Secure Email – A Usability Study

10/12/2021
by   Adrian Reuter, et al.
0

Several end-to-end encryption technologies for emails such as PGP and S/MIME exist since decades. However, end-to-end encryption is barely applied. To understand why users hesitate to secure their email communication and which usability issues they face with PGP, S/MIME as well as with pEp (Pretty Easy Privacy), a fairly new technology, we conducted an online survey and user testing. We found that more than 60 existence of such encryption technologies and never tried to use one. We observed that above all, users are overwhelmed with the management of public keys and struggle with the setup of encryption technology in their mail software. Even though users struggle to put email encryption into practice, we experienced roughly the same number of users being aware of the importance of email encryption. Particularly, we found that users are very concerned about identity theft, as 78 email in their name.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
11/06/2017

Mobile Encryption Gateway (MEG) for Email Encryption

Email cryptography applications often suffer from major problems that pr...
research
10/08/2020

Concealed Communication in Online Social Networks

Online social networks are used frequently by many people: Staying in co...
research
04/09/2021

The Motivated Can Encrypt (Even with PGP)

Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have lon...
research
10/10/2019

WiFiCue: Public Wireless Access Security Assessment Tool

Public wireless access points are commonly provided by governments, busi...
research
09/05/2022

A Dive into WhatsApp's End-to-End Encryption

We live in a generation where the world around us is witnessing technolo...
research
08/05/2023

Quarks: A Secure and Decentralized Blockchain-Based Messaging Network

In last two decades, messaging systems have gained widespread popularity...
research
02/25/2019

SafeEmail A safe and reliable email communication system without any spam

Using multi group asymmetric public and private keys, this paper propose...

Please sign up or login with your details

Forgot password? Click here to reset