Silent Circle approached Novoda to partner with the release of the all new Blackphone 2 — a business phone that encrypts all communication, making it the most secure smartphone on the planet. Novoda was called to design and build one of the core experiences of the new Blackphone: the device setup wizard.
The Blackphone 2 is a mobile device that allows its owner to secure all communication. It encrypts voice codes, messages, wi-fi connections, and anything that involves location tracking. Whether you’re a journalist preserving sensitive information, a businessman who routinely handles valuable client data, or simply someone who values personal security, the Blackphone ensures that all your data is stored and transfered securely.
What we did
Novoda was presented with the task of creating a setup wizard that configures the device the first time the phone is started. It allows users to select a language, configure the network configuration, and install updates. The user can add both a Google and a Silent Circle account. If they already have credentials, they can log in, otherwise they can register immediately. The phone is encrypted from the start, but during configuration, a user may add a security PIN or password to lock the screen while in standby as an additional security measure.
The older version of the Blackphone also had a setup wizard, of course. Consensus was that it worked well, but for the Blackphone 2, the aim was to ensure that the new setup process was flawless.
First impressions count. The first challenge for any person with a new device is setting it up and, for a device entrusted with your secure data, the stakes are even higher. A bug in those first screens could crash the setup wizard, potentially even leaving the phone unable to boot. Would trust that your phone’s data was secure if the first thing it did when starting up was crash?
Research & Review
Research is crucial when creating the user-experience of great software. Initial questions we addressed were: how do you set up your phone? Which parameters does the setup require to make it usable? What are the mental models of various users during configuration? How do you create a flawless setup experience that feels professional and secure?
Expert reviews on the user experience and a thorough knowledge of AOSP, along with an evaluation of prior code, helped us to get an understanding of the tasks at hand.