IPFS Mobile Guidelines
  • Introduction
  • Context
    • Considerations for Mobile
    • Methodology
  • Application Survey
    • Mobile Browsers
      • Android Chrome
      • iOS Safari
    • Mobile Sharing Interaction
      • Android sharing
      • iOS sharing
    • Application Survey
      • ManyVerse
      • Sharedrop.io
      • Status
      • FrostWire
      • uTorrent Mobile
      • Haven
      • Fairdrop
    • Features Survey
    • Interaction Survey
    • Findings
  • User Research
    • Assumptions
    • Interviews
      • Experts
        • P2
        • P3
        • P7
        • P14
        • P15
      • Early Adopters
        • P1
        • P4
        • P5
        • P6
        • P8
        • P9
        • P10
        • P11
        • P12
        • P13
      • Potential Users
        • P16
        • P17
        • P18
        • P19
        • P20
        • P21
    • Findings
  • Design
    • Design Strategy
    • Design Workshop
    • Principles
      • Respect the device
      • Explain, don't overwhelm
      • Make privacy work for the user
      • Give control over data
      • Be seamless
    • Scenarios
      • The user onboards confidently with minimal technical knowledge
      • The user shares a file through another app
      • Large file sent to user
      • User plays a shared media file without wifi or mobile network
      • A user manages their chat identity
    • Findings
    • Credits
Powered by GitBook
On this page
  • Key findings
  • Interface and Interaction
  • Data and security
  • Interviews
  • P1
  • P4
  • P5
  • P6
  • P8
  • P9
  • P10
  • P11
  • P12
  • P13

Was this helpful?

  1. User Research
  2. Interviews

Early Adopters

Key findings

Interface and Interaction

  • Notifications should not be overwhelming when letting the user know what is going on

  • Managing files and structure is essential to the user

  • Syncing via cloud services and sending messages notifications are very important

Data and security

  • Single Sign-On is a good thing but how to manage it and be secure is not a simple thing

  • Desktop torrent use in the past was widespread, but in general, P2P is not used anymore

  • File security and backup is paramount, but it is less important who has the final file

  • Cloud services like Google products are easy to use but not trusted

  • Identity management is difficult even for advanced users

  • Privacy and security is crucial but how to manage it is challenging, varied and often put off till later

Interviews

P1

Mobile app designer and power user

P4

Technical writer for decentralisation and Open Source Software

P5

Product lead on health data applications

P6

Academic interested in and lecturing on media and blockchain

P8

Visualisation, data and graphic designer working in offline-first contexts

P9

Interaction designer working in blockchain and decentralised finance

P10

Policy centred on social change and data

P11

Technical architect and software developer

P12

Financier in tech startups

P13

Product and product marketing for crypto exchange

PreviousP15NextP1

Last updated 5 years ago

Was this helpful?

Read more
Read more
Read more
Read more
Read more
Read more
Read more
Read more
Read more
Read more