...
- Ease of use (if it is hard to use, it won't be used)
- Transparency to the user (beyond authenticating at login or boot up)
- Recovery from forgotten passwords (don't loose the important data) and hardware failures
- Effective encryption to thwart a thief from getting sensitive data off the disk
- Ease of setup
The project is not focussed on:
- Protecting data from network attacks
- Securing data communication channels for sharing the data
...