{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T12:49:45Z","timestamp":1776084585753,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":80,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713980","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:35:25Z","timestamp":1745469325000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Security Knight in Shining Armor: What and Who VPN Providers Claim to Shield Consumers Against"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-0769-4046","authenticated-orcid":false,"given":"Felix","family":"Reichmann","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8226-4385","authenticated-orcid":false,"given":"Jens Christian","family":"Opdenbusch","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1400-5825","authenticated-orcid":false,"given":"Marco","family":"Gutfleisch","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Similarweb 2. 2024. Browsers Market Share. https:\/\/www.similarweb.com\/browsers\/. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"George\u00a0A. Akerlof. 1970. The Market for \"Lemons\": Quality Uncertainty and the Market Mechanism. The Quarterly Journal of Economics 84 3 (1970) 488\u2013500. http:\/\/www.jstor.org\/stable\/1879431","DOI":"10.2307\/1879431"},{"key":"e_1_3_3_2_4_2","first-page":"447","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Akgul Omer","year":"2021","unstructured":"Omer Akgul, Wei Bai, Shruti Das, and Michelle\u00a0L. Mazurek. 2021. Evaluating In-Workflow Messages for Improving Mental Models of End-to-End Encryption. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Virtual Event, 447\u2013464. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/akgul"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833633"},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3343413.3377990"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Abdullah Alshalan Sandeep Pisharody and Dijiang Huang. 2016. A Survey of Mobile VPN Technologies. IEEE Communications Surveys & Tutorials 18 2 (2016) 1177\u20131196. 10.1109\/COMST.2015.2496624","DOI":"10.1109\/COMST.2015.2496624"},{"key":"e_1_3_3_2_8_2","first-page":"106","volume-title":"2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX Association","author":"Appelbaum Jacob","year":"2012","unstructured":"Jacob Appelbaum, Marsh Ray, Karl Koscher, and Ian Finder. 2012. vpwns: Virtual pwned networks. In 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX Association. USENIX Association, Bellevue, WA, 106."},{"key":"e_1_3_3_2_9_2","unstructured":"UK\u00a0Advertising Standards\u00a0Authority (ASA). 2023. ASA Ruling on NordVPN SA t\/a NordVPN Norton 360. https:\/\/www.asa.org.uk\/rulings\/nordvpn-sa-a22-1168156-nordvpn-sa.html. Accessed: 2024-04-26."},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"e_1_3_3_2_11_2","unstructured":"Australian Government. 2010. Competition and Consumer Act 2010. Australian Government Legislation Website. https:\/\/www.legislation.gov.au\/C2004A00109\/latest\/text"},{"key":"e_1_3_3_2_12_2","first-page":"3433","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Binkhorst Veroniek","year":"2022","unstructured":"Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, and Katsiaryna Labunets. 2022. Security at the End of the Tunnel: The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3433\u20133450."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"crossref","unstructured":"Bram Bonn\u00e9 Gustavo Rovelo Peter Quax and Wim Lamotte. 2017. Insecure network unknown connection: understanding wi-fi privacy assumptions of mobile device users. Information 8 3 (2017) 76.","DOI":"10.3390\/info8030076"},{"key":"e_1_3_3_2_14_2","unstructured":"British Government. 2008. The Consumer Protection from Unfair Trading Regulations. Legislation.gov.uk. https:\/\/www.legislation.gov.uk\/uksi\/2008\/1277"},{"key":"e_1_3_3_2_15_2","unstructured":"British Government. 2010. The BCAP Code: The UK Code of Broadcast Advertising. ASA Website. https:\/\/www.asa.org.uk\/codes-and-rulings\/advertising-codes\/broadcast-code.html"},{"key":"e_1_3_3_2_16_2","unstructured":"British Government. 2014. The CAP Code: The UK Code of Non-broadcast Advertising and Direct & Promotional Marketing. ASA Website. https:\/\/www.asa.org.uk\/codes-and-rulings\/advertising-codes\/non-broadcast-code.html"},{"key":"e_1_3_3_2_17_2","unstructured":"California State Legislature. 1970. California Consumers Legal Remedies Act (CLRA). California Legislative Information Website. https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?lawCode=CIV&division=3.&title=1.5.&part=4.&chapter=3 Cal. Civ. Code \u00a7\u00a7 1750-1784."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"L\u00a0Jean Camp. 2009. Mental models of privacy and security. IEEE Technology and society magazine 28 3 (2009) 37\u201346.","DOI":"10.1109\/MTS.2009.934142"},{"key":"e_1_3_3_2_19_2","unstructured":"Canadian Government. 1985. Competition Act. Canadian Justice Laws Website. https:\/\/laws-lois.justice.gc.ca\/eng\/acts\/C-34\/"},{"key":"e_1_3_3_2_20_2","unstructured":"Gareth Corfield. 2019. NordVPN rapped by ad watchdog over insecure public Wi-Fi claims. https:\/\/www.theregister.com\/2019\/05\/01\/nordvpn_tv_ad_rapped_advertising_standards_authority\/. Accessed: 2024-04-26."},{"key":"e_1_3_3_2_21_2","volume-title":"The nature of explanation","author":"Craik Kenneth James\u00a0Williams","year":"1967","unstructured":"Kenneth James\u00a0Williams Craik. 1967. The nature of explanation. Vol.\u00a0445. CUP Archive, Cambridge,."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"David Crawshaw. 2020. Everything VPN is New Again: The 24-year-old security model has found a second wind. Queue 18 5 (Nov. 2020) 54\u201366. 10.1145\/3434571.3439745","DOI":"10.1145\/3434571.3439745"},{"key":"e_1_3_3_2_23_2","unstructured":"Fred\u00a0D Davis. 1985. A technology acceptance model for empirically testing new end-user information systems: Theory and results. PhD Thesis."},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23015"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23160"},{"key":"e_1_3_3_2_26_2","unstructured":"Yakup Durmaz and Ibrahim Diyarbak\u0131rl\u0131o\u011flu. 2011. A Theoritical Approach to the Strength of Motivation in Customer Behavior. Global Journal of Human Social Science 11 10 (2011) 36\u201342."},{"key":"e_1_3_3_2_27_2","first-page":"3451","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Dutkowska-\u017buk Agnieszka","year":"2022","unstructured":"Agnieszka Dutkowska-\u017buk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, and Nick Feamster. 2022. How and Why People Use Virtual Private Networks. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3451\u20133465. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/dutkowska-zuk"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"crossref","unstructured":"Matthias Fassl Alexander Ponticello Adrian Dabrowski and Katharina Krombholz. 2023. Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon. Proceedings of the ACM on Human-Computer Interaction 7 CSCW2 (2023) 1\u201326.","DOI":"10.1145\/3610193"},{"key":"e_1_3_3_2_29_2","unstructured":"Federal\u00a0Office for Information Security\u00a0Germany. 2008. Virtual private networks (VPNs). https:\/\/www.bsi.bund.de\/dok\/11349638"},{"key":"e_1_3_3_2_30_2","unstructured":"Python\u00a0Software Foundation. 2024. difflib \u2014 Helpers for computing deltas. https:\/\/docs.python.org\/3\/library\/difflib.html Accessed: 2024-04-22."},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Thomas Franke Christiane Attig and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35 6 (April 2019) 456\u2013467. 10.1080\/10447318.2018.1456150","DOI":"10.1080\/10447318.2018.1456150"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Sheila Frankel and Suresh Krishnan. 2011. IP Security (IPsec) and Internet Key Exchange (IKE) Document Roadmap. RFC 6071. 10.17487\/RFC6071","DOI":"10.17487\/RFC6071"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Sheila\u00a0E Frankel Paul Hoffman Angela\u00a0D Orebaugh and Richard Park. 2008. SP 800-113. Guide to SSL VPNs.","DOI":"10.6028\/NIST.SP.800-113"},{"key":"e_1_3_3_2_34_2","unstructured":"VERBI GmbH. 2024. MAXQDA | All-In-One Qualitative & Mixed Methods Data Analysis Tool. https:\/\/www.maxqda.com\/ Accessed: 2024-06-02."},{"key":"e_1_3_3_2_35_2","unstructured":"Google. 2024. HTTPS encryption on the web. https:\/\/transparencyreport.google.com\/https\/overview?hl=en. Accessed: 2024-04-28."},{"key":"e_1_3_3_2_36_2","unstructured":"Rae Hodge. 2020. Why you should be skeptical about a VPN\u2019s no-logs claims. https:\/\/www.cnet.com\/tech\/services-and-software\/why-you-should-be-skeptical-about-a-vpns-no-logs-claims\/. Accessed: 2024-04-09."},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987471"},{"key":"e_1_3_3_2_38_2","unstructured":"Gen\u00a0Digital Inc.2023. I don\u2019t care about cookies. https:\/\/addons.mozilla.org\/de\/firefox\/addon\/i-dont-care-about-cookies\/. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Bernard\u00a0J. Jansen Anna Brown and Marc Resnick. 2007. Factors relating to the decision to click on a sponsored link. Decis. Support Syst. 44 1 (Nov. 2007) 46\u201359. 10.1016\/j.dss.2007.02.009","DOI":"10.1016\/j.dss.2007.02.009"},{"key":"e_1_3_3_2_40_2","series-title":"Cognitive science series","volume-title":"Mental models: towards a cognitive science of language, inference, and consciousness (6. print ed.)","author":"Johnson-Laird Philip\u00a0Nicholas","year":"1983","unstructured":"Philip\u00a0Nicholas Johnson-Laird. 1983. Mental models: towards a cognitive science of language, inference, and consciousness (6. print ed.). Number\u00a06 in Cognitive science series. Harvard Univ. Press, Cambridge, Mass."},{"key":"e_1_3_3_2_41_2","first-page":"39","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278570"},{"key":"e_1_3_3_2_43_2","unstructured":"O Kuyoro\u00a0Shade O Okolie\u00a0Samuel and U Kanu\u00a0Richmond. 2012. Trends in Web-Based Search Engine. Journal of emerging trends in computing and information Sciences 3 6 (2012) 942\u2013948."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"George\u00a0F Loewenstein Elke\u00a0U Weber Christopher\u00a0K Hsee and Ned Welch. 2001. Risk as feelings. Psychological bulletin 127 2 (2001) 267.","DOI":"10.1037\/\/0033-2909.127.2.267"},{"key":"e_1_3_3_2_45_2","unstructured":"Prolific\u00a0Academic Ltd. 2024. Prolific. https:\/\/www.prolific.com\/ Accessed: 2024-06-01."},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 72 (Nov. 2019) 23\u00a0pages. 10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_47_2","unstructured":"John\u00a0R Michener Steven\u00a0D Mohan James\u00a0B Astrachan and David\u00a0R Hale. 2002. Snake-Oil Security Claims the Systematic Misrepresentation of Product Security in the E-Commerce Arena. Mich. Telecomm. & Tech. L. Rev. 9 (2002) 211."},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Enrique Murillo. 2017. Attitudes toward mobile search ads: a study among Mexican millennials. Journal of Research in Interactive Marketing 11 1 (2017) 91\u2013108.","DOI":"10.1108\/JRIM-06-2016-0061"},{"key":"e_1_3_3_2_49_2","unstructured":"Baiju Muthukadan. 2024. Selenium with Python. https:\/\/selenium-python.readthedocs.io\/. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Moses Namara Daricia Wilkinson Kelly Caine and Bart\u00a0P Knijnenburg. 2020. Emotional and practical considerations towards the adoption and abandonment of vpns as a privacy-enhancing technology. Proceedings on Privacy Enhancing Technologies 1 (2020) 83\u2013102.","DOI":"10.2478\/popets-2020-0006"},{"key":"e_1_3_3_2_51_2","unstructured":"New York State Senate. 1965. New York Penal Law. New York State Senate Website. https:\/\/www.nysenate.gov\/legislation\/laws\/PEN"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781315802725"},{"key":"e_1_3_3_2_53_2","unstructured":"Tesseract OCR. 2024. tesseract-ocr\/tesseract. https:\/\/github.com\/tesseract-ocr\/tesseract Accessed: 2024-06-02."},{"key":"e_1_3_3_2_54_2","unstructured":"Ontario Government. 2002. Ontario Consumer Protection Act. Ontario e-Laws. https:\/\/www.ontario.ca\/laws\/statute\/02c30"},{"key":"e_1_3_3_2_55_2","unstructured":"Inc OpenVPN. 2024. OpenVPN. https:\/\/openvpn.net\/"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Vasile\u00a0Claudiu Perta Marco Barbera Gareth Tyson Hamed Haddadi Alessandro Mei et\u00a0al. 2015. A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients. Proceedings on Privacy Enhancing Technologies 1 (2015) 77\u201391.","DOI":"10.1515\/popets-2015-0006"},{"key":"e_1_3_3_2_57_2","unstructured":"Quebec Government. 1971. Quebec Consumer Protection Act. Publications Quebec. https:\/\/www.legisquebec.gouv.qc.ca\/en\/document\/cs\/P-40.1"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24285"},{"key":"e_1_3_3_2_59_2","first-page":"5773","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Ramesh Reethika","year":"2023","unstructured":"Reethika Ramesh, Anjali Vyas, and Roya Ensafi. 2023. \" All of them claim to be the best\": Multi-perspective study of VPN users and VPN providers. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 5773\u20135789."},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_3_3_2_62_2","unstructured":"Republic of South Africa. 2008. Consumer Protection Act 68 of 2008. South African Government Website. https:\/\/www.gov.za\/documents\/consumer-protection-act Amended by Consumer Protection Amendment Act 2014."},{"key":"e_1_3_3_2_63_2","unstructured":"David Ruiz. 2021. 21 million free VPN users\u2019 data exposed. https:\/\/www.malwarebytes.com\/blog\/news\/2021\/03\/21-million-free-vpn-users-data-exposed. Accessed: 2024-04-09."},{"key":"e_1_3_3_2_64_2","volume-title":"PROCEEDINGS OF THE 12th ANNUAL CONFERENCE ON WORLD WIDE WEB APPLICATIONS","author":"Sabwa JM","year":"2010","unstructured":"JM Sabwa and M Weideman. 2010. Paid search engine versus organic results: young consumer preferences. In PROCEEDINGS OF THE 12th ANNUAL CONFERENCE ON WORLD WIDE WEB APPLICATIONS (Durban, South Africa). Cape Peninsula University of Technology, Durban, South Africa, 18\u00a0pages. https:\/\/digitalknowledge.cput.ac.za\/handle\/11189\/5047"},{"key":"e_1_3_3_2_65_2","unstructured":"First\u00a0Page Sage. 2024. Google Click-Through Rates (CTRs) by Ranking Position in 2024. https:\/\/firstpagesage.com\/reports\/google-click-through-rates-ctrs-by-ranking-position\/ Accessed: 2024-06-01."},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2016.7732456"},{"key":"e_1_3_3_2_67_2","unstructured":"Similarweb. 2023. Search Engines Market Share. https:\/\/www.similarweb.com\/engines\/. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61078-4_13"},{"key":"e_1_3_3_2_69_2","unstructured":"Statista. 2023. Marktanteile der meistgenutzten Suchmaschinen auf dem Desktop nach Page Views weltweit von Januar 2016 bis November 2023. https:\/\/de.statista.com\/statistik\/daten\/studie\/225953\/umfrage\/die-weltweit-meistgenutzten-suchmaschinen\/. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_70_2","unstructured":"Statista2. 2024. Marktanteile der meistgenutzten Browserversionen weltweit im M\u00e4rz 2024. https:\/\/de.statista.com\/statistik\/daten\/studie\/158095\/umfrage\/meistgenutzte-browser-im-internet-weltweit\/. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-1981-5_4"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","unstructured":"Peter Story Daniel Smullen Yaxing Yao Alessandro Acquisti Lorrie\u00a0Faith Cranor Norman Sadeh and Florian Schaub. 2021. Awareness Adoption and Misconceptions of Web Privacy Tools. Proceedings on Privacy Enhancing Technologies 2021 3 (July 2021) 308\u2013333. 10.2478\/popets-2021-0049","DOI":"10.2478\/popets-2021-0049"},{"key":"e_1_3_3_2_73_2","unstructured":"Wenley Tong Sebastian Gold Samuel Gichohi Mihai Roman and Jonathan Frankle. 2014. Why king george iii can encrypt."},{"key":"e_1_3_3_2_74_2","unstructured":"United States Congress. 1946. Lanham Act (Trademark Act of 1946). United States Code Title 15 Chapter 22. https:\/\/www.govinfo.gov\/content\/pkg\/USCODE-2021-title15\/html\/USCODE-2021-title15-chap22.htm 15 U.S.C. \u00a7\u00a7 1051-1127."},{"key":"e_1_3_3_2_75_2","unstructured":"vpn Mentor. 2020. Report: No-Log VPNs Reveal Users\u2019 Personal Data and Logs. https:\/\/www.vpnmentor.com\/blog\/report-free-vpns-leak\/. Accessed: 2024-04-09."},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278551"},{"key":"e_1_3_3_2_78_2","unstructured":"WhatsApp. 2024. About end-to-end encryption. https:\/\/faq.whatsapp.com\/820124435853543. Accessed: 2024-04-23."},{"key":"e_1_3_3_2_79_2","first-page":"395","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Wu Justin","year":"2018","unstructured":"Justin Wu and Daniel Zappala. 2018. When is a Tree Really a Truck? Exploring Mental Models of Encryption. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 395\u2013409. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/wu"},{"key":"e_1_3_3_2_80_2","first-page":"373","volume-title":"International Conference on Cryptology and Network Security","author":"Zhang Qi","year":"2017","unstructured":"Qi Zhang, Juanru Li, Yuanyuan Zhang, Hui Wang, and Dawu Gu. 2017. Oh-Pwn-VPN! security analysis of OpenVPN-based Android apps. In International Conference on Cryptology and Network Security. Springer International Publishing, Cham, 373\u2013389."},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:23Z","timestamp":1750298243000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":80,"alternative-id":["10.1145\/3706598.3713980","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713980","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}