cyber security & Personal privacy

Encrypted Messaging

Messages and calls are always end-to-end encrypted and engineered to keep the communication safe. Raven can’t read the messages or see the calls, no one else can either.

Role

Product Designer

Institute

Anonymous

Client

Anonymous

Service

App Ecosystem

Year

2018

Duration

8 months

project

Challenge

There will be a competition with WhatsApp, Skype and some other companies. Raven will have the full ultimate package from built-in VPN to the encrypted video-audio & data storage. Businesses will pay by the per user/month model with a yearly discounted package. In order to make it grow rapidly, Raven’s first asset for growth is the user’s quantity.

project

Solution

Business model will tweak here and there to adapt to the new era of competition. To be the most popular secure messaging app globally, it needs to apply a sustainable and smart business model, targeting long-term growth & besides playing on its strong points while knowing the weaknesses even more.

1·Product

Business Models

Diversified services will be complex as Raven serves different parties -individuals, families & companies- it has a multi-sided business model.

Raven’s instant messaging service, video/calls, even filters, and VPN are all free but to some extent. The VPN will be solid but basic for freemium users, offering more deep security and flexibility for paid users.

It will have also the corporation/company accounts, all companies under GDPR or has any banking/trading users data, will have to use In-house servers for mailing and chat/data transfers.

2·Research

So-Called Encryption

One of the supposed benefits of encryption is, for better or worse, being able to prevent government and law enforcement from accessing your data.

The messages sent on WhatsApp are end-to-end encrypted. This means that only the device, and that of the recipient, can decode them. However, this doesn’t secure them once they are decrypted on the device.

In 2016, WhatsApp updated its Privacy Policy to allow sharing of data from WhatsApp to Facebook. They also stated that none of your information would publicly visible on Facebook, implying that it would instead be hidden in Facebook’s inaccessible profile of you. 

Unencrypted Backups
2·Research

In-House Concerns

Due to the widespread popularity of chat apps, there is now a fair bit of concern from companies about their use for business purposes.

The survey found that 65% of respondents were concerned that chat apps represented a security loophole and that half were troubled by their inability to monitor their employees’ communications. Alarmingly, 41% of respondents did not know which of their employees were using chat apps.

The overwhelming majority of respondents (76%) provided an internal secure mobile messaging app. Skype for Business was the most widely deployed secure messaging app (74%), followed by Cisco’s Spark (9%). 

Secure Enterprise
3·Technology

P2P Communication

Raven wants to deliver a message that how it’s emphasizing on valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

STUN-TURN Server​: The software responsible for collecting peers’ connection details to send it to the signaling server so that the peer will communicate those details with all interested peers to enable them to communicate directly.

Signaling Server​: The software responsible for organizing the communication initiation process between peers. After making the handshake between the peers whenever needed, all communications go directly between peers devices.

WebRTC Channel
4·Interaction

Encrypted Account

Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

No GSM, No E-mail: You simply sign up to the system by specifying a username and a password.

12-Word​ Verification: When the device is lost or you want to connect from another device, you use the 12 words given to you. You can only log in to your Raven account on one device at a time.

Reputation Model: Account built on a gamified reputation mechanics to create an atmosphere of trust in the community and to prevent spam accounts.

Personalized Standards

4·Interaction

Safe Communication

Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

Adding Contacts​: In Raven, unless users know your username, they won’t be able to find your account in any way. You have full control over the steps.

Channel Security Level​: You can personalize the privacy & security settings of each channel. For example, you can prevent someone from sharing your account while allowing them to take a screenshot of the conversation. Or vice versa. Many options are available!

In-Channel Notifications: You’ll be notified of events or violations by receiving information notifications while you’re in a channel.

Confident Touch

4·Interaction

Custom Security

Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

Account Security Level: Each setting was rated according to its impact on overall security, so users can know their security settings under their control. With this method, a general security level score was achieved which aimed to make the users feel safer.

Get Away Code​: Everyone can have secrets. With this feature, you can clean the application according to the options you select, as if it never existed on that device. In case of emergency, if you enter your code (Get Away Code) instead of your main code (Passcode), you will fall to Get Away screen.

Micro-Managing Security: Each feature should be customizable for maximum safety feeling, even the smallest one.

Piece by Piece

 4·Interaction

Micro Precautions

Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

Passtags: If you have assigned a tag to a contact or group channel, they remain confidential regardless of search results. To access these channels, you must type at least one of the assigned Passtag in the search bar.

Countdown​: If the messages contain confidentiality or will not be needed again, you can set the countdown feature to get the messages disappear.

Emoji Code​: The other party can be informed before answering the call by the emojis that you have previously determined with each other. For example, 4 mustaches = My father is with me. 4 sirens = The police are listening.

Face & Voice Filters: You can maximize your anonymity with voice and face filters. Identify the filters before each call and start the conversation.

Precaution Examples

4·Interaction

Group Chats

Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

Private Group​: Ideal for groups of family and friends. There is no hierarchy or admin. The group can only be joined by invitation.

Business Group​: Ideal for business deals. Admin acts as a mediator. Each incoming message is approved by the admin before it falls into the channel. The group can only be joined by invitation.

Public Group​: Ideal for large communities. There are admins and moderators. The group can be set to invite-only or public. Call features run as broadcast by admins.

Need-Oriented Groups

        4·Interaction

Assured Sharing

Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.

File Manager​: Download only the desired file types in cellular data. You can also set the types to auto-delete at specified time intervals.

Filtered Voice: You can filter the instant audio files.

Share My Location: You can turn on the passcode request feature before giving the application your current location.

Contact Sharing: You can allow nobody, some people, or anyone to share your Raven username.

 

File Types

5·Interface

Brand Identity

Inspired by the night & the raven for reinforcing the concept of privacy.

A well-designed identity is the key to doing business in the modern digital world. The app is a source of information to users who look for secure services. But the concept should make a desirable trust impression to convert the users into loyal customers.

Logotype
Colors
Typography
5·Interface

Design Elements

The impression of the interface is centered around feeling of anonymity & trust.

Mystery and reliability concepts were combined into the user interface accordance with the apps’ mission. Platform was designed to ensure user desirability and design aesthetics.

Buttons & Links
Icons
Bars
Inputs & Keyboards
Sections & Cards
Desktop App

To Sum up

Your Phone, Your Server

Raven don’t want to know your name, your email nor your GSM.

All you need is decide to your Raven ID & password. That’s all! We give you a 12-Word Phrase so you can use it as a backup plan. All your activities protected with end-to-end encryption & filters.

CREDITS 

Project Team

Product Designer
Berkay ALKIŞEL

Visual Designer
Kaan YURTBAŞI

Researcher
Hazal ULUSOY

Project Manager
Youssef Said

THANK YOU

For Watching

Share My Work

Berkay Alkışel

Product Designer

I'm Available For

#ux #service #system #game #play #permaculture #sustainability #ecology #furniture #lighting #workshop #mentoring #bring_it_on

Follow me

Contact me