{"id":"https://openalex.org/W4412373407","doi":"https://doi.org/10.56553/popets-2025-0170","title":"\"If You Want to Encrypt It Really, Really Hardcore...\": User Perceptions of Key Transparency in WhatsApp","display_name":"\"If You Want to Encrypt It Really, Really Hardcore...\": User Perceptions of Key Transparency in WhatsApp","publication_year":2025,"publication_date":"2025-07-13","ids":{"openalex":"https://openalex.org/W4412373407","doi":"https://doi.org/10.56553/popets-2025-0170"},"language":"en","primary_location":{"id":"doi:10.56553/popets-2025-0170","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0170","pdf_url":null,"source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.56553/popets-2025-0170","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027883909","display_name":"Konstantin Fischer","orcid":"https://orcid.org/0009-0001-6582-6570"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Konstantin Fischer","raw_affiliation_strings":["Ruhr University Bochum"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024639762","display_name":"M. Keil","orcid":"https://orcid.org/0009-0003-1055-0356"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus Keil","raw_affiliation_strings":["Ruhr University Bochum"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019296828","display_name":"Annalina Buckmann","orcid":"https://orcid.org/0000-0002-7959-9743"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Annalina Buckmann","raw_affiliation_strings":["Ruhr University Bochum"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108226584","display_name":"M. Angela Sasse","orcid":"https://orcid.org/0000-0003-1823-5505"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"M. Angela Sasse","raw_affiliation_strings":["Ruhr University Bochum"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum","institution_ids":["https://openalex.org/I904495901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5027883909"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":4.416,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.93873901,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"2025","issue":"4","first_page":"1039","last_page":"1054"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9873999953269958,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9836999773979187,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.8600115776062012},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.7031847238540649},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6400164365768433},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6144545674324036},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.6046761274337769},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4723290801048279},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38634464144706726},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.35077163577079773}],"concepts":[{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.8600115776062012},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.7031847238540649},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6400164365768433},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6144545674324036},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.6046761274337769},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4723290801048279},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38634464144706726},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.35077163577079773},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.56553/popets-2025-0170","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0170","pdf_url":null,"source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.56553/popets-2025-0170","is_oa":true,"landing_page_url":"https://doi.org/10.56553/popets-2025-0170","pdf_url":null,"source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W3081288631","https://openalex.org/W3152382318","https://openalex.org/W3004686567","https://openalex.org/W2738656338","https://openalex.org/W2603787370","https://openalex.org/W2555400967","https://openalex.org/W3214759741","https://openalex.org/W3174876210","https://openalex.org/W2388458847","https://openalex.org/W3126697728"],"abstract_inverted_index":{"WhatsApp":[0,37,46,142],"is":[1,182],"the":[2,57,99,106,168,207,218,223],"first":[3],"popular":[4],"chat":[5,62],"app":[6],"to":[7,24,94,104,117,162,175,184,196,226],"roll":[8],"out":[9],"a":[10,32,118,155],"real-world,":[11],"large-scale":[12],"implementation":[13],"of":[14,31,61,98,108,210],"key":[15,20,69,109,112,156,176,229],"transparency.":[16,110],"If":[17],"implemented":[18],"correctly,":[19],"transparency":[21,113,157,230],"allows":[22],"users":[23,47,197],"check":[25],"whether":[26,64],"they":[27,92],"are":[28],"currently":[29],"victim":[30],"Machine-in-the-Middle":[33],"attack":[34],"mounted":[35],"by":[36],"server":[38],"operators.":[39],"Through":[40],"16":[41],"in-depth":[42],"semi-structured":[43],"interviews":[44],"with":[45],"in":[48,114,121,124,201,213,249],"Germany,":[49],"we":[50,160,165,216,236],"investigate":[51],"how":[52,72],"people":[53],"judge":[54],"and":[55,59,71,76,143,192,221],"perceive":[56,66],"security":[58,123],"privacy":[60],"apps,":[63],"end-users":[65,174],"benefits":[67],"from":[68],"transparency,":[70,177],"this":[73],"affects":[74],"trust":[75,188],"usage.":[77],"We":[78,170,204],"find":[79],"that":[80,91,135,172,206],"our":[81,234],"interview":[82],"participants":[83,148],"mostly":[84],"know":[85],"what":[86,215],"end-to-end":[87],"encryption":[88],"is,":[89],"but":[90],"struggle":[93],"show":[95],"an":[96,131,179],"understanding":[97],"nuanced":[100],"threat":[101],"models":[102],"needed":[103],"grasp":[105],"point":[107],"Seeing":[111],"action":[115],"led":[116],"slight":[119],"increase":[120],"perceived":[122,190],"some,":[125],"while":[126],"others":[127],"dismissed":[128],"it":[129],"as":[130,242,244],"unconvincing":[132],"UI":[133],"sham":[134],"would":[136],"not":[137],"change":[138],"their":[139],"presumptions":[140],"about":[141],"its":[144],"companies'":[145],"motives.":[146],"Some":[147],"even":[149,194],"felt":[150],"less":[151,199],"secure":[152,200],"after":[153],"performing":[154],"check,":[158],"which":[159],"attribute":[161],"certain":[163],"misconceptions":[164],"uncovered":[166],"during":[167],"interviews.":[169],"conclude":[171],"exposing":[173],"without":[178],"accompanying":[180],"explanation,":[181],"unlikely":[183],"directly":[185],"meaningfully":[186],"enhance":[187],"or":[189],"security,":[191],"can":[193],"lead":[195],"feeling":[198],"some":[202],"cases.":[203],"underline":[205],"real":[208],"strength":[209],"KT":[211],"lies":[212],"1)":[214],"call":[217],"\"deterrence":[219],"effect\"":[220],"2)":[222],"future":[224,247],"possibility":[225],"better":[227],"automate":[228],"checks.":[231],"Based":[232],"on":[233],"results":[235],"offer":[237],"recommendations":[238],"for":[239,245],"industry":[240],"practitioners":[241],"well":[243],"promising":[246],"work":[248],"academia.":[250]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
