[openpgp] Private key backup on-boarding prototype survey

Weißmann, Christian Tjerk <christian.t.weissmann@campus.tu-berlin.de> Thu, 29 August 2019 14:15 UTC

Return-Path: <christian.t.weissmann@campus.tu-berlin.de>
X-Original-To: openpgp@ietfa.amsl.com
Delivered-To: openpgp@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1089712007C for <openpgp@ietfa.amsl.com>; Thu, 29 Aug 2019 07:15:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.298
X-Spam-Level:
X-Spam-Status: No, score=-4.298 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=campus.tu-berlin.de
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TnjgAunARQtn for <openpgp@ietfa.amsl.com>; Thu, 29 Aug 2019 07:15:18 -0700 (PDT)
Received: from exchange.tu-berlin.de (exchange.tu-berlin.de [130.149.7.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5508212004A for <openpgp@ietf.org>; Thu, 29 Aug 2019 07:15:18 -0700 (PDT)
Received: from SPMA-01.tubit.win.tu-berlin.de (localhost.localdomain [127.0.0.1]) by localhost (Email Security Appliance) with SMTP id 191427E07F7_D67DDF4B for <openpgp@ietf.org>; Thu, 29 Aug 2019 14:15:16 +0000 (GMT)
Received: from exchange.tu-berlin.de (exchange.tu-berlin.de [130.149.7.70]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "exchange.tu-berlin.de", Issuer "DFN-Verein Global Issuing CA" (not verified)) by SPMA-01.tubit.win.tu-berlin.de (Sophos Email Appliance) with ESMTPS id AC1FB8327A9_D67DDF3F for <openpgp@ietf.org>; Thu, 29 Aug 2019 14:15:15 +0000 (GMT)
Received: from EX-MBX06.tubit.win.tu-berlin.de (172.26.35.176) by EX-MBX-01.tubit.win.tu-berlin.de (172.26.35.171) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Thu, 29 Aug 2019 16:15:14 +0200
Received: from EX-MBX06.tubit.win.tu-berlin.de ([172.26.35.176]) by EX-MBX06.tubit.win.tu-berlin.de ([172.26.35.176]) with mapi id 15.00.1395.000; Thu, 29 Aug 2019 16:15:14 +0200
From: "Weißmann, Christian Tjerk" <christian.t.weissmann@campus.tu-berlin.de>
To: "openpgp@ietf.org" <openpgp@ietf.org>
Thread-Topic: Private key backup on-boarding prototype survey
Thread-Index: AQHVXnQseKwK8Gh6Mkybv0d1h9+9DA==
Date: Thu, 29 Aug 2019 14:15:14 +0000
Message-ID: <8C3A31B7-67C7-4DA6-8A7B-AE5A17BCAE78@campus.tu-berlin.de>
Accept-Language: de-DE, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [5.28.115.110]
x-pmwin-version: 4.0.1, Antivirus-Engine: 3.74.1, Antivirus-Data: 5.67
x-puremessage: [Scanned]
Content-Type: multipart/signed; boundary="Apple-Mail=_8326CF88-FFAE-48D9-8ABA-9DC20709F75E"; protocol="application/pgp-signature"; micalg="pgp-sha512"
MIME-Version: 1.0
X-SASI-RCODE: 200
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=campus.tu-berlin.de; h=from:to:subject:date:message-id:content-type:mime-version; s=dkim-tub; bh=n1K872UD1KLTQpwBNrvlRfX5gcxAgxpQT1iLp5DZva8=; b=cii4XEL9tySnbRzJeSgm3gm4da99XhyKaCaUY1qfrZdtXfCjig0v1GMCxVsmuommJp/Q77UPH/vHPIZd0e5jL9690AKucKW8vEfQw8MbH7ZDkWN5XUpSWZIW01BhHqPyrUTlLkNttfxvB9yyOh9HKWvPZW3Qs4vzXs81bI9Wvcw=
Archived-At: <https://mailarchive.ietf.org/arch/msg/openpgp/C6ArbxLDsL0chACU2nWfDUoDHXY>
Subject: [openpgp] Private key backup on-boarding prototype survey
X-BeenThere: openpgp@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Ongoing discussion of OpenPGP issues." <openpgp.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/openpgp>, <mailto:openpgp-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/openpgp/>
List-Post: <mailto:openpgp@ietf.org>
List-Help: <mailto:openpgp-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/openpgp>, <mailto:openpgp-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Aug 2019 14:16:45 -0000

Hi PGP community,

My name is Chris and I am currently writing my master's thesis at the TU Berlin in co-operation with the FU Berlin. My goal is to research how to remove hurdles that discourage people from using PGP to encrypt their email.

Currently I am looking into introducing a secret sharing scheme that helps with secure distributed backups of the private key. If you don’t know what secret sharing is, no worries, that’s what I am trying to explain. Therefore I created a small on-boarding prototype for this feature that I would love your feedback on. Below the prototype you can see the link to the survey which has around 10 mostly multiple-choice questions about the topic and some demographics at the end. Of course the input is anonymized and used only within my research purpose.

For the start I would implement the feature in the PGP supporting email client which is being developed by the Freie Universität Berlin.

In case you are interested in what this idea develops into, there is the option to add your email to a list that I will update about my findings at the end of the project.

To find the prototype click the following link: https://letterbox-app.org/survey/backup/ <https://letterbox-app.org/survey/backup/>

Best regards,
Christian Weißmann