Concept of EasyGpg

This page tries to summarize the ideas of the EasyGPG Concept and its relation to the existing technology, namely Kleopatra. Wherever needed, the different sections individually address both aspects.

Vision

easyGPG

With easyGPG communication partners will typically exchange their emails and files confidentially. To achieve this, the effort needed for the user will be minimal and numerous security levels and compatible applications will be supported.

Comments:

Kleopatra

Kleopatra will be a crypto manager providing all the power features advanced users need to manage their confidential communication. Users with lower demands will not need to enter to the full application, instead Kleopatra will provide contextual dialogues for the main applications (Mail, File Manager) to either allow to encrypt files or emails and to gather the information needed to configure private communication.

Users

Trying to formalize the users of a project is always a difficult task. We have decided to go with what we call archetypes for now:

Quality 1 vs. 10 on scale Grandma Erna Journalist John Student Annika Civil Servant Ernst Nerd Bob
Tecnolgogie & Crypto for me are Black Box something I deeply understand 1 3 6 2 10
I use technology rarely frequently 1 7 5 4 10
My attitude towards protection of my communication "I do not have anything to hide" "Communication always has to be private" 1 7 4 7 10
Context of crypto use Privat (P) Business (B) P B+P P B B+P
Number of devices 1 4 3 2 6
Number of identities 1 2 2 1 4
Platforms: Desktop (D), Web (W), Mobile (M), Tablet (T) T D + M, W, T D, M, W, T D D, M, W, T
Motivation Laggard Early Adopter 1 5 7 3 10
Number of existing crypto keys 0 0 1 0 3
Access to IT-Support no 24/7 1 3 4 10 8
User of easyGPG (E) or Kleopatra (K) E E E+K E K+E

Tasks of the Users

Following some typical tasks of the users are described and how the interaction with easyGPG resp. Kleopatra will look like:

T1: Sending Mail to one reciepient

Description: Annika wants to tell her University that she is sick.

User:

Comments:

Workflow:

  1. Annika starts email client on her desktop
  2. Annika selects her university identity to send mail with
  3. Annika put her professors email address into the TO: field.
    1. Automatically the public key for that address is being retrieved. A little indicator represents the security estimation of that communication process (smart integration of Tofu, WoT, individual certificate verifications,...). She could click here in order to gain more information about this state and what to do in order to improve the secrity estimation.
  4. She writes and sends her mail as usual.

Remarks:

T2: Communicating with a non-crypto user

Description: John wants to communicate safely with a potential whisle blower.

User:

Comments:

Workflow:

  1. John starts his email client on his desktop
  2. John chooses the right identity to send with
  3. John enters the email-address in the TO: field
    1. The system now searches for a public key, finds non and indicates this directly on the TO. field
  4. John now enters the rest of the mail and presses "Send"
  5. The system feedbacks to him, that it is not able to send encrypted (because John has defined this in the settings), why this is so and offers the following:
    1. Inform the communication partner how to set-up encryption:
      1. Send a mail with instructions
      2. Webpage with instruction to communicate via some other form (Telefon, Jabber, ...)
      3. White list this recipient as someone to not communicate ecrypted to
    2. Define what to do with this mail:
      1. Send not encrypted
      2. Save
      3. Send as soon as a key is discovered
      4. Discard the current mail

Remarks:

T3: Create a new mail account after having recieved crypto instructions:

Description: Ernst want to leak and discuss a memo with John.

User:

Comments:

Workflow:

  1. Following the instructions he now installs Thunderbird and Enigmail.
  2. He starts and follows the normal setup to access his new mail account
  3. After the "normal" mail setup, the dialogue asks him whether he wants to import his keys or create a new key.
  4. He chooses new key, as he has none. The keys get generated and he gets asked to choose a password to protect his key.
  5. He get instructions how to backup his key and gets asked to upload his key so others can communicate safely with him.
  6. He is now ready to communicate with John.

Remarks:

T4: Installation of GPG4Win / Kleopatra

Description: Annika wants to install software to encrypt her communication.

User:

Comments:

Workflow:

  1. She download GPG4Win and start the normal installation
  2. During the installation the system shows her the new actions she can do with GPG4Win installed, namely file-actions and email actions.
  3. After successful installation of GPG4Win she can
    1. Quit the application
    2. Watch a video (?) that explains the main terms of encryption to her
      1. After watching the video she is asked to create or import her own keys (see T3)
    3. Import her keys.
    4. Last option would be to start Kleopatra.

Remarks:

Some corner cases

EasyGpg2016/VisionAndStories (last edited 2016-05-02 11:40:15 by bernhard)