OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Profile

Recent contributions

(1)

Contribution list

This entry is a nod to the puzzle-like nature of what it means to be a hacker. Many moves can be made & which are we most vulnerable to?

This entry is a nod to the puzzle-like nature of what it means to be a hacker. Many moves can be made & which are we most vulnerable to?

Photo of Tj Chase
5 8

Recent comments

(2) View all
link

Tj commented on Hacker: 1 | Consumer: 0

Thanks a lot for the feedback, John! I've already started thinking about some possibilities to push this forward. I really appreciate it and have gladly lent some thoughts on your entry as well! :)

link

Tj commented on What is appropriate encryption?

Hi John, I agree with Jean in that I think the first concept is the strongest and easiest to build on. (however, i 100% enjoyed the story of your trek in Africa) I like the idea of dispelling the idea that just covering up your keyboard as you type in your info is enough to protect yourself too. From experience, though, encryption can definitely be difficult to communicate visually. I think it would be interesting to think of the monitor in your sketch as a decoy screen or something in that same vein? Just something that communicates the misdirection and protection that encryption offers?