The All Things Auth Podcast

{{ show.title }}Trailer Bonus Episode {{ selectedEpisode.number }}
{{ selectedEpisode.title }}
{{ displaySpeed }}x
{{ selectedEpisode.title }}
By {{ }}
Broadcast by


When at-risk communities around the world have a voice in the design and development of open-source security and privacy tools, they get more usable! Ashley explains how the USABLE project facilitates this mission.

Show Notes

Social media & website
Resources mentioned in episode
  • Jon Camfield published an article titled "Where did USABLE come from?" that explains the motivation for starting the organization.
  • The free USABLE Guidebook contains resources and activities to help trainers and facilitators to collect relevant and useful feedback from high-risk users.
  • The USABLE blog has a ton of posts about their mission and interviews with their partner organizations.
  • Ashley explained how USABLE gets hands-on help from design and user experience partners (Simply Secure and OKTHANKS) and accessibility partners (Accessibility Lab).
  • Ashley shared the story of working with Thomas, the lead developer of Mailvelope, an app that allows you to send end-to-end encrypted emails. Also, check out the Mailvelope Blog.
  • USABLE created detailed personas to help developers understand how to make their products more usable for at-risk communities around the world.
  • USABLE has also recently supported the Secure Drop, Orbot, and KeePass XC projects. The USABLE blog has great interviews with these projects.
You can find the host of The All Things Auth Podcast on Twitter @conorgil.

Canonical URL:

What is The All Things Auth Podcast?

Every 2 weeks, Conor Gilsenan hosts a conversation with creators, researchers, founders, and advocates who are working to improve the usability of security and privacy technologies.

Guests share what they are currently working on, how they got to where they are today, who they are trying to help, and what keeps them motivated to overcome challenges along the way.

The goal is for the rest of us to learn from their experiences and go on to promote usable security and privacy within our own projects and organizations.