Making Security Shiny


The Blog of Tom Webster

Abstract

Interfaces suck, especially security interfaces. We're going to take a look at good examples of bad interface design, and talk about what we can do to fix it. From PGP to TrueCrypt, we've all seen great crypto ignored because of a bad, or overly-complicated interface. We need to start making interface design a security priority. People buy Macs because they are shiny, why not follow suit with our security programs? This talk is designed to be conversational and get people thinking about what mom and grandma need in a security tool.

Bio

Tom Webster is an IT grunt, VPN admin, Security Lead, Programmer, and general tech guy at BWI Group. He's constantly breaking, fixing, and researching things as well as ranting over at SamuraiLink3.com and his Google Plus profile. Tom has a secret love of cooking while wearing Google Glass and can make a damn good pot roast.

Downloads/Embeds

You can download this whole talk, images, fonts, and all source materials right here.

If you'd like to embed this talk (like I did on this page), head over to this talk on SpeakerDeck to see PDF download options, embed code, and other cool stuff.

Credits

Software

Colors

Fonts

Image Credits

All images are either under a CC license or used with fair use.

QR Codes

Generated at QR Code Artist

ControlPanel.jpg

Author: Les Chatfield

License: CC BY 2.0

Glyphicons Free

Author: Glyphicons

License: CC BY 3.0

MS-DOSRedHorizontal

Author: Kjetil Korslien

License: CC BY NC 2.0

Grandma Finds The Internet

Author: Corbis Images

License: Rights Managed - Image is part of a viral meme and is used across the web with little regard to the actual license.

FakeSkypeEncryption.png

Author: EFF

License: CC BY 3.0

HipsterBarista.jpg

Author: Know Your Meme

License: Internet Meme

Ive.png

Author: Apple Inc.

License: Copyright © 2013 Apple Inc. All rights reserved

FirstDayOnTheInternetKid.png

Author: Piotr Rzeszutek

License: Internet Meme

PGPlogo.jpg

Author: Symantec

License: Copyright ©1995 - 2013 Symantec Corporation

GPGlogo.png

Author: GNU Project

License: GPLv3

TrueCryptLogo.png

Author: renderhead44

License CC BY-NC-SA 3.0

TorLogo.jpg

Author: Tor Project

License: MIT License

SSL-padlock.png

Details unknown :(

EvilHacker.jpg

Author: Katy Levinson

License: CC BY-NC-SA 2.0

Shiny.jpg

Author: William Grobman

License: CC BY-NC-SA 2.0

TrainWreck.jpg

Author: Robyn Jay

License: CC BY-SA 2.0

CarboniteEncryption.jpg

Author: Singapore Travel Web

License: Unknown, presumed Copyright and used under fair use.

All other UI-*.png screenshots

Author: Tom "SamuraiLink3" Webster

License: CC BY-SA 4.0