Building a Vision for GnuPG

As part of the EasyGpg2016-contract we try to build a vision for the future user experience of GnuPG. This includes archetype users, some user stories and aspects how to evolve the existing certificate manager gui towards this vision.

This page started with results from a day-long meeting on the 20th of April at Intevation, Osnabrück. Participants were Andre Heinecke, Bernhard Reiter, Björn Balazs, Emanuel Schütze and Jochen Saalfeld.

Feedback appreciated, see contact points for EasyGpg2016.

Vision

Future GnuPG

With future GnuPG communication partners will typically exchange their emails and files confidentially. To achieve this, the effort needed for the user will be minimal and a number of security levels and compatible applications will be supported.

Comments:

GUI / Kleopatra

Kleopatra (as example of an UI server and GUI) will be a crypto manager providing all the power features advanced users need to manage their confidential communication. Users with lower demands will not need to enter the full application, instead Kleopatra will provide contextual dialogues for the main applications (Mail, File Manager) to either allow crypto operations on files or emails or to gather the information needed to configure private communication.

Users

Trying to formalize the users of a project is always a difficult task. We have decided to go with what we call archetypes for now:

Quality 1 vs. 10 on scale Grandma Erna Journalist John Student Annika Civil Servant Ernst Nerd Bob
Technology & crypto for me are a black box something I deeply understand 1 3 6 2 10
I use technology rarely frequently 1 7 5 4 10
My attitude towards protection of my communication "I do not have anything to hide" "Communication always has to be private" 1 7 4 7 10
Context of crypto use Privat (P) Business (B) P B+P P B B+P
Number of devices 1 4 3 2 6
Number of identities 1 2 2 1 4
Platforms: Desktop (D), Web (W), Mobile (M), Tablet (T) T D + M, W, T D, M, W, T D D, M, W, T
Motivation Laggard Early Adopter 1 5 7 3 10
Number of (pre-)existing crypto keys 0 0 1 0 3
Access to IT-Support no 24/7 1 3 4 10 8
How am I accessing the crypto functions contextually out of other apps only starting crypto gui first 1 3 6 3 9

Tasks of the Users

Following some typical tasks of the users are described and how the interaction with future GnuPG will look like

T1: Sending Mail to one recipient

Description: Annika wants to tell her University that she is sick.

User:

Comments:

Workflow:

  1. Annika starts email client on her desktop
  2. Annika selects her university identity to send mail with
  3. Annika put her professors email address into the TO: field.
    1. Automatically the public key for that address is being retrieved. A little indicator represents the security estimation of that communication process (smart integration of Tofu, WoT, individual certificate verifications,...). She could click here in order to gain more information about this state and what to do in order to improve the security estimation.
  4. She writes and sends her mail as usual.

Remarks:

T2: Communicating with a non-crypto user

Description: John wants to communicate safely with a potential whistle blower.

User:

Comments:

Workflow:

  1. John starts his email client on his desktop
  2. John chooses the right identity to send with
  3. John enters the email-address in the TO: field
    1. The system now searches for a public key, finds none and indicates this directly on the TO: field
  4. John now enters the rest of the mail and presses "Send"
  5. The system feedbacks to him, that it is not able to send encrypted (because John has defined this in the settings), why this is so and offers the following:
    1. Inform the communication partner how to set-up encryption:
      1. Send a mail with instructions
      2. Webpage with instruction to communicate via some other form (Telephone, Jabber, ...)
      3. White list this recipient as someone to not communicate encrypted to
    2. Define what to do with this mail:
      1. Send not encrypted
      2. Save
      3. Send as soon as a key is discovered
      4. Discard the current mail

Remarks:

T3: Create a new mail account after having received crypto instructions:

Description: Ernst wants to leak and discuss a memo with John.

User:

Comments:

Workflow:

  1. Following the instructions he now installs Thunderbird and Enigmail.
  2. He starts and follows the normal setup to access his new mail account
  3. After the "normal" mail setup, the dialogue asks him whether he wants to import his keys or create a new key.
  4. He chooses new key, as he has none. The keys get generated and he gets asked to choose a password to protect his key.
  5. (Maybe) he gets instructions how to backup his key and gets asked to upload his key so others can communicate safely with him.
  6. He is now ready to communicate with John.

Remarks:

T4: Installation of GPG4Win / Kleopatra

Description: Annika wants to install software to encrypt her communication.

User:

Comments:

Workflow:

  1. She download Gpg4win and start the normal installation
  2. During the installation the system shows her the new actions she can do with Gpg4win installed, namely file-actions and email actions.
  3. After successful installation of Gpg4win she can
    1. Quit the application
    2. Watch a video (?) that explains the main terms of encryption to her
      1. After watching the video she is asked to create or import her own keys (see T3)
    3. Import her keys.
    4. Last option would be to start Kleopatra.

Remarks:

T5: Configuration of an additional device

Description: John buys a new smartphone and wants access emails in parallel to his laptop.

User:

Comments:

TODO

Some corner cases

EasyGpg2016/VisionAndStories (last edited 2016-05-20 08:07:42 by EmanuelSchuetze)