From 6eb59622a321d216254e40322eec8ce60f24c38c Mon Sep 17 00:00:00 2001 From: stcb <21@stcb.cc> Date: Wed, 19 Feb 2025 12:22:38 +0000 Subject: [PATCH] fix --- docs/BetaTestPlan.md | 49 +++++++++++++++++++++++++++----------------- 1 file changed, 30 insertions(+), 19 deletions(-) diff --git a/docs/BetaTestPlan.md b/docs/BetaTestPlan.md index d8c00fc..4a1e76f 100644 --- a/docs/BetaTestPlan.md +++ b/docs/BetaTestPlan.md @@ -46,32 +46,43 @@ - Trust shift -## Beta Testing Scenarii -- Call from Icing dialer to another dialer (Google, Apple...) -- Normal call from Icing dialer to another Icing dialer -- Encrypted call from Icing dialer to another Icing dialer -- Normal call from Icing dialer to a contact that has an Icing public key but - not Icing dialer +## Beta Testing Scenarios +- Clear call from Icing dialer to another dialer (Google, Apple...) +- Clear call from Icing dialer to another Icing dialer +- Clear call from Icing dialer to an icing pubkey-known contact but without Icing dialer +- Encrypted call from Icing dialer to a known contact with Icing dialer +- Encrypted call from Icing dialer to an unknown contact with Icing dialer - Create / Edit / Save contact with(out) public key -- Export contact as QR code / VCF -- Import contact +- Share contact as QR code / Vcard +- Import contact from QR code / Vcard - Listen to voicemail - Record encrypted call and check the encryption - Change default SIM ## User Journeys -Karen, a 45 years-old mom just divorced from her husband. She wants to call her -layer about who is going to have custody of the children. The husband always -records and listens to the private conversations of her wife. To make sure he -cannot get any information, she uses Icing dialer to call her lawyer and -encrypt the full conversation. -Paul, a 22 years-old developer is currently working for the U.S. Government, on -a top secret project. He decides to go to China, for vacations but everything -goes wrong! His application is failing in the middle of the day and no one is -qualified to fix it. Paul doesn't have WiFi but he has an international plan -for his phone. With Icing dialer, he can call his company and help fix the -problem safe from potential Chinese spies. +Mathilda, 34 years-old, connects to her PayPal account from a new device. +To authenticate herself, PayPal sends her a code on her voicemail. +Mathilda being aware of the risks of this technology, she has set up strong Icing authentication with her network provider by registering a pair of her Icing public keys. +When she calls her voicemail, Icing protocol is triggered and checks for her key authentication ; +it will fail if the caller does not pocesses the required Icing keys. +Mathilda is thus the only one granted access, and she can retreive her PayPal code securely. + +Jeff, 70 years-old, calls his bank after he had a problem on his bank app. +The remote bank advisor asks him to authenticate, making him type his password on the phone dialer. +By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely, +but also that the call is coming from Jeff's phone and not an impersonator. + +Elise is a 42 years-old extreme reporter. +After interviewing Ukrainian opposition's leader, the SBU (ex KGB) are looking for her accross the whole country. +She hides in western moutains near Romania, and she barely receive cellular network. +She suspects her phone line to be monitored, so the best she can do to call for extraction safely, is to use her Icing dialer. + +Paul, a 22 years-old developer working for a big company, decides to go to China for vacations. +But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is +qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China. +With Icing dialer, he can call his collegues and help fix the +problem, safe from potential Chinese spies. ## Evaluation Criteria - Can a private key be generated