Ideal Permissions UX #7
Replies: 1 comment 4 replies
-
I've got a first rough draft of a "How To Ask Permission" decision tree. Realized part way into it that there are at least two separate audiences for this: System Designers and Application Designers. System Designers are working on the protocol or operating system, and are establishing the ground rules and constraints for how permissions should be addressed. And then Application Designers play within those constraints. Lots has changed in the ~10 years since that initial decision tree was produced. In the present moment I think that the mobile OS's are doing a lot more to de-risk the system up front, and make it so that there is mostly only one mechanism to use for any given permission. Then there are a number of guidelines that suggest appropriate tactics for Application Designers to follow, given their specific context and need. Next step for this decision tree, I think, is to consider more specifically how this applies to the blockchain space and wallet clients specifically — as they are somewhere between System and Application. But first I'm gonna switch gears and work on some ReCap UI flows. |
Beta Was this translation helpful? Give feedback.
-
In #5 we discussed the need for more ideal permissions flows. During the presentation of ReCap, the review of How To Ask Permission, and the rich discussion that occurred in between, a few proposals for "bluesky" permissions flows came up.
We agreed at the end of the call to start prototyping these, and review them on the next call to try and assess how they succeed, and what technical roadblocks they may be impeded by.
Things we want to consider:
An initial list of things to prototype or diagram:
Beta Was this translation helpful? Give feedback.
All reactions