In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception

With WhatsApp's adoption of the Signal Protocol as its default, end-to-end encryption by the masses happened almost overnight. Unlike iMessage, WhatsApp notifies users that encryption is enabled, explicitly informing users about improved privacy. This rare feature gives us an opportunity to study people's understandings and perceptions of secure messaging pre-and post-mass messenger encryption (pre/post-MME). To study changes in perceptions, we compared the results of two mental models studies: one conducted in 2015 pre-MME and one in 2017 post-MME. Our primary finding is that users do not trust encryption as currently offered. When asked about encryption in the study, most stated that they had heard of encryption, but only a few understood the implications, even on a high level. Their consensus view was that no technical solution to stop skilled attackers from getting their data exists. Even with a major development, such as WhatsApp rolling out end-to-end encryption, people still do not feel well protected by their technology. Surprisingly, despite WhatsApp's end-to-end security info messages and the high media attention, the majority of the participants were not even aware of encryption. Most participants had an almost correct threat model, but don't believe that there is a technical solution to stop knowledgeable attackers to read their messages. Using technology made them feel vulnerable.

[1]  J. Ivey Focus groups. , 2011, Pediatric nursing.

[2]  Laura A. Dabbish,et al.  "My Data Just Goes Everywhere: " User Mental Models of the Internet and Implications for Privacy and Security , 2015, SOUPS.

[3]  Michael J. Freedman,et al.  CONIKS: A Privacy-Preserving Consistent Key Service for Secure End-to-End Communication , 2014, IACR Cryptol. ePrint Arch..

[4]  E. Brink,et al.  Constructing grounded theory : A practical guide through qualitative analysis , 2006 .

[5]  Christian Grothoff,et al.  A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System , 2014, CANS.

[6]  Franziska Roesner,et al.  Investigating the Computer Security Practices and Needs of Journalists , 2015, USENIX Security Symposium.

[7]  Laura A. Dabbish,et al.  Increasing Security Sensitivity With Social Proof: A Large-Scale Experimental Confirmation , 2014, CCS.

[8]  Kat Krol,et al.  Poster : Mental Models – User understanding of messaging and encryption , 2016 .

[9]  Laura A. Dabbish,et al.  The Effect of Social Influence on Security Sensitivity , 2014, SOUPS.

[10]  Jon Callas,et al.  OpenPGP Message Format , 1998, RFC.

[11]  Ian Goldberg,et al.  Improved user authentication in off-the-record messaging , 2007, WPES '07.

[12]  Ian Goldberg,et al.  SoK: Secure Messaging , 2015, 2015 IEEE Symposium on Security and Privacy.

[13]  M. Angela Sasse,et al.  Obstacles to the Adoption of Secure Communication Tools , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[14]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[15]  Ian Goldberg,et al.  A user study of off-the-record messaging , 2008, SOUPS '08.

[16]  Rick Wash,et al.  Influencing mental models of security: a research agenda , 2011, NSPW '11.

[17]  Martin Ortlieb,et al.  Expert and Non-Expert Attitudes towards (Secure) Instant Messaging , 2016, SOUPS.

[18]  Matthew Smith,et al.  An Empirical Study of Textual Key-Fingerprint Representations , 2016, USENIX Security Symposium.

[19]  Predrag V. Klasnja,et al.  "When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use , 2009, CHI.

[20]  P. Schofield A Companion to Qualitative Research , 2005 .

[21]  Anne Leitch,et al.  Mental models: an interdisciplinary synthesis of theory and methods , 2011 .

[22]  Ernst von Kardorff Uwe Flick,et al.  A Companion to Qualitative Research , 2004 .

[23]  Glenn A. Bowen Naturalistic inquiry and the saturation concept: a research note , 2008 .

[24]  L. Jean Camp,et al.  Mental models of privacy and security , 2009, IEEE Technology and Society Magazine.

[25]  Doowon Kim,et al.  An Inconvenient Trust: User Attitudes toward Security and Usability Tradeoffs for Key-Directory Encryption Systems , 2016, SOUPS.

[26]  L. Jean Camp,et al.  Mental Models of Security Risks , 2007, Financial Cryptography.

[27]  Nikita Borisov,et al.  Off-the-record communication, or, why not to use PGP , 2004, WPES '04.

[28]  Rob Miller,et al.  Johnny 2: a user test of key continuity management with S/MIME and Outlook Express , 2005, SOUPS '05.

[29]  Rick Wash,et al.  Organization Interfaces—collaborative computing General Terms , 2022 .

[30]  W. Keith Edwards,et al.  More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.

[31]  Edward W. Felten,et al.  Secrecy, flagging, and paranoia: adoption criteria in encrypted email , 2006, CHI.

[32]  Melanie Volkamer,et al.  Why Doesn't Jane Protect Her Privacy? , 2014, Privacy Enhancing Technologies.

[33]  Lorrie Faith Cranor,et al.  Bridging the Gap in Computer Security Warnings: A Mental Model Approach , 2011, IEEE Security & Privacy.