Skip to content

Exploring how to create controlled insight (screening) into encrypted communication

Notifications You must be signed in to change notification settings

bjornte/transparent-encryption

Repository files navigation

  • Purpose: To explore how to create controlled insight (monitoring or screening) into encrypted communication without depriving indivuiduals of their privacy
  • Contents: A high level user experience (UX) specification or illustration of a hypothetic end-user application and associated communication material

UX spec

For the time being, there is only written material and no wireframes.

Background info

An older description for this repository is here. A related question was asked on security.stackexchange.com, but potentially because of the political nature of the question, it was closed. Perhaps in time it can be reopened.

This repository and initiative is related to Phynti by Torgeir Hovden.

To do

  • Improve texts
    • Proof reading.
    • Simplify further.
    • More detailed information on technical issues.
    • Consider Norwegian version if pitching to local, public stakeholders.
  • More detailed interaction design
    • Detailed flow for setting up a basic Phynti account with messages to friends etc.
    • Illustrations.
    • More detailed wireframing incl. Call to action (CTA) buttons.
  • Front end development
    • Bootstrap or other CSS framework.
    • Possibly style guide such as Pattern Lab.

Payoff (variations)

  • Digital safekeeping powered by trusting your friends.
  • Put trust in your friends, with the password manager that allows you to forget.
  • The password manager that allows you to forget by trusting your friends.
  • It's OK forget when you trust your friends.
  • Trust your friends, not your memory. (Or us.)
  • Don't trust us. Don't trust yourself. Trust your friends.
  • Don't trust us, or even yourself. But trust your friends.
  • Trust your friends. Not us. Not yourself.

Bin: Old text fragments

And in addition, your valuables are safe from your fleeting memory.

We're safer because we're different: We don't store your passwords, and we don't require you to remember the master key to the vault (although remembering it is convenient).

About

Exploring how to create controlled insight (screening) into encrypted communication

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages