
cyber security & Personal privacy
Encrypted Messaging
Messages and calls are always end-to-end encrypted and engineered to keep the communication safe. Raven can’t read the messages or see the calls, no one else can either.



1·Product
Business Models
Diversified services will be complex as Raven serves different parties -individuals, families & companies- it has a multi-sided business model.
—
Raven’s instant messaging service, video/calls, even filters, and VPN are all free but to some extent. The VPN will be solid but basic for freemium users, offering more deep security and flexibility for paid users.
It will have also the corporation/company accounts, all companies under GDPR or has any banking/trading users data, will have to use In-house servers for mailing and chat/data transfers.

Security

Community

Anonymity

2·Research
So-Called Encryption
One of the supposed benefits of encryption is, for better or worse, being able to prevent government and law enforcement from accessing your data.
—
The messages sent on WhatsApp are end-to-end encrypted. This means that only the device, and that of the recipient, can decode them. However, this doesn’t secure them once they are decrypted on the device.
In 2016, WhatsApp updated its Privacy Policy to allow sharing of data from WhatsApp to Facebook. They also stated that none of your information would publicly visible on Facebook, implying that it would instead be hidden in Facebook’s inaccessible profile of you.
Unencrypted Backups
—


2·Research
In-House Concerns
Due to the widespread popularity of chat apps, there is now a fair bit of concern from companies about their use for business purposes.
—
The survey found that 65% of respondents were concerned that chat apps represented a security loophole and that half were troubled by their inability to monitor their employees’ communications. Alarmingly, 41% of respondents did not know which of their employees were using chat apps.
The overwhelming majority of respondents (76%) provided an internal secure mobile messaging app. Skype for Business was the most widely deployed secure messaging app (74%), followed by Cisco’s Spark (9%).
Secure Enterprise
—


3·Technology
P2P Communication
Raven wants to deliver a message that how it’s emphasizing on valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
STUN-TURN Server: The software responsible for collecting peers’ connection details to send it to the signaling server so that the peer will communicate those details with all interested peers to enable them to communicate directly.
Signaling Server: The software responsible for organizing the communication initiation process between peers. After making the handshake between the peers whenever needed, all communications go directly between peers devices.
WebRTC Channel
—


4·Interaction
Encrypted Account
Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
No GSM, No E-mail: You simply sign up to the system by specifying a username and a password.
12-Word Verification: When the device is lost or you want to connect from another device, you use the 12 words given to you. You can only log in to your Raven account on one device at a time.
Reputation Model: Account built on a gamified reputation mechanics to create an atmosphere of trust in the community and to prevent spam accounts.
Personalized Standards
—

4·Interaction
Safe Communication
Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
Adding Contacts: In Raven, unless users know your username, they won’t be able to find your account in any way. You have full control over the steps.
Channel Security Level: You can personalize the privacy & security settings of each channel. For example, you can prevent someone from sharing your account while allowing them to take a screenshot of the conversation. Or vice versa. Many options are available!
In-Channel Notifications: You’ll be notified of events or violations by receiving information notifications while you’re in a channel.
Confident Touch
—

4·Interaction
Custom Security
Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
Account Security Level: Each setting was rated according to its impact on overall security, so users can know their security settings under their control. With this method, a general security level score was achieved which aimed to make the users feel safer.
Get Away Code: Everyone can have secrets. With this feature, you can clean the application according to the options you select, as if it never existed on that device. In case of emergency, if you enter your code (Get Away Code) instead of your main code (Passcode), you will fall to Get Away screen.
Micro-Managing Security: Each feature should be customizable for maximum safety feeling, even the smallest one.
Piece by Piece
—

4·Interaction
Micro Precautions
Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
Passtags: If you have assigned a tag to a contact or group channel, they remain confidential regardless of search results. To access these channels, you must type at least one of the assigned Passtag in the search bar.
Countdown: If the messages contain confidentiality or will not be needed again, you can set the countdown feature to get the messages disappear.
Emoji Code: The other party can be informed before answering the call by the emojis that you have previously determined with each other. For example, 4 mustaches = My father is with me. 4 sirens = The police are listening.
Face & Voice Filters: You can maximize your anonymity with voice and face filters. Identify the filters before each call and start the conversation.
Precaution Examples
—

4·Interaction
Group Chats
Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
Private Group: Ideal for groups of family and friends. There is no hierarchy or admin. The group can only be joined by invitation.
Business Group: Ideal for business deals. Admin acts as a mediator. Each incoming message is approved by the admin before it falls into the channel. The group can only be joined by invitation.
Public Group: Ideal for large communities. There are admins and moderators. The group can be set to invite-only or public. Call features run as broadcast by admins.
Need-Oriented Groups
—

4·Interaction
Assured Sharing
Raven wants to deliver a message that it’s emphasizing on how valuable users data & private life, how companies taking those away and how Raven is born to solve those problems.
—
File Manager: Download only the desired file types in cellular data. You can also set the types to auto-delete at specified time intervals.
Filtered Voice: You can filter the instant audio files.
Share My Location: You can turn on the passcode request feature before giving the application your current location.
Contact Sharing: You can allow nobody, some people, or anyone to share your Raven username.
File Types
—

5·Interface
Brand Identity
Inspired by the night & the raven for reinforcing the concept of privacy.
—
A well-designed identity is the key to doing business in the modern digital world. The app is a source of information to users who look for secure services. But the concept should make a desirable trust impression to convert the users into loyal customers.
Logotype
—


Colors
—
#5856D6
#7148B3
#131C26
#E9EAEF
#FF3B30
#FF9500
#4CD964
#5AC8FA
Typography
—
Aa
1 2 3 4 5 6 7 8 9 0
Avenir Next Regular
Aa
1 2 3 4 5 6 7 8 9 0
Avenir Next Semi-Bold
Aa
1 2 3 4 5 6 7 8 9 0
Avenir Next Bold

5·Interface
Design Elements
The impression of the interface is centered around feeling of anonymity & trust.
—
Mystery and reliability concepts were combined into the user interface accordance with the apps’ mission. Platform was designed to ensure user desirability and design aesthetics.
Buttons & Links
—

Icons
—

Bars
—

Inputs & Keyboards
—

Sections & Cards
—

Desktop App
—
To Sum up
Your Phone, Your Server
Raven don’t want to know your name, your email nor your GSM.
—
All you need is decide to your Raven ID & password. That’s all! We give you a 12-Word Phrase so you can use it as a backup plan. All your activities protected with end-to-end encryption & filters.


CREDITS
Project Team
Product Designer
Berkay ALKIŞEL
Visual Designer
Kaan YURTBAŞI
Researcher
Hazal ULUSOY
Project Manager
Youssef Said