fix
All checks were successful
/ mirror (push) Successful in 4s

This commit is contained in:
stcb 2025-02-19 12:22:38 +00:00
parent 4773a2550e
commit 6eb59622a3

View File

@ -46,32 +46,43 @@
- Trust shift
## Beta Testing Scenarii
- Call from Icing dialer to another dialer (Google, Apple...)
- Normal call from Icing dialer to another Icing dialer
- Encrypted call from Icing dialer to another Icing dialer
- Normal call from Icing dialer to a contact that has an Icing public key but
not Icing dialer
## Beta Testing Scenarios
- Clear call from Icing dialer to another dialer (Google, Apple...)
- Clear call from Icing dialer to another Icing dialer
- Clear call from Icing dialer to an icing pubkey-known contact but without Icing dialer
- Encrypted call from Icing dialer to a known contact with Icing dialer
- Encrypted call from Icing dialer to an unknown contact with Icing dialer
- Create / Edit / Save contact with(out) public key
- Export contact as QR code / VCF
- Import contact
- Share contact as QR code / Vcard
- Import contact from QR code / Vcard
- Listen to voicemail
- Record encrypted call and check the encryption
- Change default SIM
## User Journeys
Karen, a 45 years-old mom just divorced from her husband. She wants to call her
layer about who is going to have custody of the children. The husband always
records and listens to the private conversations of her wife. To make sure he
cannot get any information, she uses Icing dialer to call her lawyer and
encrypt the full conversation.
Paul, a 22 years-old developer is currently working for the U.S. Government, on
a top secret project. He decides to go to China, for vacations but everything
goes wrong! His application is failing in the middle of the day and no one is
qualified to fix it. Paul doesn't have WiFi but he has an international plan
for his phone. With Icing dialer, he can call his company and help fix the
problem safe from potential Chinese spies.
Mathilda, 34 years-old, connects to her PayPal account from a new device.
To authenticate herself, PayPal sends her a code on her voicemail.
Mathilda being aware of the risks of this technology, she has set up strong Icing authentication with her network provider by registering a pair of her Icing public keys.
When she calls her voicemail, Icing protocol is triggered and checks for her key authentication ;
it will fail if the caller does not pocesses the required Icing keys.
Mathilda is thus the only one granted access, and she can retreive her PayPal code securely.
Jeff, 70 years-old, calls his bank after he had a problem on his bank app.
The remote bank advisor asks him to authenticate, making him type his password on the phone dialer.
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
but also that the call is coming from Jeff's phone and not an impersonator.
Elise is a 42 years-old extreme reporter.
After interviewing Ukrainian opposition's leader, the SBU (ex KGB) are looking for her accross the whole country.
She hides in western moutains near Romania, and she barely receive cellular network.
She suspects her phone line to be monitored, so the best she can do to call for extraction safely, is to use her Icing dialer.
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
With Icing dialer, he can call his collegues and help fix the
problem, safe from potential Chinese spies.
## Evaluation Criteria
- Can a private key be generated