“Say I'm in public...I don't want my nudes to pop up.” User Threat Models for Using Vault Applications

Chris Geeng, Natalie Chen, Kieron Ivy Turk, Jevan Hutson, Damon McCoy

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Vault apps and hidden albums are tools used to encrypt and hide sensitive photos, videos, and other files. While security researchers have analyzed how technically secure they are, there is little research to understand how and why users use vault apps, and whether these tools meet their needs. To understand user threat models for vault apps, we conducted semi-structured interviews (N = 18) with U.S. adult vault app users. We find our participants store intimate media, nonsexual body images, photos of partying and drinking, identification documents, and other sensitive files. Participants primarily used vault apps to prevent accidental content exposure from shoulder surfing or phone sharing, whether in public or with and around close ties. Vault apps were not used to prevent a technically proficient adversary from accessing their files. We find that vault apps prevent context collapse when sharing devices, similar to how privacy settings prevent context collapse on social media. We conclude with recommendations for research aligning with user threat models, and design recommendations for vault apps.

    Original languageEnglish (US)
    Title of host publicationProceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024
    PublisherUSENIX Association
    Pages433-451
    Number of pages19
    ISBN (Electronic)9781939133427
    StatePublished - 2024
    Event20th Symposium on Usable Privacy and Security, SOUPS 2024 - Philadelphia, United States
    Duration: Aug 12 2024Aug 13 2024

    Publication series

    NameProceedings of the 20th Symposium on Usable Privacy and Security, SOUPS 2024

    Conference

    Conference20th Symposium on Usable Privacy and Security, SOUPS 2024
    Country/TerritoryUnited States
    CityPhiladelphia
    Period8/12/248/13/24

    ASJC Scopus subject areas

    • Computer Networks and Communications
    • Safety, Risk, Reliability and Quality

    Fingerprint

    Dive into the research topics of '“Say I'm in public...I don't want my nudes to pop up.” User Threat Models for Using Vault Applications'. Together they form a unique fingerprint.

    Cite this