> * Accessing your accounts or files
> * Sharing your private information
> * Making purchases on your behalf
> * Taking actions you never intended
This should really be at the top of the page and not one full screen below the "Try" button.
> * Accessing your accounts or files
> * Sharing your private information
> * Making purchases on your behalf
> * Taking actions you never intended
This should really be at the top of the page and not one full screen below the "Try" button.
i want a computer to be predictable and repeatable. sometimes, i experience behavior that is surprising. usually this is an indication that my mental model does not match the computer model. in these cases, i investigate and update my mental model to match the computer.
most people are not willing to adjust their mental model. they want the machine to understand what they mean, and they're willing to risk some degree of lossy mis-communication which also corrupts repeatability.
maybe i'm naive but it wasn't until recently that i realized predictable determinism isn't actually something that people universally want from their personal computers.
Having worked helping "average" users, my perception is that there is often no mental model at any level, let alone anywhere close to what HN folks have. Developing that model is something that most people just don't do in the first place. I think this is mostly because they have never really had the opportunity to and are more interested in getting things done quickly.
When I explain things like MFA in terms of why they are valuable, most folks I've helped see usefulness there and are willing to learn. The user experience is not close to universally seamless however which is a big hangup.
Because they usually are and they do.
> The same kind of user who hates anything MFA and writes their password on a sticky note that they stick to their monitor in the office.
This kind of user has a better feel for threat landscape than most armchair infosec specialists.
People go around security measures not out of some ill will or stupidity, but because those measures do not recognize the reality of the situation and tasks at hand.
With keeping passwords in the open or sharing them, this is common because most computer systems don't support delegation of authority - in fact, the very idea that I might want someone to do something in my name, is alien to many security people, and generally not supported explicitly, except for few cases around cloud computing. But delegation of authority is very common thing done by everyday people on many occasions. In real life, it's simple and natural to do. In digital world? Giving someone else your password is the only direct way to do this.