All tags /

Professional Knowledge: Security, Privacy, and Transparency

Simply Secure provides information security professionals with resources that include uses cases, emerging research issues, and the implications of current events for the field

Meeting Users' Needs: The Necessary Is Not Sufficient

Building great software requires understanding what users want and need. If you’re building privacy-preserving software, this includes understanding the privacy threats that your users face. One of the participants in Ame’s NYC study.When Ame set out to talk to people in the New York City neighborhoods of Brownsville and Harlem... (Read more)

Comfortable UX, Not Just Open APIs

Simply Secure focuses its collaborative efforts on open-source, privacy-preserving software projects. In my conversations with designers, developers, and end users, I'm often struck by a divergence in their understanding of what "openness" means in software. For example, last December during a user study, participants reading app store descriptions of secure... (Read more)

Notes from the Internet Freedom Festival

I really enjoyed my time at the Internet Freedom Festival in Valencia, Spain. I was inspired and humbled to meet so many talented people as part of a global event about internet freedom. From powerful conversations about privilege to UX design jam sessions, it was a great week. With more... (Read more)

Video Roundup

It’s always great to attend security and privacy conferences in person. But in cases where you have to miss an event, online videos of the talks can be a great way to stay current with the ongoing conversation.Art, Design, and The Future of PrivacyAs I promised back in September, the... (Read more)

Some Of Our 2015 Favorites

2015 was our first full year in operation, and we’ve come a long way! Looking back at the past twelve months, here are some resources that we’ve found to be particularly useful (or entertaining). Let us know your favorites on Twitter!Ame’s picksThinking back on 2015, I’m really glad to be... (Read more)

Encryption is not for terrorists

Recent attacks by Daesh in Turkey, Egypt, Lebanon, and Paris have fanned the flames of an ongoing debate about software that is resistant to surveillance. It seems that some participants in that debate are trying to use these attacks as an excuse to drum up fear around end-to-end encryption. They... (Read more)

Don't let security dogma steer you wrong

My recentpost describing some of the reasons we choose Slack over IRC for our publicforum is part of a larger conversation people are having around the promise andconcerns of group-communication tools. A quick search for "Slack vs. IRC" yields awealth of opinions on the subject; our post generated some interestingdiscussion... (Read more)

Victims of Success

Rather than view feature requests as a set of highly-divergent signals, it can help to try and group requests based on the underlying need that they speak to.

Usability and Security: Not Binary Properties

People who think about computer security for a living sometimescringe when they read about the subject in the popular press.Security is a complex and nuanced topic, and it’s easy to makeassertions that don’t hold up to careful scrutiny. One basic-but-unintuitive principle is that security is not abinary property: in the... (Read more)

Closing the Participation Gap: HotPETS Presentation Summary

I really enjoyed being part of the emerging-work track, HotPETS, at the PrivacyEnhancing Technologies Symposium earlier this month. From meeting lots of greatpeople to getting face-time with the Simply Secure team, Philadelphia wasfun.Scout and I presented “Human-CenteredDesign for Secure Communication: Opportunities to Close the ParticipationGap” as part of a session... (Read more)