Jump to content
Toggle sidebar
Logos
Search
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information
Editing
Design/Stakeholder Requirements (StRS)
(section)
Page
Discussion
English
Read
Edit
View history
More
Read
Edit
View history
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== 2.3.3 User Roles and Characteristics === '''Table 2-1: User Roles and Characteristics''' {| class="wikitable" |- ! Role ! Characteristics ! Requirements ! Values |- | Privacy Advocates | * Deep expertise in privacy tech<br>- Strong cryptography knowledge<br>- Experience with Tor/I2P/Monero<br>- Zero-trust mindset<br>- Active in privacy education | * Zero metadata collection<br>- End-to-end encryption<br>- Anonymous routing<br>- Zero-knowledge proofs<br>- Secure key management | * Privacy as human right<br>- Personal sovereignty<br>- Data minimization<br>- Resistance to surveillance<br>- Community education |- | Digital Rights Activists | * Decentralization expertise<br>- Anti-censorship experience<br>- Open source advocacy<br>- Focus on digital freedoms<br>- Community organizing skills | * Censorship resistance<br>- Network neutrality<br>- Community governance<br>- Transparent operations<br>- Whistleblower protection | * Information freedom<br>- Network sovereignty<br>- Open protocols<br>- User autonomy<br>- Collective action |- | Cybersecurity Experts | * Security research background<br>- Malware analysis skills<br>- Penetration testing experience<br>- Protocol design expertise<br>- Threat modeling focus | * Security testing tools<br>- Isolated environments<br>- Audit capabilities<br>- Incident response<br>- Defense in depth | * Security by design<br>- Responsible disclosure<br>- Continuous learning<br>- Technical excellence<br>- Knowledge sharing |- | Financial Sovereignists | * Cryptocurrency expertise<br>- Privacy coin experience<br>- Trading background<br>- Economic theory knowledge<br>- Market analysis skills | * Private transactions<br>- Fungible exchange<br>- Market tools<br>- Economic sovereignty<br>- Trading privacy | * Financial privacy<br>- Economic freedom<br>- Market autonomy<br>- Value preservation<br>- Voluntary exchange |- | Technical Developers | * Protocol development skills<br>- Privacy-focused design<br>- Cryptography expertise<br>- Formal verification exp<br>- Security architecture skills | * Private APIs<br>- Development tools<br>- Testing frameworks<br>- Security libraries<br>- Documentation | * Code quality<br>- Security first<br>- Privacy by design<br>- Open source<br>- Collaboration |- | Infrastructure Operators | * Network operations exp<br>- Security hardening skills<br>- Performance optimization<br>- Resource management<br>- Threat mitigation | * Monitoring tools<br>- Security metrics<br>- Resource controls<br>- Update management<br>- Incident response | * Network resilience<br>- Operational security<br>- Resource efficiency<br>- Service reliability<br>- Sustainable ops |- | Community Leaders | * Strong communication skills<br>- Governance experience<br>- Consensus building ability<br>- Privacy advocacy<br>- Educational focus | * Governance tools<br>- Privacy-preserving voting<br>- Secure communications<br>- Educational platforms<br>- Decision frameworks | * Community autonomy<br>- Transparent governance<br>- Knowledge sharing<br>- Collective decisions<br>- Privacy preservation |} <span id="operational-environment"></span>
Summary:
Please note that all contributions to Logos may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Logos:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)