Changes between Version 6 and Version 7 of org/meetings/2014WinterDevMeeting/notes/UserStories

Feb 18, 2014, 4:18:36 PM (6 years ago)



  • org/meetings/2014WinterDevMeeting/notes/UserStories

    v6 v7  
    1010Some more good information is here:
     12Some of the ideas below are taken from the Tor website's team work on Personas:
    1415**User Stories**
    3233Religious minorities who live in areas that are unfriendly to those with their beliefs need a way to learn more about and express their faith. This can be everything from atheists in Oklahoma to Orthodox Christians in Iran.
     35The Student has recently heard about Tor and would like to discover more about it. Particularly he has heard from a friend that it could be used to protect his web browsing whilst using the university campus public wifi.
     37The Journalist has been writing about online privacy for the past year and would like to write a feature about Tor. Although she has previously experimented with Tor's browser bundle she would like further information of how the Tor infrastructure functions and the technical details behind how it enables online anonymity.
     39The Researcher works for a think tank. She has been a user of Tor since December 2011 and is a strong proponent for an open web. Since finding out about Tor, Stephanie has become involved in the Tor community contributing fixes and features to the Tor code base and engaging with other Tor contributers using the mailing lists and IRC.
     41The Donor has read about Tor in the local newspaper and would very much like to make a donation.
     43The Engineer has been a Tor Relay Operator for a little over a year and has encouraged two of his colleagues to do the same.
     45The Activist would like to comment anonymously on the Internet and not link her personal accounts to her activism work. She would like to use Tor to achieve this.
     47The Dissident lives under an oppressive regime which heavily filters the internet. He is very aware of the consequences to himself and his family if he is discovered. He is hesitant to use Tor without knowledge of how it works and what its limitations are (ie. an adversary that monitors Internet connections).