Sponsor 30 - Objective 3.4
Objective O3: Improve Tor Browser and bridges.torproject.org experience for human rights defenders under censorship.
O3.4: Learn target users’ needs, provide digital security training on circumvention tools, and carry in-person user research to document pain points.
In this Activity, we will expand existing training and research materials to include Tails, Orbot, and Onion Browser. We will then engage volunteers to localize these materials based on target countries and languages spoken in target regions. We will simultaneously coordinate with our on-the-ground partners, both established and new, to conduct initial research and user needs discovery, as well as schedule in-country activities. Then, we will travel to conduct in-person training and user research activities. Research activities include user needs discovery, threat modeling activities, usability testing, and surveys that all follow human-centered design practices. Finally, we will document collected user feedback and prepare for analysis in Activity 3.5.
- 3.4.1: Prepare training and testing materials.
- Integrate Tails, Orbot, and Onion Browser into existing training and testing materials.
- Coordinate with partners to understand target population needs.
- Update training slides with the relevant tools for each audience.
- Define usability tests for each tool to be conducted with target populations. ◦ Modify and/or localize existing materials to suit target populations. Materials include and are not limited to:
- Digital security training slides, usability tests, the Tor Project’s Community portal,1 and outreach and printed materials.
- Integrate Tails, Orbot, and Onion Browser into existing training and testing materials.
- 3.4.2: Organize and schedule training sessions.
- Contact and engage existing in-country partners.
- Reach out to additional organisations working with target populations.
- Organize workshop dates, venues, travel and accommodation in-country with new and existing partners.
- 3.4.3: Travel to target countries; conduct digital security training and user research.
- Conduct digital security training workshops, threat modeling sessions, usability tests, user needs discovery sessions, and collect feedback.
- 3.4.4: Document user feedback.
- Review participant feedback to identify improvements for Activity 3.5.
- Report on each workshop including details on:
- Date and location; Number of participants, disaggregated by gender, etc., when self-reported; audience type and/or breakdown when known; activities conducted during the workshop; and questions and feedback from participants.