the organization and at many staff members&amp;rsquo; homes, they have biometric alarm systems installed after a series of break-ins and office raids where laptops were stolen. Other practices Paul is working to address are sharing laptops in the office and discouraging using cybercafes.&lt;/p>
&lt;p>Paul is between 29 and 35. He is single and lives alone, as his close family have emigrated.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>Keeping himself and his colleagues safe &amp;ndash; both at their office and their homes&lt;/p>
&lt;p>Maintaining ability to &lt;strong>advocate&lt;/strong> for social change&lt;/p>
&lt;p>Ability to have an active social and family life&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Strong social norms against LGBTI - including everyday people, religious fundamentalists, police with prejudices, and &lt;strong>illegality&lt;/strong>&lt;/p>
&lt;p>Office and home &lt;strong>raids and robberies;&lt;/strong> including the seizure of laptops. Stolen information can be sold to the media, which &amp;ldquo;out&amp;rdquo; activists publicly&lt;/p>
&lt;p>Intense government &lt;strong>surveillance&lt;/strong> of activist and NGO activity using powerful tools&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Paul has readily adopted many digital security practices - enabling &lt;strong>two factor authentication&lt;/strong> for accounts&lt;/p>
&lt;p>Paul has developed complex &lt;strong>operational security&lt;/strong> practices, such as having personal protocols of how to engage with new contacts in public spaces instead of at the office, to reduce associational risk.&lt;/p>
&lt;p>After recent office raids, Paul and other staff have moved to saving documents in cloud storage and not on laptops.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How do I &lt;strong>protect information&lt;/strong> against my devices being confiscated?&lt;/p>
&lt;p>How do I encourage colleagues, partners, and funders to adopt better security practices?&lt;/p></description></item><item><title>Ukraine: "Anna"</title><link>http://usable.tools/personas/ua_anna/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ua_anna/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Anna is a middle-aged woman, working for an &lt;strong>anti-corruption&lt;/strong> non-governmental organization in Ukraine. She leads many cases against high-profile corruption within the Ukrainian government.&lt;/p>
&lt;p>She &lt;strong>stores important documents&lt;/strong> on her Laptop. She uses &lt;strong>WhatsApp&lt;/strong> to communicate with her team and family. She often needs to &lt;strong>print documents&lt;/strong> in order to file legal requests.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She wants to win her cases against &lt;strong>corrupted officials&lt;/strong>.&lt;/p>
&lt;p>She wants to keep herself and her team merrnbers &lt;strong>safe&lt;/strong> from &lt;strong>state-Level actors&lt;/strong>.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Her phone was &lt;strong>stolen&lt;/strong> and then returned by a ranaom person.&lt;/p>
&lt;p>Her team conversations on WhatsApp have been repeatedly &lt;strong>leaked&lt;/strong>.&lt;/p>
&lt;p>There may be some documents on her device that could potentially &lt;strong>incriminate&lt;/strong> her and other innocent people.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Anna uses &lt;strong>full-disk encryption&lt;/strong> and all of her devices are &lt;strong>password protected&lt;/strong>.&lt;/p>
&lt;p>She uses WhatsApp for all important conversations and has &lt;strong>2-factor authentication&lt;/strong> enabled on all important accounts.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>Can someone &lt;strong>break into my device&lt;/strong> if it is locked?&lt;/p>
&lt;p>I was told that WhatsApp is safe, so how can our information be &lt;strong>repeatedly leaked&lt;/strong>?&lt;/p></description></item><item><title>Ukraine: "Maksym"</title><link>http://usable.tools/personas/ua-maksym/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ua-maksym/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Maksym is in his late twenties and works as a history teacher in Ukraine. During his free time, &lt;strong>he works as an admin and editor for a social media page&lt;/strong> of a local activist group. The group fights against city gentrification and the destruction of local parks for residential development.&lt;/p>
&lt;p>He uses his Laptop to access his personal pages and advocacy groups on &lt;strong>Facebook&lt;/strong> and &lt;strong>VKontakte&lt;/strong>. He uses &lt;strong>Telegram&lt;/strong> to communicate with his fellow activists and ephemeral online notepads (i.e. privnote.com) for sensitive communication. He uses different &lt;strong>VPN clients&lt;/strong> to access VKontakte pages that are blocked in Ukraine due to sanctions on Russia, as a large part of his audience still uses the site.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>He wants to keep his true identity secret in order to &lt;strong>protect his job&lt;/strong> as a teacher.&lt;/p>
&lt;p>He needs to me sure that his Facebook pages are &lt;strong>secure&lt;/strong> and &lt;strong>available&lt;/strong> at all times.&lt;/p>
&lt;p>He wants to &lt;strong>engage the local community&lt;/strong> in the struggLe against gentrification and corruption of city officials.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>Several members of his group have been temporarily &lt;strong>arrested&lt;/strong> in the past on fake charges and their devices were &lt;strong>confiscated&lt;/strong>. Their &lt;strong>social media pages were deleted&lt;/strong> after devices were confiscated by authorities. This caused them to lose a large portion of their audience.&lt;/p>
&lt;p>He is afraid that his &lt;strong>identity will be revealed&lt;/strong> by law enforcement or corrupt officials.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Maksym&amp;rsquo;s devices are &lt;strong>password protected&lt;/strong> and he has &lt;strong>2-factor authentication&lt;/strong> enabled on all important accounts.&lt;/p>
&lt;p>He uses Telegram for most conversations and privnote.com for sensitive communication.&lt;/p>
&lt;p>He also uses &lt;strong>aliases&lt;/strong> on all his personal social media accounts.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>Can someone &lt;strong>track me&lt;/strong> using my phone number (since you do not need to register a SIM card with a specific name in Ukraine yet)?&lt;/p>
&lt;p>What can I do to &lt;strong>protect our social media pages&lt;/strong> from being deleted if my devices were to be seized?&lt;/p></description></item><item><title>Ukraine: "Masha"</title><link>http://usable.tools/personas/ua-m/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ua-m/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Masha is based in Kyiv, and works for an NGO tracking &lt;strong>human rights violations&lt;/strong> ocurring in the contested Donetsk region of Eastern Ukraine.&lt;/p>
&lt;p>She coordinates monitoring missions of volunteers who travel into Donetsk to interview and document violations using their &lt;strong>cell phones&lt;/strong>, and return to &lt;strong>share and organize the information&lt;/strong>. Her responsibility is to plan the missions and logistics, select and send volunteers to the area, and &lt;strong>monitor their work and safety&lt;/strong>.&lt;/p>
&lt;p>Masha is an &lt;strong>experienced user&lt;/strong> of digital security tools, including &lt;strong>encrypted email&lt;/strong> and &lt;strong>password managers&lt;/strong>.&lt;/p>
&lt;p>However, the volunteer network she works with has high turn-over, and different skill levels and understanding of digital security.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>She needs the ability to &lt;strong>track the volunteers&amp;rsquo; movement&lt;/strong> in the area in real time.&lt;/p>
&lt;p>A fast, safe tool to synchronize data from volunteer smartphones, so the data does not get &lt;strong>confiscated and lost&lt;/strong>.&lt;/p>
&lt;p>Volunteers need an &lt;strong>&amp;ldquo;SOS&amp;rdquo; button&lt;/strong> for when there is no time to communicate, but need to send an alert.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>The documentation the volunteers gather is &lt;strong>very sensitive&lt;/strong> to both sides of the conflict; neither side wants these facts.&lt;/p>
&lt;p>To preserve the information and keep the volunteers safe, they need to &lt;strong>remove the data from the mobile phone&lt;/strong> as fast as possible, as the &lt;strong>devices may be seized&lt;/strong> at any moment.&lt;/p>
&lt;p>The situation in Donetsk is &lt;strong>unpredictable&lt;/strong>, and communications channels may go down without warning.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Advanced user who has been trained in and adopted digital security methods. She has &lt;strong>different passwords&lt;/strong> for different services, and &lt;strong>updates her software&lt;/strong> regularly.&lt;/p>
&lt;p>She uses &lt;strong>file encryption&lt;/strong> for files on her laptop, and uses gmail with &lt;strong>two-factor authentication&lt;/strong> for her email.&lt;/p>
&lt;p>The volunteers have &lt;strong>widely different levels&lt;/strong> of tech skills and need tools which are &lt;strong>fast to learn&lt;/strong> and &lt;strong>easy to use&lt;/strong>.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What happens to the information if the &lt;strong>mobile phone is confiscated&lt;/strong>?&lt;/p>
&lt;p>Can it work if &lt;strong>communications are blocked&lt;/strong> or completely cut off?&lt;/p>
&lt;p>How can I safely &lt;strong>track the location&lt;/strong> of the volunteers without revealing that information to anyone else?&lt;/p></description></item><item><title>Ukraine: "Oleksandr"</title><link>http://usable.tools/personas/ua_oleksandr/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ua_oleksandr/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Oleksandr is in his mid-thirties and works as a &lt;strong>television journalist&lt;/strong>. He covers stories in the combat areas of Eastern Ukraine.&lt;/p>
&lt;p>He uses his mobile phone and iPad for &lt;strong>communicating with colleagues&lt;/strong>, sources, and others. He also &lt;strong>takes photos&lt;/strong> for Facebook stories on his mobile phone and iPad and &lt;strong>stores sensitive files&lt;/strong> on his laptop.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>He wants to be sure that his communication with sources will be &lt;strong>private&lt;/strong>.&lt;/p>
&lt;p>He needs to make sure that soldiers will not be able to access his &lt;strong>sensitive files&lt;/strong> (photos, documents, etc.).&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>He has to leave his laptop in hotels and connect to &lt;strong>public WiFi&lt;/strong> near combat areas.&lt;/p>
&lt;p>His laptop can be &lt;strong>searched&lt;/strong> at the border or check-point.&lt;/p>
&lt;p>His Google and Facebook accounts could be targets of &lt;strong>phishing attempts&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Oleksandr has &lt;strong>encrypted&lt;/strong> his iPhone, iPad, and MacBook already.&lt;/p>
&lt;p>He has also attended a one-day &lt;strong>digital security training&lt;/strong>.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>How can I &lt;strong>secure communications&lt;/strong> via Gmail, Facebook, and Viber?&lt;/p>
&lt;p>Can the military get files from my laptop &lt;strong>without my password&lt;/strong>?&lt;/p></description></item><item><title>Ukraine: "Oleksandr"</title><link>http://usable.tools/personas/ua_oleksandr2/</link><pubDate>Mon, 20 May 2019 23:15:28 -0700</pubDate><guid>http://usable.tools/personas/ua_oleksandr2/</guid><description>&lt;h2 id="overview">Overview&lt;/h2>
&lt;p>Oleksandr is in his forties and works as both a lawyer and human rights defender. He is currently working on &lt;strong>legal cases of human rights violations&lt;/strong>, which involves preparing documents for international courts.&lt;/p>
&lt;p>He uses &lt;strong>2-factor authentication&lt;/strong> with Gmail, Google Drive, and Facebook. However, he is always &lt;strong>forgetting his passwords&lt;/strong>. He writes the passwords down on a sheet of paper, but still sometimes struggles with logging in to his Gmail account.&lt;/p>
&lt;p>Though he is a lawyer, he is not aware of how police are inspecting devices.&lt;/p>
&lt;h2 id="goals">Goals&lt;/h2>
&lt;p>He needs to be able to &lt;strong>store sensitive data&lt;/strong> safely.&lt;/p>
&lt;p>He also needs to be able to &lt;strong>transfer the data&lt;/strong> securely.&lt;/p>
&lt;p>He wants to make sure human rights defenders are not &lt;strong>imprisoned&lt;/strong>.&lt;/p>
&lt;h2 id="threats">Threats&lt;/h2>
&lt;p>His laptop, smart phone, or flash drives could be &lt;strong>confiscated&lt;/strong>.&lt;/p>
&lt;p>At the border, authorities could gain access to his devices.&lt;/p>
&lt;p>He could be the target of &lt;strong>malware&lt;/strong> or &lt;strong>phishing attacks&lt;/strong>.&lt;/p>
&lt;h2 id="strengths">Strengths&lt;/h2>
&lt;p>Oleksandr has &lt;strong>encrypted&lt;/strong> his laptop using Bitlocker.&lt;/p>
&lt;p>Both his laptop and smart phone are &lt;strong>password protected&lt;/strong>.&lt;/p>
&lt;p>He knows the laws and can access &lt;strong>remote IT support&lt;/strong> when needed.&lt;/p>
&lt;h2 id="questions">Questions&lt;/h2>
&lt;p>What happens if I &lt;strong>lose my password&lt;/strong> again?&lt;/p>
&lt;p>What happens to all of my data if my laptop or smart phone is &lt;strong>confiscated&lt;/strong>?&lt;/p>
&lt;p>What happens if my laptop or smart phone is &lt;strong>infected with malware&lt;/strong>?&lt;/p></description></item><item><title>SOUPS 2019 Workshop Designing for the Extremes of Risk</title><link>http://usable.tools/events/usable-at-soups/</link><pubDate>Thu, 17 Jan 2019 23:50:48 -0700</pubDate><guid>http://usable.tools/events/usable-at-soups/</guid><description>&lt;h3 id="the-usable-project-team-will-host-a-workshop-at-soups-2019httpswwwusenixorgconferencesoups2019">The USABLE Project team will host a workshop at &lt;a href="https://www.usenix.org/conference/soups2019">SOUPS 2019&lt;/a>!&lt;/h3>
&lt;p>This workshop will cover how to adapt UX design and user feedback collection techniques when working with high-risk communities, through an overview of the different marginalized groups and their needs that the USABLE.tools project have worked with from around the world over the past 2 years.&lt;/p>
&lt;p>The USABLE.tools project builds feedback loops around the globe by connecting at-risk communities with digital security trainers, usability experts, and security tool developers. USABLE has worked with over 50 trainers and engaged end users in high-risk areas, and supported open source security and privacy tools with funding as well as direct design and implementation support to take this feedback and incorporate it into their tools through human-centered design processes.&lt;/p>
&lt;p>Representatives from the project will discuss their methodology and outcomes from working with regional and local digital security trainers from around the world to gather feedback and build personas to represent marginalized, vulnerable, and other at-risk communities.&lt;/p>
&lt;h3 id="call-for-presentations">Call for Presentations&lt;/h3>
&lt;p>We welcome community input (via a simplified Call for Papers/Projects) to present on similar topics and then via breakout groups discuss open questions around building lasting structures to help designers and tool developers responsibly solicit and implement feedback from at-risk populations.&lt;/p>
&lt;p>Please submit a short summary (less than 1000 words, approximately 2 pages) of your work, with references/websites/papers linked if relevant, and what topic you&amp;rsquo;d want to present on during the workshop to &lt;a href="mailto:Connect+CFP@usable.tools">Connect+CFP@usable.tools&lt;/a>, plaintext/markdown formats preferred, PGP keys for encryption available on request.&lt;/p>
&lt;ul>
&lt;li>Workshop paper submission deadline: Friday, May 30, 2019&lt;/li>
&lt;li>Workshop paper acceptance notification to authors: Saturday, June 8, 2019&lt;/li>
&lt;li>Workshop camera-ready papers due: Wednesday, June 19, 2019&lt;/li>
&lt;/ul>
&lt;h3 id="logistics">Logistics&lt;/h3>
&lt;p>USENIX will be charging a registration fee ($75 per half day tutorial/workshop, $150 for full day) this year.&lt;/p>
&lt;p>All USABLE project events are governed by our &lt;a href="http://usable.tools/codeofconduct">Code of Conduct&lt;/a>. In addition, SOUPS is governed by the &lt;a href="https://www.usenix.org/conferences/coc">USENIX Code of Conduct&lt;/a>.&lt;/p></description></item><item><title>Announcing New USABLE Personas</title><link>http://usable.tools/blog/2018-12-28-new-usable-personas/</link><pubDate>Fri, 28 Dec 2018 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2018-12-28-new-usable-personas/</guid><description>&lt;p>&lt;strong>Through a series of regional User Experience (UX) Workshops, the USABLE project is enhancing digital security trainers’ understanding of specific usability roadblocks that hinder adoption of important security practices for the highest risk groups across the globe and how to capture and articulate these challenges to tool developers.&lt;/strong>&lt;/p>
&lt;p>&lt;a href="http://usable.tools/personas/sd_fatima" title="Persona: Fatima from Sudan">&lt;img src="http://usable.tools/images/personas/sd-fatima.png" alt="Persona: Fatima from Sudan" style="float: right; margin: .5em; border: 0; width: 30%"/>&lt;/a>&lt;strong>Personas&lt;/strong>, or general profiles or snapshots of end users, play an important role in the design process and allow developers (who are largely male and based in the U.S. and Europe) to better understand the needs and use-cases for their products in some of the most challenging environments in the world. Too often developers in the open source community rely on assumptions from their respective locations and experiences, which is dramatically different from the lived experiences of high-risk groups using their products. Whether they are designing for a human rights activist in China or a journalist reporting on the frontlines in Crimea, for developers to design products that are useful and usable, they must better understand who their users are, their motivations, and willingness to adopt such important security tools.&lt;/p>
&lt;p>&lt;a href="http://usable.tools/personas/cu_yasmany" title="Persona: Yasmany from Cuba">&lt;img src="http://usable.tools/images/personas/cu-yasmany.png" alt="Persona: Yasmany from Cuba" style="float: left; margin: .5em; border: 0; width: 30%"/>&lt;/a> During the five regional UX Workshops, trainers learned how to create and use personas to communicate with tool developers. These personas include a brief description of the user, along with a summary of their goals, strengths, and threats they face. It also includes questions from the user about specific tools or security concerns, giving the developer insight into the users’ mental model around security in general.&lt;/p>
&lt;p>&lt;a href="http://usable.tools/personas/ky_alexandria" title="Persona: Alexandria from Kenya">&lt;img src="http://usable.tools/images/personas/ky-alexandria.png" alt="Persona: Alexandria from Kenya" style="float: right; margin: .5em; border: 0; width: 30%"/>&lt;/a>Trainers were also given time during the workshop to create their own personas based on specific communities with whom they are working. Following the workshops, the USABLE team worked with several of the trainers to finalize their personas and format them for publication. &lt;strong>6 personas from Southeast Asia, 5 from Europe and Eurasia, 4 from the Middle East and Northern Africa, 3 from Sub-Saharan Africa, and 3 from Latin America were published and are now available at &lt;a href="http://usable.tools/personas">usable.tools/personas&lt;/a>.&lt;/strong>&lt;/p>
&lt;p>&lt;strong>From LGBTQI advocates to journalists, these personas capture a variety of user backgrounds, experiences, and needs. The goal is that developers will be able to use these personas to better understand the individuals using their tools, and will then be positioned to make more informed design choices that ultimately make tools more secure and accessible for high-risk users.&lt;/strong>&lt;/p></description></item><item><title>UXForum 2018: Dublin, Ireland</title><link>http://usable.tools/events/uxforum-2018/</link><pubDate>Fri, 20 Jul 2018 23:50:48 -0700</pubDate><guid>http://usable.tools/events/uxforum-2018/</guid><description>&lt;p>The second UXForum took place in Dublin, Ireland in July 2018. The event brought together human rights defenders, digital security trainers, design experts, and software developers to discuss how to capture and integrate user feedback from high-risk communities on digital security tools, and make those tools stronger and more effective as a result. Over 20 different countries were represented at the event.&lt;/p>
&lt;p>Over eight tool team representatives, from password managers to VPN tools, attended the event and had opportunities to directly connect and understand security challenges at risk groups across the globe face when doing their work.&lt;/p>
&lt;p>The first two days of the UXForum focused exclusively on the Internet Freedom community. Digital security trainers, UX experts, and open source privacy and security tool developers began by discussing larger themes, such as localization, accessibility, and transparency. Tool teams were also given time to connect directly with individuals using their tools. During these sessions, developers were able to share some of their priorities for improvements as well as answer questions and collect feedback from users. A series of discussions happened during the first two days. Topics covered included, but were not limited to:&lt;/p>
&lt;ul>
&lt;li>Additional Use Cases for Personas&lt;/li>
&lt;li>Effective Ways for Communicating Feedback to Developers&lt;/li>
&lt;li>Designing for Users with Disabilities&lt;/li>
&lt;li>Documentation and User Onboarding&lt;/li>
&lt;li>Sustaining Tool Usage Post-Trainings&lt;/li>
&lt;/ul>
&lt;p>The final two days consisted of more structured panel discussions. These sessions were also open to private sector attendees. The President of Internews Jeanne Bourgault provided the opening keynote address. The following two days were filled with dynamic and informative panels covering topics ranging from designing for extremes to understanding security challenges in context.&lt;/p>
&lt;p>The Forum was impactful for all attendees and the small scale of the gathering allowed for the diverse attendees to easily connect with one another. For several tool developers, this was the first time they had connected with non-Western users.&lt;/p>
&lt;p>Additional financial support for the UXForum was received from Facebook, Balsamiq, and the Ford Foundation. This support allowed the USABLE team to bring additional digital security trainers representing diverse backgrounds.&lt;/p></description></item><item><title>USABLE at RightsCon 2018</title><link>http://usable.tools/events/usable-at-rightscon-2018/</link><pubDate>Thu, 17 May 2018 23:50:48 -0700</pubDate><guid>http://usable.tools/events/usable-at-rightscon-2018/</guid><description>&lt;p>The USABLE team led two sessions at RightsCon 2018 in Toronto. The first of these sessions, entitled, “Making the Tech USABLE &amp;ndash; how to gather and share user feedback from our digital security trainings,” was co-facilitated with Defend Defenders, one of our partners in East Africa, and a trainer from the East Africa UX Workshop. The session consisted of a UX Activity for feedback collection, where participants were split into smaller groups and acted as training participants, providing feedback on five specific tasks in the Signal app. After completing these tasks on the app, the participants provided feedback using a 1-5 scale on the difficulty in completing those tasks. After the activity, the groups came together to exchange feedback on the tool as well as the usefulness of the UX Activity itself.&lt;/p>
&lt;p>The second session co-led with, the Design Lead at Access Now, was a UX/Tech Meet-up. The goal of the meetup was to connect talents across sectors and to share experiences and lessons from existing projects. Everyone introduced themselves to the group and explained their interest in/experience with UX/UI. The group then divided and focused in on two themes. One group focused on specific resources (either existing or needed) that could be used within the UX context, while the other focused on highlighting tangible opportunities for collaboration among those attending the meetup.&lt;/p>
&lt;p>The sessions at RightsCon, along with various side meetings, provided a space to create connections, introduce USABLE to new tool teams and individuals, and advertise for the second UXForum, which happened just a few months after RightsCon.&lt;/p></description></item><item><title>USABLE at RightsCon Toronto</title><link>http://usable.tools/blog/2018-05-10-usable-at-rightscon/</link><pubDate>Thu, 10 May 2018 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2018-05-10-usable-at-rightscon/</guid><description>&lt;p>In response to the emerging security and privacy concerns in product and user experience design, we would like to invite you to the &lt;a href="https://rightscon2018.sched.com/event/Eo4i/uxtech-meetup-at-rightscon">UX/Tech Meetup at RightsCon Toronto&lt;/a> on behalf of Internews and Access Now.&lt;/p>
&lt;p>This meetup will be on Thursday, May 17th, 2018 from 1:20pm to 2:20pm in Demo Room.&lt;/p>
&lt;p>Our theme for the meetup is how technologies can better protect people’s digital rights with user research and strategic design thinking. We are hoping to connect talents across sectors, share experience and lessons from existing projects, and combine efforts and identify collaboration opportunities. If you have any ideas you would like to share or topics to discuss, you are more than welcome to bring them to the meetup.&lt;/p></description></item><item><title>USABLE at the Internet Freedom Festival</title><link>http://usable.tools/blog/2017-03-03-usable-at-iff/</link><pubDate>Fri, 03 Mar 2017 11:00:00 +0000</pubDate><guid>http://usable.tools/blog/2017-03-03-usable-at-iff/</guid><description>&lt;p>The USABLE team is excited to be gearing up for the Internet Freedom Festival this year to contiue sharing lessons learned by developers looking to listen and engage with their users. Internews will be co-hosting the session with web accessibility expert, Nancy Reyes of HearColors Mexico, to talk about the biggest takeaways developers are learning as they continue with user-testing and exploring different ways to engage with their target users, how they are turning user feedback into concrete usability improvements, as well as the intersectionality of usability and accessibility and why it&amp;rsquo;s important. The conversation will be led by our UXFund grantees, including &lt;a href= "https://www.mailvelope.com/en">Mailvelope&lt;/a>, &lt;a href= "https://martus.org">Benetech&lt;/a>, &lt;a href= "https://www.peerio.com">Peerio&lt;/a>, &lt;a href= "http://operatorfoundation.org">Operator Foundation&lt;/a>, and &lt;a href= "http://leastauthority.com">Least Authority&lt;/a>.&lt;/p>
&lt;p>The session, &lt;a href="https://internetfreedomfestival.org/wiki/index.php/Usable_and_Accessible_Security_--_lessons_learned_by_engaging_with_users">Usable and Accessible Security &amp;ndash; Lessons Learned by Engaging with Users&lt;/a>, will be on &lt;strong>Monday (March-6) from 5:00 - 6:00pm in the Attic&lt;/strong> at the IFF venue.&lt;/p>
&lt;p>Hope to see you all there!&lt;/p></description></item><item><title>Announcing the UXFund Results!</title><link>http://usable.tools/blog/2016-12-28-uxfund-results/</link><pubDate>Wed, 28 Dec 2016 08:00:00 +0000</pubDate><guid>http://usable.tools/blog/2016-12-28-uxfund-results/</guid><description>&lt;p>The USABLE team is proud to announce the UXFund results for the small, but targeted usability enhancement grants. Many great proposals were received and, after a thorough review process, five organizations for short-term awards were selected. A core component of all grants will be to more directly engage and listen to users, so tool creators can better understand and implement usability improvements that are needed from high-risk communities across the globe.&lt;/p>
&lt;p>Profiles of the UXFund grantees can be found below:&lt;/p>
&lt;img src="http://usable.tools/images/logos/mailvelope-logo.png" alt="Mailvelope Logo" style="float: left; margin: .5em; width: 30%"/>
Mailvelope -- https://www.mailvelope.com
&lt;a href="https://www.mailvelope.com/en/about">Mailvelope&lt;/a> is a free browser plugin for Chrome and Firefox that enables end-to-end encryption that integrates directly with your web-based mail provider, whether you are using Gmail, Yahoo! Mail, or Microsoft webmail. Mailvelope is an open-source project currently hosted on github (https://github.com/mailvelope/mailvelope).
&lt;img src="http://usable.tools/images/logos/martus.png" alt="Martus Logo" style="float: left; margin: .5em; width: 30%"/>
Martus (product of Benetech) -- https://martus.org
&lt;a href="https://martus.org/overview.html">Martus&lt;/a> is a free, open source, secure information collection and management tool that empowers human rights activists to effectively collect, store and transfer potentially sensitive information. Martus enables more secure information management and backups for groups and individuals across the globe.
&lt;img src="http://usable.tools/images/logos/Peerio_Logo.png" alt="Peerio Logo" style="float: left; margin: .5em; width: 30%"/>
Peerio -- https://www.peerio.com
&lt;a href="https://www.peerio.com/security.html">Peerio&lt;/a> is an end-to-end encrypted communication client that works on both desktop and mobile phone. The client allows users to setup an account for free, with paid premium versions. Peerio is an open-source project currently hosted on github (https://github.com/PeerioTechnologies/peerio-client).
&lt;img src="http://usable.tools/images/logos/operatorLogo.png" alt="Operator Foundation Logo" style="float: left; margin: .5em; width: 30%"/>
Postcard (product of Operator Foundation) -- http://operatorfoundation.org
&lt;a href="http://operatorfoundation.org/projects">Postcard&lt;/a> is an open-source and free encrypted email client with a simple user-interface for maximum ease-of-use. Postcard is free and open-source and is currently hosted on github (https://github.com/OperatorFoundation/Postcard).
&lt;img src="http://usable.tools/images/logos/gridsync-logo.svg" alt="Gridsync Logo" style="float: left; margin: .5em; width: 30%"/>
Gridsync (product of Least Authority) -- https://leastauthority.com
&lt;a href="https://github.com/gridsync/gridsync">Gridsync&lt;/a> aims to provide a cross-platform, graphical user interface for Tahoe-LAFS, the Least Authority File Store that allows for backing up local files, synchronizing directories between devices, and sharing files and storage resources with other users across all major desktop platforms (GNU/Linux, Mac OS X, and Windows). Gridsync is a free and open-source software that is hosted on github (https://github.com/gridsync/gridsync).
&lt;p>If you are interested in working to help any of these organizations or getting involved in supporting the USABLE project, please &lt;a href="mailto:connect@usable.tools">contact us!&lt;/a>&lt;/p></description></item><item><title>USABLE Updates, Resources and more!</title><link>http://usable.tools/blog/2016-09-19-followingup/</link><pubDate>Tue, 20 Sep 2016 11:49:01 +0000</pubDate><guid>http://usable.tools/blog/2016-09-19-followingup/</guid><description>&lt;p>We can&amp;rsquo;t believe it&amp;rsquo;s been two months since the UXForum! To be fair, we had a lot of sleep to catch up on, and there have been some exciting staff transitions over on our team.&lt;/p>
&lt;p>Going forward, Megan (&lt;a href="mailto:Megan@usable.tools">Megan@usable.tools&lt;/a>) will be leading USABLE while Jon takes on directorship of our global portfolio (including supporting USABLE!). We are also onboarding additional program support to help out.&lt;/p>
&lt;img src="http://usable.tools/images/blog/persona.jpg" alt="Sample Persona" style="float: right; margin: .5em;"/>
&lt;p>We&amp;rsquo;ve added a massive &lt;a href="http://usable.tools/resources">Resources page&lt;/a> that captures a ton of links and references from the UXForum, our reading lists, and more.&lt;/p>
&lt;p>We also have some new &lt;a href="http://usable.tools/personas">User Personas&lt;/a> we&amp;rsquo;ve put together from the UXForum and TFT work with our communities. These personas represent a wide variety of users of digital security tools facing a mix of threat actors.&lt;/p>
&lt;p>We have created these from many common shared experiences, but for the privacy of our communities, none are 1:1 connected, and all are created from a combination of people and the work they do. The photos are public domain or Creative Commons stock photography, and the names are of course made up.&lt;/p>
&lt;p>We are working with a few teams to support UX walkthroughs, accessibility, and user testing of open source digital secutrity tools! We will be focusing on our UXFund grantees first, but please ping us at &lt;a href="mailto:connect@usable.tools">&lt;a href="mailto:connect@usable.tools">connect@usable.tools&lt;/a>&lt;/a> if you are a tool developer and are interested in this &amp;ndash; and also check Open Technology Fund&amp;rsquo;s &lt;a href="https://www.opentech.fund/lab/usability-lab" target="_blank">Usability Lab&lt;/a> they run in partnership with &lt;a href="https://simplysecure.org">SimplySecure&lt;/a>.&lt;/p></description></item><item><title>Power to the Users -- From trainings to the UXForum and onwards.</title><link>http://usable.tools/blog/2016-09-15-powertotheusers/</link><pubDate>Tue, 20 Sep 2016 11:35:00 +0000</pubDate><guid>http://usable.tools/blog/2016-09-15-powertotheusers/</guid><description>&lt;p>Three years ago, I led a digital security training for independent media in Kyiv during the peak of the EuroMaidan protests. &lt;a href="https://medium.com/local-voices-global-change/what-good-are-secure-communications-tools-if-no-one-uses-them-690ce2bdf9ec#.hla4lsxya">It didn&amp;rsquo;t go as planned&lt;/a>.&lt;/p>
&lt;p>This spring, we returned. We worked with an amazingly skilled trainer who led the local &lt;a href="https://dss380.org/">Digital Security School&lt;/a> which had since emerged thanks to the hard work of &lt;a href="https://equalit.ie/">eQualit.ie&lt;/a>, and we brought together an amazing community of experts and practitioners who face complex challenges in their work as they dealt with the repercussions of the post-Maidan Ukrainian reality. This alone would have made for a successful training; but our goal with USABLE is to scale beyond this and get to underlying problems around tool uptake. So, we also brought a designer (who is now leading frog design&amp;rsquo;s social impact team) and a developer who led a digital security tool that the community was interested in learning more about.&lt;/p>
&lt;img src="http://usable.tools/images/blog/uxforum-bigboard.jpg" alt="Notes on strong passwords and laptop security from the UXForum" style="width: 100%; height: auto;"/>
&lt;p>Building this &amp;ldquo;Tool Feedback Training&amp;rdquo; approach to connecting high-risk users and tool developers through the training and design process, and the results we have already achieved, has been an amazing journey. It may &amp;ndash; and should &amp;ndash; seem simple, but the complexities of making that precise connection is far too often presumed, but not actually done. Real people facing very specific and complex security challenges become an amorphous &amp;ldquo;they.&amp;rdquo; &amp;ldquo;They&amp;rdquo; needs many things from constant, bleeding-edge security improvements to changes supporting very specific use cases; but it turns out that if you actually engage the people beyond the &amp;ldquo;they&amp;rdquo; - that you learn real, often simple, changes in user experience are the path forward.&lt;/p>
&lt;p>The Kyiv training followed tightly on the heels of another, and we then went on to test this approach out in 5 total communities across the globe, from LGBTI activists to election monitors to media activists to women journalists to persons with disabilities. Each training blew our minds in new and amazing ways. Can the tool protect you against both censorship and intense surveillance? Can it be used with a screen reader? Does it work offline if the network is shut down?&lt;/p>
&lt;p>&lt;strong>&lt;a href="https://medium.com/local-voices-global-change/protecting-high-risk-tech-users-a-movement-for-usability-afd5fde58c2b#.5h2s5njw5">Hear from some of the digital security trainers we worked with directly&lt;/a>&lt;/strong>&lt;/p>
&lt;p>After these events across the world and thanks to our funders, including the Department of Human Rights and Labor, Yahoo! and Vodafone, we were able to bring the facilitators and many of the participants back together for a week-long event in San Francisco - the first ever UXForum for digital security tools. The Forum brought the trainers, designers, developers, and at least one community member from each of our Tool Feedback Trainings, as well as inviting in additional members of the open source and corporate communities. We worked through difficult problems impacting all of the communities, shared stories and threats faced, and mapped out ways to move forward - how to better connect users, trainer, and developers, how to weave user testing into trainings effectively, and developers and designers worked on paper prototypes and explored using their tools through screen readers. Yahoo! even hosted the trainers and community representatives to share their experience at Yahoo! and visit with Yahoo&amp;rsquo;s UX and Accessibility labs - read more on &lt;a href="https://yahoobhrp.tumblr.com/post/148985458174/security-and-product-design-with-human-rights-in">Yahoo&amp;rsquo;s Tumblr&lt;/a>.&lt;/p>
&lt;p>The week closed with some clear next steps and, at the open-to-the-public &amp;ldquo;UX in a High Risk World&amp;rdquo; event; the opening of the UXFund, targeting usability enhancements to open source digital security tools committed to user engagement throughout the process. The Fund&amp;rsquo;s first round closes at the end of this month &amp;ndash; apply at &lt;a href="http://usable.tools/uxfund">/uxfund&lt;/a>!&lt;/p></description></item><item><title>UXFund: Extended to September 30!</title><link>http://usable.tools/blog/2016-09-15-uxfundextension/</link><pubDate>Thu, 15 Sep 2016 20:21:01 +0000</pubDate><guid>http://usable.tools/blog/2016-09-15-uxfundextension/</guid><description>&lt;p>We are extending the UXFund deadline for two more weeks - through Sep. 30! &lt;a href="http://usable.tools/uxfund">Apply Today!&lt;/a>.&lt;/p></description></item><item><title>User Testing in Digital Security Training</title><link>http://usable.tools/blog/2016-07-07-usertesting/</link><pubDate>Thu, 07 Jul 2016 10:47:00 +0000</pubDate><guid>http://usable.tools/blog/2016-07-07-usertesting/</guid><description>&lt;p>During our first Tool Feedback Training, we faced some natural reluctance to &amp;ldquo;complain&amp;rdquo; about a tool being trained upon, which was magnified by the effect of having a representative from the tool in the training. To accommodate this, we leveraged the high number of facilitators during each hands-on activity to gather observational data. The trainer would set a short goal (create an account, create a record, share a record), and the participants would work in small groups to accomplish this task, with a facilitator observing each group to note where confusion or problems were occurring. To balance this with maintaining the flow of the training, the facilitators would keep each group from floundering, and the trainer would review the process for everyone before moving onwards.&lt;/p>
&lt;img src="http://usable.tools/images/blog/TFT-usertesting.jpg" alt="" style="width: 100%; height: auto;"/>
&lt;p>This essentially provided user testing during the &lt;a href="https://www.level-up.cc/leading-trainings/preparing-ADIDS-sessions/" target="_blank">ADIDS&lt;/a> &amp;ldquo;deepening&amp;rdquo; stage by encouraging exploration to achieve these goals. Between activities, the facilitators could dive in and ask more about the problematic parts of the process without embarrassing either the tool developer or individual participants.&lt;/p>
&lt;p>We brought this same strategy to the second TFT, and had challenges working across language barriers. This approach requires both a hands-on session with very definable &amp;ldquo;steps&amp;rdquo;, and a grouping structure that also works with the participants, the size of the group, and any translation needs.&lt;/p>
&lt;p>We approached this slightly differently at each training, and it provided valuable insights into tool usability with specific pain-points from users. Some version of this could be worked into the broader digital security training process to create a feedback loop from trainers, representing their participants, and tool developers.&lt;/p>
&lt;p>At the &lt;a href="http://usable.tools/uxforum.html">UXForum&lt;/a> next week we will be talking about how different approaches worked across the different communities we worked with to find any common approaches to recommend.&lt;/p></description></item><item><title>Yahoo!</title><link>http://usable.tools/blog/2016-08-15-yahoo/</link><pubDate>Thu, 07 Jul 2016 10:47:00 +0000</pubDate><guid>http://usable.tools/blog/2016-08-15-yahoo/</guid><description>&lt;p>Thanks to our friends over at &lt;a href="https://yahoobhrp.tumblr.com/post/148985458174/security-and-product-design-with-human-rights-in" target="_blank">Yahoo!&lt;/a> for a great blog post outlining their amazing support of our work!&lt;/p>
&lt;h2 id="security-and-product-design-with-human-rights-in-mind">Security and Product Design with Human Rights in Mind&lt;/h2>
&lt;p>&lt;em>By Katie Shay, Legal Counsel, Business &amp;amp; Human Rights&lt;/em>&lt;/p>
&lt;p>Cross-posted from &lt;a href="https://yahoobhrp.tumblr.com/post/148985458174/security-and-product-design-with-human-rights-in" target="_blank">Business &amp;amp; Human Rights, &lt;a href="https://twitter.com/YahooBHRP">https://twitter.com/YahooBHRP&lt;/a>&lt;/a>&lt;/p>
&lt;p>Twelve security trainers, tool developers and human rights activists from four continents came to our headquarters in Sunnyvale, California. Their mission? To share their unique perspectives with our Yahoo products, engineering, security, public policy and legal teams. Yahoo’s Business &amp;amp; Human Rights Program, the Paranoids and Yahoo for Good orchestrated this ‘hack of the minds’ in partnership with Internews and the USABLE Project.&lt;/p>
&lt;p>USABLE Project’s aim is to inform the development of security tools that are easy to use and simple to understand for users from diverse backgrounds and skill levels. Their goal is to support vulnerable populations around the world who use the internet for more than just sharing pictures of cats or Venmoing a friend for lunch. In many cases, these users rely on the internet to exercise their right to free expression, expose corruption or fight against injustice in their communities. For these users, the ability to be secure online is critical.&lt;/p>
&lt;p>In July, Yahoo was proud to sponsor the USABLE Project’s first ever public forum, UX in a High Risk World in San Francisco, bringing together frontline digital security practitioners, users, tool developers and UX experts from around the world. In addition, Yahoo participated in the final day of USABLE’s four-day closed-door workshop leading up to this event, working directly with this community to build concrete, actionable roadmaps to improve usability in security tools.&lt;/p>
&lt;p>Following the forum, the delegation from USABLE that visited Yahoo shared their on-the-ground perspective on why remaining secure online is so important to their work. They explained how they use Yahoo products, including Flickr and Mail, why it’s important to have a principled approach to responding to government requests for user data and content moderation, as well as the importance of baking in security features to products from the outset by turning them on by default. These visionary leaders are working toward solutions for activists facing censorship, hacking, surveillance and suppression in some of the world’s most challenging environments.&lt;/p>
&lt;p>During the delegation’s visit, our Yahoo teams asked pointed questions to understand the experience of some of our most vulnerable users and to explore how their experiences might inform Yahoo’s product development and online security work.&lt;/p>
&lt;p>We are grateful to the USABLE team for sharing their stories with us, and for inspiring our teams to continue to find new and innovative ways to put our users first!&lt;/p></description></item><item><title>Protecting High-Risk Tech Users: A Movement for Usability</title><link>http://usable.tools/blog/2016-07-06-protecting-high-risk-users/</link><pubDate>Wed, 06 Jul 2016 15:01:01 +0000</pubDate><guid>http://usable.tools/blog/2016-07-06-protecting-high-risk-users/</guid><description>&lt;p>&lt;strong>Connecting developers with users improves tools for human rights defenders&lt;/strong>&lt;/p>
&lt;p>Janvier Hakizimana has a radical idea.&lt;/p>
&lt;p>“Governments and large global bodies like the United Nations subsidize new medications to fight disease. Why not also subsidize the adaptation of technology so that it can meet the needs of local communities?”&lt;/p>
&lt;p>Adaptation — making tech tools more open, accessible, and customizable — matters in Janvier’s line of work. He works to support human rights defenders in the East and Horn of Africa who need secure tools to document and report human rights violations.&lt;/p>
&lt;img src="http://usable.tools/images/blog/usability-secure-apps-screen readers_Credit_Mariel Garcia M.jpg" alt="Testing the usability of secure apps through screen readers, at a USABLE training in Mexico. Credit: Mariel Garcia" style="width: 100%; height: auto;"/>
*Testing the usability of secure apps through screen readers, at a USABLE training in Mexico. Credit: Mariel Garcia M*
&lt;p>When a tool can’t adapt to local conditions — when it is entirely reliant on an internet connection, for example, users in low-connectivity areas may not be able to use it on a broad scale.&lt;/p>
&lt;p>Relying on a hodge-podge of tools that each does one thing well makes work inefficient. Worse, relying on tools that aren’t secure puts high-risk communities in danger.&lt;/p>
&lt;p>Janvier supports human rights defenders, in part as a trainer for USABLE, a project designed to connect high-risk users of digital security and communications tools with the developers who make those tools, in order to make the tools usable.&lt;/p>
&lt;p>Next week, USABLE will hold its first UX Forum in San Francisco, bringing digital security trainers and activists from Africa, Latin America, Eastern Europe and the Middle East with developers in the center of US tech development, for three days of hands-on collaboration. USABLE’s focus on human-centered design focuses the process on the real-world needs of activists working on sexual orientation and gender identity rights, media, democracy, and human rights in challenging and threatening environments.&lt;/p>
&lt;p>Mariel Garcia M, a technologist and USABLE trainer in Mexico, has seen first-hand the real risks for activists. “[Mexico] is a country where activists are at great risk; not just of intervention of their communications, but they’re also at risk of death, and torture.”&lt;/p>
&lt;p>And while Mariel finds activists are well aware of the risks — “If you talk to activists who have been active since the sixties, they will tell you never to speak on the phone,” she says — there are numerous road blocks to their use of secure tools.&lt;/p>
&lt;p>“Many developers and many of us would think if you have a secure tool, and your choices are secure or not secure, the activist will choose secure, but that doesn’t explain all the things that go into the decision-making process,” she says. “What if they’re the only person using that secure messaging app, and none of their friends are? Do they want to invest their efforts in getting everyone to adopt that tool, when they could be focusing on the next protest they’re organizing?”&lt;/p>
&lt;img src="http://usable.tools/images/blog/security-workshop-notes-braille_Credit-Mariel Garcia M.jpg" alt="Security workshop notes taken in braille. Credit: Mariel Garcia M" style="width: 100%; height: auto;"/>
*Security workshop notes taken in braille. Credit: Mariel Garcia M*
&lt;p>Being outside the tech community also hinders adoption. “You have to be in certain tech circles to know that there is this tool, or to keep up with the discussion. What if this tool stops being developed — will [the activists] ever find out? They will have been to one workshop where they heard about it, but to stay updated, you really need to be part of a tech community, and many of them don’t do any tech-related work.”&lt;/p>
&lt;p>In Ukraine, trainer Mykola Kostynyan has seen a dramatic change in awareness around digital security since the Euromaidan protests in 2013, but like Mariel, sees long-term change as a challenge for organizations.&lt;/p>
&lt;p>“Before Euromaidan we hadn’t even heard of digital security — it wasn’t an issue. Now, thousands of people have awareness after going through training. A lot of organizations are migrating corporate email to more secure systems, and storing and transferring documents in more secure ways. We can see a lot of interest. We are very far from the ideal situation, where each organization has security policy implemented and has people responsible for that. We are very far.”
The need for continuity and long-range organizational change directly supports Janvier’s idea, that adaptation of technology is worthy of broad support and investment by governments, and shouldn’t be left to one-off solutions.&lt;/p>
&lt;p>“User-friendly software development is not really promoted and well-funded,” says Janvier, giving an example of a software project that was funded for five years of development, and rolled out to the local NGO community in Uganda, but ultimately abandoned. “Instead of starting new project, we would like to have software which will be used by this generation, and improved for next generation.&lt;/p>
&lt;p>Finally, the trainers say there’s just no way to know all the needs of users without asking. Mariel recently led a USABLE workshop with activists focused on the needs of the visually impaired.&lt;/p>
&lt;img src="http://usable.tools/images/blog/Rock-Paper-Scissors-visual disability_Credit_Mariel Garcia M.jpg" alt="From a USABLE conference in Mexico, participants demonstrate an adaptation of Rock, Paper, Scissors for players with visual disability. Credit: Mariel Garcia M" style="width: 100%; height: auto;"/>
*From a USABLE conference in Mexico, participants demonstrate an adaptation of Rock, Paper, Scissors for players with visual disability. Credit: Mariel Garcia M*
&lt;p>“Most digital security trainers have plenty of experience with the difficulties that people face when they don’t have disabilities. For example we know that a certain app has this particular bug. A digital security trainer can give you a pretty exhaustive list of what goes wrong with all these tools. But not many of us are in the community that needs special tools, like audio readers [for the visually impaired]. It brings interesting security risks. For example, how do the visually impaired use secure applications if the buttons are not properly tagged for screen readers to read aloud?”&lt;/p>
&lt;p>Tools made with accessibility in mind are not necessarily made with security in mind, and vice versa, which is why building connections between users and developers is so vital.&lt;/p>
&lt;p>“I wish that people would come together more often to collaborate at all levels. So that all the valuable feedback I gathered from one tool would reach the developer, and that someone would fund that. Trainings should be more informed by the people developing the tools, who have a deeper understating of how [the technology] works. I’m really excited to see USABLE promoting this kind of collaboration. I think it’s been missing from the ecosystem,” says Mariel.&lt;/p>
&lt;p>“If I have connections with developers,” says Mykola, “I can give them some advice. And maybe try to get tool user sessions here in Ukraine independently, to test new tools and give feedback to developers — to start more than a separate event, more of a movement for usability.”&lt;/p>
&lt;p>&lt;em>Re-posted from &lt;a href="https://medium.com/local-voices-global-change/protecting-high-risk-tech-users-a-movement-for-usability-afd5fde58c2b#.gflo1gg8u">Internews&amp;rsquo; Medium blog&lt;/a>&lt;/em>&lt;/p>
&lt;p>&lt;em>&lt;a href="https://www.eventbrite.com/e/ux-in-a-high-risk-world-tickets-25739389206">UX in a High-Risk World&lt;/a> is a public event scheduled for July 14 in San Francisco, in tandem with the UX Forum. &lt;a href="https://www.eventbrite.com/e/ux-in-a-high-risk-world-tickets-25739389206">Register for the event&lt;/a>. At the event, Internews’ USABLE team will launch the UXFund Call for Proposals. &lt;a href="http://usable.tools/uxfund">UXFund&lt;/a> is a small-grants program to support usability and accessibility improvements for open-source digital security tools.&lt;/em>&lt;/p></description></item><item><title>Join us for UX in a High Risk World!</title><link>http://usable.tools/blog/2016-06-17-uxforum/</link><pubDate>Fri, 17 Jun 2016 16:57:00 +0000</pubDate><guid>http://usable.tools/blog/2016-06-17-uxforum/</guid><description>&lt;p>&lt;a href="https://eventbrite.com/e/ux-in-a-high-risk-world-tickets-25739389206" target="_blank" class="image fit">&lt;img src="http://usable.tools/images/uxhighrisk.jpg" alt="UX in a High-Risk World; Innovation Hangar, San Francisco, July 14th" />&lt;/a>&lt;/p>
&lt;p>For one night only, we are opening the doors to this event!&lt;/p>
&lt;p>Come meet the visionary leaders who are piloting and developing solutions for activists facing censorship, hacking, surveillance, and suppression in some of the world’s most challenging environments.&lt;/p>
&lt;p>&lt;a href="https://eventbrite.com/e/ux-in-a-high-risk-world-tickets-25739389206" target="_blank" class="button special">RSVP Now!&lt;/a>&lt;/p>
&lt;p>Featuring &lt;strong>Jeanne Bourgault&lt;/strong>, President, Internews with community representatives, developers, designers, and trainers including:&lt;/p>
&lt;p>&lt;strong>&lt;strong>Mykola Kostynyan – Ukraine&lt;/strong>&lt;/strong>: Mykola has trained over a thousand Ukrainian human rights defenders, journalists, and NGO activists over the past two years, working with many organizations, including the eQualit.ie Digital Security School, Internews, OSCE, IWPR, Freedom House and The ISC Project.&lt;/p>
&lt;p>&lt;strong>Mariel Garcia M – Mexico&lt;/strong>: Mariel is an ICT for change advocate. She does instructional design and training on digital security, privacy and media literacies with youth and women&amp;rsquo;s groups in Mexico. Mariel was recently featured by the &lt;a href="http://www.bbc.com/news/in-pictures-35705391" target="_blank">BBC on International Women’s Day&lt;/a>&lt;/p>
&lt;p>&lt;strong>Helen Nyinakiiza – Uganda&lt;/strong>: Helen is a trainer of safety and security tools for human rights defenders. She is a consultant for Amnesty&amp;rsquo;s Panic Button project and currently working on the USABLE workshop program by Internews. Helen participated on research publications for human rights defenders in the East and Horn of Africa and is passionate about sharing knowledge on digital security and human rights.&lt;/p>
&lt;p>P.S. At UX in a High-Risk World, Internews’ USABLE team will launch the UXFund Call for Proposals. UXFund is a small-grants program to support usability and accessibility improvements for open-source digital security tools.&lt;/p>
&lt;p>&lt;em>UX in a High-Risk World is held with support from &lt;a href="http://vodafone-us.com//technology#a-strengthening" target="_blank" class="">Vodafone Americas Foundation&lt;/a>, &lt;a href="https://www.thoughtworks.com/" target="_blank" class="">ThoughtWorks&lt;/a>, and the &lt;a href="http://www.ihangar.org/" target="_blank" class="">Innovation Hangar&lt;/a>, with community outreach support from &lt;a href="https://simplysecure.org" target="_blank" class="">Simply Secure&lt;/a>, &lt;a href="https://accessnow.org/" target="_blank" class="">Access Now&lt;/a>, and the &lt;a href="https://internetfreedomfestival.org/" target="_blank" class="">Internet Freedom Festival&lt;/a>.&lt;/em>&lt;/p>
&lt;p>Please also note our &lt;a href="http://usable.tools/codeofconduct">Code of Conduct&lt;/a>.&lt;/p></description></item><item><title>Learning how to balance design and training</title><link>http://usable.tools/blog/2016-01-22-tft/</link><pubDate>Thu, 28 Jan 2016 13:29:00 +0000</pubDate><guid>http://usable.tools/blog/2016-01-22-tft/</guid><description>&lt;p>The USABLE team is halfway through our &lt;a href="http://usable.tools/trainings.html">Tool Feedback Training&lt;/a> process, and the first two TFTs were hugely informative. We worked with groups doing amazing work while facing widely different challenges; including censorship, targeted malware, and situations where digital security problems can become physical security ones.&lt;/p>
&lt;p>One of the concerns we had going in to this process was balancing the digital security training for the participants with human-centered design exercises, which is why we spent so much time working through this during our &lt;a href="http://usable.tools/2015/11/20/securitydesigworkshop.html">Security and Design Workshop&lt;/a>.&lt;/p>
&lt;p>In both trainings however, the participants not only responded enthusiastically to the design exercises we conducted, but expressed ongoing interest in applying design thinking to their project work. The design-centric agenda items have actually meshed well with the digital security curricula, engaging participants in the design process, creating users personas, and supporting the tool developers in coming up with prototyped design changes. We&amp;rsquo;ll post soon on building user testing directly in to the training process.&lt;/p>
&lt;p>The dSchool&amp;rsquo;s &lt;a href="https://dschool.stanford.edu/groups/designresources/wiki/4dbb2/The_Wallet_Project.html" target="_blank">Wallet Exercise&lt;/a> has been very useful as a short, fun way to get into the mindset of design, as it leads you through a series of thought, listening, and feedback exercises with a partner. It - along with many of the other design exercises &amp;ndash; creates a great icebreaker effect by putting everyone on the same level as they work through a problem.&lt;/p>
&lt;p>We&amp;rsquo;ve updated the &lt;a href="http://usable.tools/trainings.html#schedule">TFT schedule&lt;/a> to better reflect how these first TFTs went - you&amp;rsquo;ll see a back-and-forth between threat modeling, design exercises, and tool trainings.&lt;/p>
&lt;table class="alt" style="color: black !important;" id="schedule">
&lt;thead>
&lt;tr>
&lt;th style="color: black !important; font-weight: bold;">Day&lt;/th>
&lt;th style="color: black !important; font-weight: bold;">Description&lt;/th>
&lt;!--&lt;th>Facilitation&lt;/th>-->
&lt;/tr>
&lt;/thead>
&lt;tbody>
&lt;tr>
&lt;td>1&lt;/td>
&lt;td>&lt;ul>
&lt;li>Project Overview and Introduction to Design&lt;/li>
&lt;li>Experience sharing: "A Day in the Life"&lt;/li>
&lt;li>Threat modeling introduction&lt;/li>
&lt;li>Digital security overview&lt;/li>
&lt;/ul>
&lt;/td>
&lt;!--&lt;td>Trainer, UX Expert&lt;/td>-->
&lt;/tr>
&lt;tr>
&lt;td>2&lt;/td>
&lt;td>&lt;ul>
&lt;li>Design exercises: "The Wallet Project"&lt;/li>
&lt;li>Persona creation and discussions about risks and tools&lt;/li>
&lt;li>Digital security tool training with participant observation feedback&lt;/li>
&lt;li>Defining expectations and requirements for digital security tools&lt;/li>
&lt;li>Digital security tool training with user testing observation and participant feedback&lt;/li>
&lt;/ul>
&lt;/td>
&lt;!--&lt;td>Trainer, UX Expert, Developer&lt;/td>-->
&lt;/tr>
&lt;tr>
&lt;td>3&lt;/td>
&lt;td>&lt;ul>
&lt;li>Further digital security training (depending on scope and complexity of tools)&lt;/li>
&lt;/ul>
&lt;/td>
&lt;!--&lt;td>Trainer, Developer&lt;/td>-->
&lt;/tr>
&lt;tr>
&lt;td>4&lt;/td>
&lt;td>
&lt;ul>
&lt;li>Review tool experience from a design perspective&lt;/li>
&lt;li>Open discussion around digital security needs&lt;/li>
&lt;li>Roadmap and prioritization of challenges&lt;/li>
&lt;li>Finalize user personas&lt;/li>
&lt;/ul>&lt;/td>
&lt;!--&lt;td>UX Expert, Developer&lt;/td>-->
&lt;/tr>
&lt;/tbody>
&lt;/table>
&lt;p>Indeed, the integration of thinking through how a tool works &amp;ndash; and how it could be improved &amp;ndash; deepened both TFTs. These opened discussions around how the tools interact with the risks that each group faced, and what features were most important for them to filter their choice of tools on. The second group even built their &amp;ldquo;top 10&amp;rdquo; (well, 14) ranked list of features around secure communication tools:&lt;/p>
&lt;ol>
&lt;li>Usable; fast and easy to set up&lt;/li>
&lt;li>Cross-platform, mobile&lt;/li>
&lt;li>Works on slow connections&lt;/li>
&lt;li>Secure by default&lt;/li>
&lt;li>Tool is consistently updated&lt;/li>
&lt;li>Sync across devices?&lt;/li>
&lt;li>Provider cannot read messages / metadata&lt;/li>
&lt;li>File transfer&lt;/li>
&lt;li>Offline support&lt;/li>
&lt;li>Open code&lt;/li>
&lt;li>Code Audits&lt;/li>
&lt;li>Perfect Forward Secrecy&lt;/li>
&lt;li>Documentation&lt;/li>
&lt;li>Localization&lt;/li>
&lt;/ol>
&lt;p>A good reminder that usability is security.&lt;/p>
&lt;!--&lt;img src="http://usable.tools/images/blog/" alt="" style="width: 100%; height: auto;"/>--></description></item><item><title>Training and Design</title><link>http://usable.tools/blog/2015-11-21-sdworkshop-trainings-and-design/</link><pubDate>Sat, 21 Nov 2015 12:09:25 +0000</pubDate><guid>http://usable.tools/blog/2015-11-21-sdworkshop-trainings-and-design/</guid><description>&lt;p>At the &lt;a href="http://usable.tools/2015/11/20/securitydesigworkshop.html">Security and Design Workshop&lt;/a>, we realized that our original plan of book-ending a classic digital security training with human centered design exercises was not ideal &amp;ndash; many elements of learning and exploration that are key to training are similarly core to collaborative design.&lt;/p>
&lt;p>To test this out, we spent one afternoon running a digital security training on mobile security. We based the training on the &lt;a href="https://www.level-up.cc/resources-for-trainers/pedagogical-resources/adult-learners">ADIDS adult-learning approach&lt;/a>, and used a selection of &lt;a href="https://www.level-up.cc">Level Up curricula&lt;/a> components, integrating human-centered design components into the flow of the training. The rest of this post will run through the components of the training and the outcomes from it.&lt;/p>
&lt;p>The ADIDS model uses a mix of engagements to help adult participants learn a specific topic, starting with an opening Activity that introduces the topic in an engaging fashion, then Discussing the topic, then the lecture/training section (&amp;ldquo;Input&amp;rdquo;), followed by a hands-on &amp;ldquo;Deepening&amp;rdquo; - often installing and using a specific tool, and closing with a Synthesis that summarizes the entire topic and answers remaining questions. (Learn more about &lt;a href="https://www.level-up.cc/leading-trainings/preparing-ADIDS-sessions">ADIDS at LevelUp&lt;/a>).&lt;/p>
&lt;p>For the beginning Activity, we used &lt;a href="https://www.level-up.cc/leading-trainings/training-curriculum/activity/internet">We are the Internet&lt;/a> (adapting it for mobile communications) by adding in participants (wearing tin-foil hats) as the cell towers.&lt;/p>
&lt;p>The Discussion and Input sessions came from the &lt;a href="https://www.level-up.cc/leading-trainings/training-curriculum/mobile-phones">private mobile communications&lt;/a> curricula set.&lt;/p>
&lt;h2 id="adding-extra-letters-to-adids---adidemdems">Adding extra letters to ADIDS - ADID&lt;em>D&lt;/em>S?&lt;/h2>
&lt;p>The training then shifted to a more human centered design process. Before jumping in to working with specific tools, we added a &amp;ldquo;Design&amp;rdquo; component &amp;ndash; asking participants to provide the design elements they would want, as well as some participants were concerned about when making a secure mobile call.&lt;/p>
&lt;img src="http://usable.tools/images/blog/design-training_comsec.jpg" alt="Secure Communication training brainstorm" style="width: 100%; height: auto;"/>
&lt;p>By having already run through some &lt;a href="http://usable.tools/2015/11/20/securitydesignworkshop.html">design &amp;ldquo;warm-up&amp;rdquo; activities&lt;/a>, the participants were able to throw out a collection of ideas for secure mobile communications relevant to our desires for easy communication and informed by the Activity, Discussion and Input sessions.&lt;/p>
&lt;p>We then moved into the deepening component, with hands-on installation and practice using the &lt;a href="https://whispersystems.org/">Signal app&lt;/a>. Signal is well-regarded as an amazingly usable app which provides high-end security without a confusing interface &amp;ndash; so it was a bit of a surprise when we discovered that there were still other improvement suggestions from the participants (in many cases due to the differing application security frameworks across iOS and Android). This underlined that even the &amp;ldquo;best in class&amp;rdquo; digital security tools can benefit from this process.&lt;/p>
&lt;p>&lt;em>(The issues we wrestled with, mainly around confusion with the different, but very small lock icons in the Android version, are already present in the Signal issue queue in various forms - &lt;a href="https://github.com/WhisperSystems/Signal-Android/issues/4390" target="_blank">Inadvertently sent insecure messages via SMS without clear notification&lt;/a> and &lt;a href="https://github.com/WhisperSystems/Signal-Android/issues/2622" target="_blank">3 different padlock icons&lt;/a> plus a mild confusion around the fact that the lock is absent in Signal on iOS, as Signal does not take over default messaging in the way it can on Android)&lt;/em>&lt;/p></description></item><item><title>Learnings from the Security and Design Workshop!</title><link>http://usable.tools/blog/2015-11-20-securitydesigworkshop/</link><pubDate>Fri, 20 Nov 2015 12:09:25 +0000</pubDate><guid>http://usable.tools/blog/2015-11-20-securitydesigworkshop/</guid><description>&lt;p>The USABLE project is built around a core commitment to listen - to users, to trainers, and to our partners. As we began assembling the team of amazing designers and usability experts we are working with, a common thread emerged around a desire to connect and frame their inputs as usability experts for the digital security space and map out how they would engage during the tool feedback trainings.&lt;/p>
&lt;p>We were able to bring together a Security and Design Workshop in mid November, thanks to the amazing generosity and flexibility of our partners and hosted in &lt;a href="https://www.thoughtworks.com/" target="_blank">ThoughtWorks&amp;rsquo; new San Francisco offices&lt;/a>. This gave the USABLE team a chance to go over operational security concerns for working with vulnerable populations and let the designers experience firsthand both some of the digital security tools we hope to work with, and the process of a digital security training. More importantly, however, was the chance to really dig in to our plans for integrating need-finding and human centered design into the digital security training process to create the &amp;ldquo;Tool Feedback Trainings&amp;rdquo; (TFTs) we envision.&lt;/p>
&lt;p>For needfinding, USABLE is integrating core aspects of the &lt;a href="http://internetfreedom.secondmuse.com/needfinding/" target="_blank">SecondMuse&amp;rsquo;s &lt;em>Internet Freedom Need Finding Toolkit&lt;/em>&lt;/a> into this process to supplement our pre-training interview and engagement processes with our local partners and trainers. Members from the SecondMuse team were able to join us and help us work through their framework and adapt it to the &lt;a href="http://usable.tools/2015/10/09/announcing-usable.html">Tool Feedback Training model in USABLE&lt;/a>. This helped us discover what information is valuable to match a community with a tool developer, as well as understanding the threats and capacity of each community that goes into digital security trainings.&lt;/p>
&lt;img src="http://usable.tools/images/blog/designworkshop-process.jpg" alt="USABLE's TFT process evolves" style="width: 100%; height: auto;"/>
&lt;p>For the rest of the workshop, we worked on integrating HCD practices into the training process. The final day began with a series of human centered design exercises led by &lt;a href="https://www.thoughtworks.com/" target="_blank">ThoughtWorks&lt;/a> that would be adaptable for the TFT scenarios, from introductory exercises to more practical ones, such as having participants design the training or manual for a tool as a way to focus the tool&amp;rsquo;s actual interface on those aspects that truly require training, as opposed to those which could be set to secure defaults, automated, or provided as &amp;ldquo;advanced&amp;rdquo; options.&lt;/p>
&lt;h3 id="learnings">Learnings&lt;/h3>
&lt;h4 id="blending-training-with-design">Blending training with design&lt;/h4>
&lt;p>Our initial vision for the TFT schedule was an approach that bookended a more traditional digital security training with a pre- and post- session on design. During the Workshop, it became clear that a fully integrated approach where design aspects were combined into the flow of the training would be much more effective. We did a test-run of this which we&amp;rsquo;ll detail in a future blog.&lt;/p>
&lt;h5 id="building-respectful-useful-personas">Building respectful, useful Personas&lt;/h5>
&lt;p>Another core learning from the Workshop was around the generation of the personas, and how to present this exercise in the TFTs in a way that respects the individuality of the participants while balancing the value of a cohesive, representative persona that has utility for developers. This will not only lead to stronger outcomes, but will provide clearer representation for niche needs and barriers that sub groups of each community might have.&lt;/p>
&lt;h4 id="unexpected-outcomes-are-exciting">Unexpected outcomes are exciting&lt;/h4>
&lt;p>Design exercises, even short, open-ended ones like the &amp;ldquo;5 ideas&amp;rdquo; aspect of the &lt;a href="https://dschool.stanford.edu/groups/designresources/wiki/4dbb2/The_Wallet_Project.html" target="_blank">Wallet Exercise&lt;/a> can also be conducted even without a specific tool in mind, as a way to enable participants to design ideal theoretical tools for themselves (through a process of interviews, risk discussions, and talking about current practices). This helps the participants and facilitators understand the community&amp;rsquo;s approach to and tolerance of risk and can reveal hidden barriers to tool adoption (such as remote connectivity, battery consumption).&lt;/p>
&lt;p>This process can also turn up local innovations to mitigate risks, and even expose gaps where no current tools are available to meet a need.&lt;/p>
&lt;p>Finally, this provides a rare security training exercise with no &amp;ldquo;wrong&amp;rdquo; answers.&lt;/p>
&lt;h4 id="how-usable-is-too-usable">How usable is too usable?&lt;/h4>
&lt;p>We also wrestled with some powerful questions that could help change discussions around the pushback against some tool usability. A classic debate has been balancing making specific complex tools easier against removing some of the deeper understanding that the users are expected to learn before using them. In response to this, ThoughtWorks&amp;rsquo; design lead asked &amp;ldquo;is this an educational tool or is it a usable tool?&amp;rdquo; This led further to potential interplay not only between the UX expert and the TFT participants, but also with the co-facilitators, to help identify the aspects of the trainings where the process tends to be &amp;ldquo;just do these 12 steps&amp;hellip;.&amp;rdquo; and identifying how to better automate or hide those processes.&lt;/p>
&lt;h4 id="preparation-and-follow-up">Preparation and follow-up&lt;/h4>
&lt;p>The workshop underlined the importance of follow-up interactions among each TFT &amp;ldquo;ground team&amp;rdquo; (Internews, the UX designer, and the trainer, with developers once identified) to provide further operational security guidance as relevant to the country and community, as well as to enable the UX expert and the trainer to co-design the need finding interviews. We will be conducting these via calls, emails, and an on-site, pre-TFT meeting of the facilitators to iron out schedules and facilitation.&lt;/p></description></item><item><title>Announcing USABLE!</title><link>http://usable.tools/blog/2015-10-09-announcing-usable/</link><pubDate>Fri, 09 Oct 2015 12:09:25 +0000</pubDate><guid>http://usable.tools/blog/2015-10-09-announcing-usable/</guid><description>&lt;p>&lt;img src="http://usable.tools/images/safe.png" style="width: 25%; height: auto;" align="right" alt="[☺]" /> We&amp;rsquo;re very excited to announce USABLE: Usable Security Apps By Leveraging End Users! USABLE, a project of &lt;a href="https://www.internews.org" target="_blank">Internews&lt;/a>, brings a human centered design lens to digital security tools through a three-phase process (detailed out below) with add-on benefits of producing community-led user personas, connecting tool developers with trainers and at-risk users, and encouraging sharing of design patterns and usability challenges along the way.&lt;/p>
&lt;p>We&amp;rsquo;re just getting started and are locking in our first communities, and expect to be running these needs-based trainings throughout early 2016. We will be sharing the user personas and learnings from these trainings over the next few months.&lt;/p>
&lt;img src="http://usable.tools/images/blog/usable-cycle.png" alt="USABLE's Approach" style="width: 100%; height: auto;"/>
&lt;h3 id="phase-i-tool-feedback-trainings">PHASE I: Tool Feedback Trainings&lt;/h3>
&lt;p>USABLE starts by working with communities around the world with concerns about privacy and digital security because of who they are or what they do. USABLE is working with local partners on a needs assessment, and then will design a digital security training based on those needs.&lt;/p>
&lt;p>This will not be a &amp;ldquo;normal&amp;rdquo; training (if indeed those even exist), as we will match-make the needs of the community with a digital security tool that addresses the security needs, and work with interested developers to send them to the training. In addition, a usability expert will also attend and co-facilitate, leading some &amp;ldquo;blue sky&amp;rdquo; design work, and helping the community craft a user persona to represent their capabilities, constraints, and desires to others.&lt;/p>
&lt;p>These trainings will work with each community through design exercises to reveal both pain-points with the tool they have focused on, but also broader insights into challenges which impact multiple digital security tools.&lt;/p>
&lt;h3 id="phase-ii-uxforum">PHASE II: UXForum&lt;/h3>
&lt;p>The second phrase brings together the facilitators and key participants from each of these Tool Feedback Trainings for a 4-day workshop to cross-share the experiences, identify low-hanging fruit, and put together roadmaps to address achievable usability improvements. This &amp;ldquo;UXForum&amp;rdquo; will take place in Summer 2016.&lt;/p>
&lt;p>At the UXForum, we will also run some sidebar conversations around formalizing design practices in trainings and working with developers.&lt;/p>
&lt;h3 id="phase-iii-uxfund">PHASE III: UXFund&lt;/h3>
&lt;p>The third phase will be providing tool developers with funding to implement usability enhancements based on these experiences, adopting a more human-centered design approach through continued engagement with design experts, and through user-testing with the communities (where safe) and trainers.&lt;/p>
&lt;h3 id="onwards">Onwards!&lt;/h3>
&lt;p>We are pursuing opportunities to expand this work even further with additional Tool Feedback Trainings, and adapting and evolving our approach as we learn more from this process. Interested in where we go next? Please get in touch a &lt;a href="mailto:contact@usable.tools">&lt;a href="mailto:connect@usable.tools">connect@usable.tools&lt;/a>&lt;/a>&lt;/p>
&lt;img src="http://usable.tools/images/blog/useable-useful.jpg" alt="Useful or Useful?" style="width: 100%; height: auto;"/></description></item></channel></rss>