-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Client workflow equivalent to "Flag for reply" workflow in web UI #46
Comments
@eloquence how do you want this prioritized abreast my other tickets for this sprint? |
Instructional Text & Contextual Help ScratchpadWhat you need to do What happened? If your SecureDrop experiences a large number of new source submissions all at once, it is possible that could be an attack from a bad actor. When SecureDrop detects this activity it will stop issuing encryption keys for new source accounts. Key generation is then resumed when the suspicions activity surge ends. What this means |
Let's focus on the sprint commitments for now; Allie and I can do some more research on the current behavior and dump it here, and then you can potentially do a first UX prototype in the next sprint. Does that work for you? |
Poyfect, thanks! :) |
Still looking into the currently implementation, but here's some info from way back: freedomofpress/securedrop#150 |
09 May Meeting Notes: Erik/Nina
|
14 May: 1st Design Review
If you'd like to leave comments on Invision about specific UI elements, feel free to do so—just turn on "Commenting" via the marginally discoverable translucent black tab in the lower-right of your screen, that has a barely-visible toggle control on it. Shown:
Feedback
|
Hey gang! I've added a 2nd rev to the existing wireframes. Pretty siked about how it's shaping up. Some notes...
As usual, the pink arrows can be your sherpa, but the "Key" and "Ignore" buttons also work. Thoughts? |
Hi @ninavizz, thanks for the revision! Please add this to the agenda for either the UX meeting or the Client Sync, as you see fit (depending on whether you'd like larger cross-team input). I personally prefer the iteration we discussed yesterday:
I feel the previous "Keep" / "Delete" flow achieved user education in a way that more closely matches the user's realities. It asked for the concrete choice upfront, while also offering the explanation of what exactly is happening. It spoke to the user as a journalist, not as a security expert or administrator. I would generally lean towards avoiding key iconography and language in the UI, because of this intimidation factor -- it suggests that the user themselves will be dealing with keys, which is not the case. Conceptually, it is also ever so slightly misleading. This action does not generate the key -- it merely gives the go-ahead for keypair generation upon the source's next login. In this sense, the user is not "keying" a source. That said, I appreciate the thinking that went into this iteration, and happy to discuss as a group :) |
Hey @eloquence, thx for pushing back w/ the thoughtful comments. I want to be mindful with my limited hours availability & agreed to priorities, and also want to get this right. Looking forward to richer discussion in tomorrow's UX meeting. For that, I'll update what you're responding to as the "3rd Rev," and quickly add-in the "2nd Rev" we discussed, yesterday. Will push that update to Invision, at some point later this afternoon. I'm also going to ask of everyone attending (and you) to pls carefully read all UI text when evaluating the solutions—the button texts, and the supportive text(s). As someone new to all this. Ideally, in advance of the meeting (tho I know everyone is busy and has limited time). /cc @zenmonkeykstop , @redshiftzero , @creviera , @harrislapiroff, @rmol , @kushaldas and anyone else I may be missing. Will ping the SD Slack channel, once I've pushed those updates. Still in research planning cave. :) |
15 May design review notes
Next Steps
|
Very rad new pattern for spam filtering/handling, just discovered in GMail (not present a few months ago). Screenshots on my GDrive.
|
29 May iterationFeedback
|
Iteration from above, based on feedback from @eloquence Yet to compose "Learn More" content. Thoughts?
|
Delivered spec for beta
|
The peanut gallery got quiet, so I'm taking that as a sign it's kosher to close this? |
Fine to close, but I would shorten that paragraph a bit more if possible. Recommend changing from:
To:
|
^ Super sweet! Less technical, me likey. Done! Follow-up question @eloquence: now that we have much more user-friendly language to speak to journalists about this, with, should we update the existing Web UI tidbits and documentation to present this feature as "Suspicious Activity Handling" vs "Flag For Reply" ? @harlo @huertanix How much bandwidth do y'all give to Flag For Reply, in training sessions? Do y'all believe the language proposed in the screens we just approved is a marked improvement—or could be further improved? |
Yes, but I think that can wait until the change has landed in the client, and we've done a round of validation (since it's in the punch list for the next round of user research). |
Iteration from above, based on feedback from @eloquence Yet to compose "Learn More" content. Thoughts?
|
Problem
When an instance's App server experiences low key entropy (via a DDoS type surge), new source account key pairs are halted. For a journalist to reply to a source submission, it needs a keypair assigned to it to facilitate encryption. Without that keypair, the journalist cannot reply to that Source—though they can still read all submitted materials.
The journalist therefore needs to select which source submissions need to be "flagged for reply," so the server knows to generate a key pair for those accounts the next time activity is detected by those sources (and to trigger the goofy message in the source UI). Alternately, the Journalist should be able to delete the source.
To make this issue extra awesome, there is no knowledge of any user ever encountering this flow—even after 5yrs of SD being in production. As such, inquiries are being made in a parallel research effort—but regardless, light testing of design solution(s) will be sought.
I wish there were a better way to handle DDoS things, tbh. This is a very sucky experience for sources, especially—as right now it remains unclear how or why they should return to see replies.
Considerations
Acceptance Critieria
The text was updated successfully, but these errors were encountered: