Firefox OS privacy controls

5 key privacy features of FirefoxOS in an overview

Mozilla teamed up with Telekom Innovation Labs and IXDS to develop an introduction tour and control interface for the remarkable privacy features of their novel Firefox OS. This operating system is meant for entry level phones in emerging markets, where Mozilla sees the chance and the necessity to empower users for a safe journey into the mobile web.


For any user, but especially for these potential “newbies”, privacy and security need good explanation and motivation: security risks can be distant and vague and technical backgrounds can feel intimidating. At the same time, users are usually up for something else than privacy, such as setting up their phone to make the first call. “Respect my task & time”, how Larissa Co brings it to the point in her excellent talk. (yes, we need to face it: taking care of privacy and security is on no ones todo list and is usually not “productive” per se.)


We approached this UX challenge by strictly limiting topcis and features, using short and fresh explanations, and carefully drawn illustrations. To arrive there, we initiated co-creative workshops with users, Mozilla, and Telekom Group Privacy. We also worked very closely with the respective tech teams to make sure our ideas would make it into reality. We could build on IXDS user research knowledge on privacy and identity from previous projects and from Mozilla’s research team.
Mozilla does not rely on the exploitation of private data (e.g., for targeted marketing) and therefore is a trustworthy broker for the user. They can offer features like granualar permissions (in Android only very briefly in 4.3 / 2013 in the Cyanogen Custom ROM) or blurred location tracking.

The results were also presented at the W3C workshop on usable privacy controls (Berlin, 2014).

  • Early sketches from a workshop to find the best approach for the privacy tour.


During the highly playful workshops, the participants produced some really entertaining and insightful explanations on privacy topcis, e.g. a role playing video in the style of a Kids TV series to explain email encryption. This shows how important it is to move privacy questions out of their dry and defensive atmosphere and give more personal, active, and playful answers.

It also helps to be very clear about your target groups. Only few activists will accept harsh security and privacy settings to really protect them, even against more targeted attacks. Regular users see their benefit in more peace of mind and a sense of control over their data but it must be balanced with the general comfort and user experience.

Note: The Privacy Dashboard and the included Guided Tour are also scientifically evaluated in Piekarska et al (2015): Because We Care. Privacy Dashboard on Firefox OS.


Design at Linux Tag 2014

Going to a Linux conference as a designer might sound like an exotic idea on first sight. While this should receive a second thought (see later), I have to admit that I had a special approach, too, when I went to this year’s Linuxtag at Station, Berlin: I went there as part of the SaSER research team at IDL which is (on the top most level) concerned with defining new more efficient, reliable, and secure communications on the internet. So we were in the sys admin domain already (although Linux is far more than for admins but that might be what you think of).IMG_9091

Visual Analytics for Security Admins

We gave a talk on our interim results, which are visual analytics tools to investigate huge log files (i.e. text files): Opening Treasure Boxes. Exploring log files with visual data analysis to detect security breaches (slides). As part of the “Tracing and Logging” track, we talked to system administrators and security analysts and everyone else interested. It was a great opportunity for us to extend our contact with users, get feedback, acquire new use cases. We assumed that we would also “evangelize” a little in favor of visual analytics and visualizations beyond bar and line charts. We were quite right with that: our ideas were partially seen as strange and  unusual but we also received quite some thankful feedback by analysts who said our ideas opened new opportunities for them.Screen-Shot-2013-10-31-at-3.45.06-PM___elasticsearch-org

A view of the Kibana interface (image from Elastic Search)

A view of the Kibana interface (image from Elastic Search)

But I also want to point out that a couple of tools in the same track provided a very decent user interface and good visualization support. This is especially remarkable as log files are abstract things and enormously large, which makes providing a grip on them a real design challenge. Lennart Koopmann of Torch presented greylog2, with an interface to query large logfiles, get an overview over values in the file, and also get visual support for results in the form of time lines. Even more dedicated to a graphical user interface was Kibana (which builds on logstash and ElasticSearch), presented by Bernd Erk of Netways. I was impressed by the visual support for building and modifying queries, the ease of building graphs, and the clean overall interface. In many regards it reminded me of Splunk, which is also a great but not an open source software. As we found during the preparation of our talk, also the event monitoring system Icinga2 starts including interesting visualizations – Markus Frosch (of Icinga) just didn’t put a huge focus on the new interface.

Design for Open Source Software (needed!)

Coming back to the (suspected) design – Linux repulsion or even design – open source repulsion: open source software gained a bad reputation for having ugly or “just enough” user interfaces, with little help for users to find a workflow or just please the eye (things like Firefox or Fritzing are an exception, of course, but they are also rather recent offsprings). It seems as if open source is much more appealing to developers than to designers. I have no instant explanation for that – if you do, please let me know! I have to admit that a lot of the software I saw during Linuxtag unfortunately confirmed this prejudice. The more delighted I was when I saw how well crafted things like Kibana were.

It might be worth noting that Edna Kropp and Nicole Charlier of akquinet gave a basic introduction into user centered design and how they work as “on-site UX consultants“. While it was pretty basic for a designer, it was probably new and remarkable for many of the developers (hopefully) listening. I think much more talks like this are necessary to get to a common understanding between developers and designers in the open source scene.

Further notes

The bare crypto stick (it has a modest but nice casing in the final version)

The bare crypto stick (it has a modest but nice casing in the final version)

For the real paranoid cautious people, there is a Crypto Stick: looks like a thumb drive but actually hosts a micro-processor, a smartcard, and an SD card. You can use it to establish secure connections from untrusted systems (like internet cafés), store your passwords, and other things. You can even transport documents “plausibly hidden”, e.g., in case you get searched at an airport – and you don’t have to think of Snowden to understand how relevant that can be. I liked the idea to have a “security thing” that is really strong but also makes it easier for people to stay safe online/digitally.
Btw: it’s open software and open hardware, so you can build it at home (although the small form factor makes it complicated)

UDOO: Standard PC interfaces for the "Linux part" seen at the front here, with pin headers in Arduino due format at the back

UDOO: Standard PC interfaces for the “Linux part” seen at the front here, with pin headers in Arduino due format at the back

Even physical computing was a topic and the only other presentation given by an interaction designer: Michelangelo Guarise presented UDOO, which combines an Arduino Due-derived board with a Linux system running on a powerful quad-core ARM chip. This “natural” combination pops out in various flavors at the moment, combining the sensor-friendly, real-time interaction capable Arduino architecture with high-performance computing. I hope they will soon add their platform as a part to the Fritzing library and I’m curious about the projects building on that single board computer!

And I got a trusted certificate from CAcert to (soon) sign my email and ssl server connections – yeeha! I was impressed by how serious they take the process, with several people checking my ID cards separately. Trust on the internet is a delicate thing and digital signatures can help a lot here.




Breadboard view of Fritzing (more recent version)

Fritzing is an electronic circuit design software focused on makers and enthusiasts, rather than engineers. For this, it takes special care to explain electronic circuits and to make them accessible, e.g. by a dedicated view that reflects the physical appearance of electronic parts. At the same time, it contains everything to design and document a full project and make it production ready.

Initiated at FH Potsdam (Reto Wettach & André Knörig), it was built for but also heavily with the maker community. Its open file format allows easy documentation and sharing of electronic projects, enabling and boosting open source in the hardware area. It’s widely used in the community for presenting open source projects, for feedback, and for learning.

I contributed as a UX and visual designer, mostly in the area of the “Parts Editor”, that helps users modify or create parts, modify their internal logic such as connection points to wires, and provides a taxonomy for the parts library. I also explored user interfaces for potential new features, such as electrical rules checking.

  • Parts Editor: Error messages for connectors

Remarks on Service Design

You can even order a professionally produced circuit board from within the application. This is a remarkable feature from an interface and service design perspective: From the user’s design, the software creates the necessary production files, shows prices directly within the app, collects information for shipping, and sends everything to a factory. The user doesn’t have to deal with file formats, production standards, researching a production facility, or negotiating contracts. All of this is taken care of through the application and the Fritzing Fab server. Considerable technical and commercial coordination has to be negotiated and operational in the background but it doesn’t come to the user’s attention.

Besides its merrits for advancing the open source ideas in the hardware sector, Fritzing has also explored a number of business models around an open source core software.