Loading [MathJax]/extensions/tex2jax.js

A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Authors

  • Sandra Höltervennhoff
  • Noah Wöhler
  • Arne Möhle
  • Marten Oltrogge
  • Yasemin Acar
  • Sascha Fahl

Research Organisations

External Research Organisations

  • CISPA Helmholtz Center for Information Security
  • Tutao GmbH
  • Paderborn University
  • George Washington University

Details

Original languageEnglish
Title of host publicationProceedings of the 33rd USENIX Security Symposium
Pages7267-7284
Number of pages18
ISBN (electronic)9781939133441
Publication statusPublished - 14 Aug 2024
Event33rd USENIX Security Symposium, USENIX Security 2024 - Philadelphia, United States
Duration: 14 Aug 202416 Aug 2024

Abstract

Recovery codes are a popular backup mechanism for online services to aid users who lost their passwords or two-factor authentication tokens in regaining access to their accounts or encrypted data. Especially for end-to-end encrypted services, recovery codes are a critical feature, as the service itself cannot access the encrypted user data and help users regain access. The way end-users manage recovery codes is not well understood. Hence, we investigate end-user perceptions and management strategies of recovery codes. Therefore, we survey users of an end-to-end encrypted email service provider, deploying recovery codes for accounts and encrypted data recovery in case of authentication credential loss. We performed an online survey with 281 users. In a second study, we analyzed 196 support requests on Reddit. Most of our participants stored the service provider's recovery code. We could identify six strategies for saving it, with using a password manager being the most widespread. Participants were generally satisfied with the service provider's recovery code. However, while they appreciated its security, its usability was lacking. We found obstacles, such as losing access to the recovery code or non-functioning recovery codes and security misconceptions. These often resulted from users not understanding the underlying security implications, e.g., that the support cannot access or restore their unencrypted data.

ASJC Scopus subject areas

Cite this

A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. / Höltervennhoff, Sandra; Wöhler, Noah; Möhle, Arne et al.
Proceedings of the 33rd USENIX Security Symposium. 2024. p. 7267-7284.

Research output: Chapter in book/report/conference proceedingConference contributionResearchpeer review

Höltervennhoff, S, Wöhler, N, Möhle, A, Oltrogge, M, Acar, Y, Wiese, O & Fahl, S 2024, A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. in Proceedings of the 33rd USENIX Security Symposium. pp. 7267-7284, 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, United States, 14 Aug 2024. <https://www.usenix.org/conference/usenixsecurity24/presentation/h%C3%B6ltervennhoff>
Höltervennhoff, S., Wöhler, N., Möhle, A., Oltrogge, M., Acar, Y., Wiese, O., & Fahl, S. (2024). A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. In Proceedings of the 33rd USENIX Security Symposium (pp. 7267-7284) https://www.usenix.org/conference/usenixsecurity24/presentation/h%C3%B6ltervennhoff
Höltervennhoff S, Wöhler N, Möhle A, Oltrogge M, Acar Y, Wiese O et al. A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. In Proceedings of the 33rd USENIX Security Symposium. 2024. p. 7267-7284
Höltervennhoff, Sandra ; Wöhler, Noah ; Möhle, Arne et al. / A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service. Proceedings of the 33rd USENIX Security Symposium. 2024. pp. 7267-7284
Download
@inproceedings{c5a801a9c34541e7a5ebaeaeecb45bf5,
title = "A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service",
abstract = "Recovery codes are a popular backup mechanism for online services to aid users who lost their passwords or two-factor authentication tokens in regaining access to their accounts or encrypted data. Especially for end-to-end encrypted services, recovery codes are a critical feature, as the service itself cannot access the encrypted user data and help users regain access. The way end-users manage recovery codes is not well understood. Hence, we investigate end-user perceptions and management strategies of recovery codes. Therefore, we survey users of an end-to-end encrypted email service provider, deploying recovery codes for accounts and encrypted data recovery in case of authentication credential loss. We performed an online survey with 281 users. In a second study, we analyzed 196 support requests on Reddit. Most of our participants stored the service provider's recovery code. We could identify six strategies for saving it, with using a password manager being the most widespread. Participants were generally satisfied with the service provider's recovery code. However, while they appreciated its security, its usability was lacking. We found obstacles, such as losing access to the recovery code or non-functioning recovery codes and security misconceptions. These often resulted from users not understanding the underlying security implications, e.g., that the support cannot access or restore their unencrypted data.",
author = "Sandra H{\"o}ltervennhoff and Noah W{\"o}hler and Arne M{\"o}hle and Marten Oltrogge and Yasemin Acar and Oliver Wiese and Sascha Fahl",
note = "Publisher Copyright: {\textcopyright} USENIX Security Symposium 2024.All rights reserved.; 33rd USENIX Security Symposium, USENIX Security 2024 ; Conference date: 14-08-2024 Through 16-08-2024",
year = "2024",
month = aug,
day = "14",
language = "English",
pages = "7267--7284",
booktitle = "Proceedings of the 33rd USENIX Security Symposium",

}

Download

TY - GEN

T1 - A Mixed-Methods Study on User Experiences and Challenges of Recovery Codes for an End-to-End Encrypted Service

AU - Höltervennhoff, Sandra

AU - Wöhler, Noah

AU - Möhle, Arne

AU - Oltrogge, Marten

AU - Acar, Yasemin

AU - Wiese, Oliver

AU - Fahl, Sascha

N1 - Publisher Copyright: © USENIX Security Symposium 2024.All rights reserved.

PY - 2024/8/14

Y1 - 2024/8/14

N2 - Recovery codes are a popular backup mechanism for online services to aid users who lost their passwords or two-factor authentication tokens in regaining access to their accounts or encrypted data. Especially for end-to-end encrypted services, recovery codes are a critical feature, as the service itself cannot access the encrypted user data and help users regain access. The way end-users manage recovery codes is not well understood. Hence, we investigate end-user perceptions and management strategies of recovery codes. Therefore, we survey users of an end-to-end encrypted email service provider, deploying recovery codes for accounts and encrypted data recovery in case of authentication credential loss. We performed an online survey with 281 users. In a second study, we analyzed 196 support requests on Reddit. Most of our participants stored the service provider's recovery code. We could identify six strategies for saving it, with using a password manager being the most widespread. Participants were generally satisfied with the service provider's recovery code. However, while they appreciated its security, its usability was lacking. We found obstacles, such as losing access to the recovery code or non-functioning recovery codes and security misconceptions. These often resulted from users not understanding the underlying security implications, e.g., that the support cannot access or restore their unencrypted data.

AB - Recovery codes are a popular backup mechanism for online services to aid users who lost their passwords or two-factor authentication tokens in regaining access to their accounts or encrypted data. Especially for end-to-end encrypted services, recovery codes are a critical feature, as the service itself cannot access the encrypted user data and help users regain access. The way end-users manage recovery codes is not well understood. Hence, we investigate end-user perceptions and management strategies of recovery codes. Therefore, we survey users of an end-to-end encrypted email service provider, deploying recovery codes for accounts and encrypted data recovery in case of authentication credential loss. We performed an online survey with 281 users. In a second study, we analyzed 196 support requests on Reddit. Most of our participants stored the service provider's recovery code. We could identify six strategies for saving it, with using a password manager being the most widespread. Participants were generally satisfied with the service provider's recovery code. However, while they appreciated its security, its usability was lacking. We found obstacles, such as losing access to the recovery code or non-functioning recovery codes and security misconceptions. These often resulted from users not understanding the underlying security implications, e.g., that the support cannot access or restore their unencrypted data.

UR - http://www.scopus.com/inward/record.url?scp=85199002660&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:85199002660

SP - 7267

EP - 7284

BT - Proceedings of the 33rd USENIX Security Symposium

T2 - 33rd USENIX Security Symposium, USENIX Security 2024

Y2 - 14 August 2024 through 16 August 2024

ER -