انتقل إلى المحتوى الرئيسي

Scenarios of Use

Based on common questions from users, we drafted a non exhaustive list of scenarios, and which Tella features could be useful for each one. This list is meant for general guidance, contact us if you would like our help with a risk assessment, and determining which features of Tella could be right for your context.

Crossing borders

Crossing borders could potentially imply a thorough search on your device, you can consider using:

  • Camouflage: If having Tella on your phone might raise suspicion, you can disguise it as another app.
  • Quick exit: To make sure Tella is locked.
  • Quick delete: To fully delete all content of your Tella vault.
  • Back up your files: Take into account that if you delete the content of your Tella vault, there is no way to restore it (unless backed up your files to another location).
  • Restrict unlock attempts: To reduce the risk of people trying to brute-force their access to Tella.

Data collection for organizations

Journalists, activists and human rights defenders use Tella to secure the data their team collects on the ground, while also allowing them to securely share the data with the organization they work with. Some common use cases are human rights documentation processes, sensitive journalist investigations or election monitoring processes. Some useful features can be:

  • Server Connections: Send information directly to Tella Web, Open Data Kit(ODK), Uwazi, Google Drive, Nextcloud or Dropbox. Some available features include structured submissions from multiple contributors, even in different locations. All server connections are offline-first.
  • Security features: Depending on the risk assessment for the users on the ground, additional security features could be helpful as well.
  • Organizational deployment support: We can help you decide what's the best security configuration for your users on the ground, choose a server connection, and help train your users.

Internet shutdowns

When there is an intentional disruption of internet access, or when the internet or intranet of a specific country or location is censored and cannot be trusted, you might find helpful:

  • Nearby Sharing: For sharing files locally, anonymously, between 2 devices with Tella, directly from one encrypted container to another.

Demonstrations, protests or raids

During large events there might be an increased risk of device confiscation (in order to try to delete evidence) or difficulties in communication. In these cases you might find helpful:

  • Nearby Sharing: For sharing files locally between 2 devices with Tella, directly from one encrypted container to another one, even when mobile networks might be are saturated or unavailable.
  • Quick delete: To fully delete all content of your Tella vault.
  • Back up your files: Take into account that if you delete the content of your Tella vault, there is no way to restore it (unless your files have been backed up to another location).
  • Restrict unlock attempts: To reduce the risk of people trying to brute-force their access to Tella.
  • Camouflage: If having Tella on your phone might raise suspicion, you can disguise it as another app.

Rural or low-connectivity areas

We build Tella centering the needs of people that don't have a reliable internet connection. Some helpful features might be:

  • Offline data collection: All our server connections are offline first, users on the ground can set up their server connection and save submissions either on Drafts or the Outbox tab, so those can be submitted as soon as the phone regains internet connection.
  • Nearby Sharing: For sharing files locally between 2 devices with Tella, directly from one encrypted container to another.