Personas for
Privacy and Security
Produced by the Secure User Practices project of the Open Internet Tools Project
openitp.org/sup
What is a user persona?
A user persona is a focused, easy-to-relate-to summary of research on a group of people who might use a particular piece of software, hardware, or a service. Personas help us engage in complex systems thinking about people using these tools, and how the tools fit into their lives.
A persona is not a description of a single person! Instead, it is an aggregate of a range of interviews and other information from a specific group of users with similar goals and backgrounds. In this way, personas avoid the problems of relying on anecdotes.
What is a persona for?
Personas serve a handful of uses:
How are personas used?
Personas come in most useful early in a development cycle (whether you’re calling that “requirements analysis,” “hypothesis statements,” or whatever your flavor of development calls it.)
Normally, a range of personas informs the development of one product or feature, specifying different needs users may have. However, it is likely that the specific use cases described here may be better served by a range of apps, websites, hardware, and services — different ones for different cases.
These user personas were primarily developed to communicate user needs to developers of open-source tools for the protection of privacy and security. However, we expect the personas will be of use also to developers of mainstream software and services in thinking about sensitive cases.
How were these personas made?
These personas were developed from a range of sources:
They were further refined by Gillian “Gus” Andrews of the Open Internet Tools Project, and Robert Stribley of Razorfish. Sketches were provided by artist Rob Vincent.
High technical expertise
Low technical expertise
Needs to be very public
Needs to be very private
Persona Characteristics
Trong
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me find trusted tools to share with my community.”
Mamun
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“How do I communicate when there is no Internet, no phone?”
Sarah
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me reach my support network while hiding my location”
Lilly
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me organize, but keep the rest of my life separate”
Shura
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me remain unknown, yet still be a visible leader.”
Joseph
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me find support from people I can trust.”
Mary
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me and my data stay physically safe so I can expose human rights violations.”
Fatima
Technology expertise level
Technology use
Access locations
Threats from technology use
Physical threats
Needs
“Help me communicate privately and safely with kindred spirits.”