Reviewed-on: #53
This commit is contained in:
parent
b9dd156eca
commit
22941f78d0
@ -27,14 +27,13 @@ The protocol definition will include as completed:
|
||||
- Handshakes
|
||||
- Real-time data-stream encryption (and decryption)
|
||||
- Encrypted stream compression
|
||||
- Transmission over audio stream
|
||||
- Minimal error correction in audio-based transmission
|
||||
- Error handling and user prevention
|
||||
- Transmission over audio stream (at least one modulation type)
|
||||
- First steps in FEC (Forward Error Correction): detecting half of transmission errors
|
||||
|
||||
And should include prototype or scratches functionalities, among which:
|
||||
- Embedded silent data transmission (silently transmit light data during an encrypted phone call)
|
||||
- Embedded silent data transmission (such as DTMF)
|
||||
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
|
||||
- Strong error correction
|
||||
- Stronger FEC: detecting >80%, correcting 20% of transmission errors
|
||||
|
||||
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
||||
|
||||
@ -128,16 +127,15 @@ The remote bank advisor asks him to authenticate, making him type his password o
|
||||
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
||||
but also that the call is coming from Jeff's phone and not an impersonator.
|
||||
|
||||
Elise is a 42 years-old extreme reporter.
|
||||
After interviewing Russians opposition's leader, the FSB is looking to interview her.
|
||||
She tries to stay discreet and hidden, but those measures constrains her to barely receive cellular network.
|
||||
She suspects her phone line to be monitored, so the best she can do to call safely, is to use her Icing dialer.
|
||||
Elise, 42 years-old, is a journalist covering sensitive topics.
|
||||
Her work draws attention from people who want to know what she's saying - and to whom.
|
||||
Forced to stay discreet, with unreliable signal and a likely monitored phone line,
|
||||
she uses Icing dialer to make secure calls without exposing herself.
|
||||
|
||||
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
|
||||
Paul, a 22 years-old developer, is enjoying its vacations abroad.
|
||||
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
||||
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
|
||||
With Icing dialer, he can call his collegues and help fix the
|
||||
problem, safe from potential Chinese spies.
|
||||
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in his country.
|
||||
With Icing dialer, he can call his collegues and help fix the problem, completely safe.
|
||||
|
||||
## Evaluation Criteria
|
||||
### Protocol and lib
|
||||
|
Loading…
Reference in New Issue
Block a user