Co-authored-by: stcb <21@stcb.cc> Reviewed-on: #36 Co-authored-by: ange <ange@yw5n.com> Co-committed-by: ange <ange@yw5n.com>
This commit is contained in:
parent
6ada4f6e5c
commit
21f470a464
95
docs/BetaTestPlan.md
Normal file
95
docs/BetaTestPlan.md
Normal file
@ -0,0 +1,95 @@
|
|||||||
|
# Beta Test Plan
|
||||||
|
|
||||||
|
## Core Features
|
||||||
|
|
||||||
|
### Icing protocol
|
||||||
|
- Handshakes
|
||||||
|
- ECDH
|
||||||
|
- Compression
|
||||||
|
- Audio error correction
|
||||||
|
- In-call pubkey share
|
||||||
|
- Trust shifts
|
||||||
|
|
||||||
|
### Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
||||||
|
- Call
|
||||||
|
- Encrypted if public key available
|
||||||
|
- Allows users to share their public keys
|
||||||
|
- Normal call if conditions unment
|
||||||
|
- Encrypted and clear DTMF transmission
|
||||||
|
- SIM choice on call
|
||||||
|
- Call history
|
||||||
|
|
||||||
|
- Contacts
|
||||||
|
- Contact creation / editing
|
||||||
|
- Contact sharing via QR code / VCF
|
||||||
|
- Contact search
|
||||||
|
- Favorite contacts
|
||||||
|
- Storage of user public keys
|
||||||
|
- Blocked number
|
||||||
|
- Contact preview (picture, number, public key...)
|
||||||
|
|
||||||
|
- Visual voicemail
|
||||||
|
- Play / Pause
|
||||||
|
- Notification
|
||||||
|
- Quick link to call, text, block, share number...
|
||||||
|
|
||||||
|
- SIM settings
|
||||||
|
- Default SIM choice
|
||||||
|
|
||||||
|
- Asymetric Keys
|
||||||
|
- Secure storage
|
||||||
|
- Generation at startup if missing
|
||||||
|
- Full key management
|
||||||
|
- Secure generation
|
||||||
|
- Exportation on creation (insecure generation)
|
||||||
|
- Importation
|
||||||
|
- Trust shift
|
||||||
|
|
||||||
|
|
||||||
|
## Beta Testing Scenarios
|
||||||
|
- Clear call from Icing dialer to another dialer (Google, Apple...)
|
||||||
|
- Clear call from Icing dialer to another Icing dialer
|
||||||
|
- Clear call from Icing dialer to an icing pubkey-known contact but without Icing dialer
|
||||||
|
- Encrypted call from Icing dialer to a known contact with Icing dialer
|
||||||
|
- Encrypted call from Icing dialer to an unknown contact with Icing dialer
|
||||||
|
- Create / Edit / Save contact with(out) public key
|
||||||
|
- Share contact as QR code / Vcard
|
||||||
|
- Import contact from QR code / Vcard
|
||||||
|
- Listen to voicemail
|
||||||
|
- Record encrypted call and check the encryption
|
||||||
|
- Change default SIM
|
||||||
|
|
||||||
|
## User Journeys
|
||||||
|
|
||||||
|
Mathilda, 34 years-old, connects to her PayPal account from a new device.
|
||||||
|
To authenticate herself, PayPal sends her a code on her voicemail.
|
||||||
|
Mathilda being aware of the risks of this technology, she has set up strong Icing authentication with her network provider by registering a pair of her Icing public keys.
|
||||||
|
When she calls her voicemail, Icing protocol is triggered and checks for her key authentication ;
|
||||||
|
it will fail if the caller does not pocesses the required Icing keys.
|
||||||
|
Mathilda is thus the only one granted access, and she can retreive her PayPal code securely.
|
||||||
|
|
||||||
|
Jeff, 70 years-old, calls his bank after he had a problem on his bank app.
|
||||||
|
The remote bank advisor asks him to authenticate, making him type his password on the phone dialer.
|
||||||
|
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
||||||
|
but also that the call is coming from Jeff's phone and not an impersonator.
|
||||||
|
|
||||||
|
Elise is a 42 years-old extreme reporter.
|
||||||
|
After interviewing Ukrainian opposition's leader, the SBU (ex KGB) are looking for her accross the whole country.
|
||||||
|
She hides in western moutains near Romania, and she barely receive cellular network.
|
||||||
|
She suspects her phone line to be monitored, so the best she can do to call for extraction safely, is to use her Icing dialer.
|
||||||
|
|
||||||
|
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
|
||||||
|
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
||||||
|
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
|
||||||
|
With Icing dialer, he can call his collegues and help fix the
|
||||||
|
problem, safe from potential Chinese spies.
|
||||||
|
|
||||||
|
## Evaluation Criteria
|
||||||
|
- Can a private key be generated
|
||||||
|
- Can a normal call be made?
|
||||||
|
- Can an encrypted call be made?
|
||||||
|
- Can a contact be created / edited / imported / exported?
|
||||||
|
- Can a voicemail be listened to?
|
||||||
|
- Is the encryption fast enough, light enough to be usable (audible call)
|
||||||
|
- Is the encryption strong enough not to be deciphered by a modern (as of 2025)
|
||||||
|
supercomputer?
|
Loading…
Reference in New Issue
Block a user