(no title)
jlcummings | 11 years ago
The ux [especially] places priority of identity ahead of protected, private conversation and then too broadly encapsulates that information. Secondly, verification is too static, too binary (all or nothing), and too optimistic.
1. To what degree is the line leaky and observable? 2. To what degree are we confirming the conversation participants' identity claims? 3. To what degree is the conversion following normal conversation protocol?
No comments yet.