Why is GPG "damn near unusable"?: An overview of usable security research

Presented at 31C3 (2014), Dec. 28, 2014, 11:30 a.m. (60 minutes)

GPG has been correctly described as "damn near unusable". Why is this so? What does research into usable security tell us? This talk covers the history, methods, and findings of the research field, as well as proposed solutions and open questions. With all the frustration around trying to get Glen Greenwald to use encryption [0,1], it is not surprising that Edward Snowden has described GPG as "damn near unusable" [2]. Such usability problems of end-to-end email encryption tools have been around for a long time. In 1999, a seminal study found that most participants were unable to use PGP 5.0 to encrypt an email when given 1.5 hours to do so [3]. Others have tried to solve these usability problems by automating the key exchange and encryption [4]. However, issues persist around a lack of end-user trust in the software [5], difficulties in getting encryption widely implemented, and having to deal with a general absence of understanding the email architecture [6]. Despite being almost 50 years old [7], email is still not widely encrypted on an end-to-end basis. In this year's SOUPS keynote (the major conference on usable security), Christopher Soghoian described how we as a community are not doing nearly enough to get security into the hands of consumers: we are mostly stuck with the same broken interface as PGP 5.0 from back in 1999, people still face the same conceptual barriers, and we still have crappy defaults [8]. While there has been renewed interest in end-to-end email encryption after the Snowden revelations [9], many projects do not take usability into account. This talk goes into some of the dos and don'ts gleaned from the usable security research field. Building on a discussion of the history, methodology, and findings of the research, the talk will cover topics including the constraints of humans, the need for clear mental models, and the usefulness of user testing. Some examples of successes and failures will be used to illustrate a range of usable security principles. Remaining pain points such as metadata protection, key management, and end-user understanding will be covered, including proposals for fixing these such as anonymous routing, more appropriate metaphors, and trust on first use. Various open questions will also be discussed, including: - Should we patch the existing email architecture or should we move towards new protocols? - How can the crypto community build subversion-resistant collaboration platforms? - Is there a way to standardise our cryptoplumbing to a restricted set of secure algorithms? - Can we provide developers with usable coding technologies to prevent nightmares like OpenSSL? - How should we involve end-users into the development cycle of open source software? - Can we empower end-users to take security back into their own hands?


  • Arne Padmos
    Arne Padmos obtained a degree in information security from Royal Holloway. He has been engaged in side-channel analysis, reverse engineering, and hardware testing, and had also taught security analysis in Europe and Asia. Currently, he works at the other end of the security spectrum, trying to make email more secure and usable, with a focus on end-to-end encryption. Curriculum Vitae Arne has a multidisciplinary BSc from University College Roosevelt (with a focus on computer science, mathematics, and international relations), read security studies while on exchange at Háskóli Íslands, and completed an MSc in information security at Royal Holloway. Thereafter, Arne spent 2 years at Riscure, a security test lab in the Netherlands, engaged in software and hardware testing. Subsequently, Arne was a doctoral researcher studying usable secure email communication, supervised by Prof. Dr. Melanie Volkamer and Dr. Karen Renaud, and funded by the Horst Görtz Stiftung. Currently, Arne is a lecturer at Rotterdam University of Applied Sciences (Hogeschool Rotterdam), focussing on security. Research Interests: - Communications and operational security - User-centred interaction and service design - Security design methods and usable security - Education (knowledge acquisition, transfer, and retention) - Cybercrime, security studies, and international relations - Hardware and software security, and their evaluation - Transdisciplinary security research Selected talks: - Email encryption for the masses, 30C3 - Why encrypted email is broken, and how to go about fixing it, Science Slam Darmstadt Selected publications: - Why doesn't Jane protect her privacy?, Karen Renaud, Melanie Volkamer and Arne Renkema-Padmos, PETS2014 - Shake hands to bedevil: Securing email with wearable technology, Arne Renkema-Padmos, Jerome Baum, Karen Renaud, Melanie Volkamer, HAISA2014


Similar Presentations: