parent
4773a2550e
commit
6eb59622a3
@ -46,32 +46,43 @@
|
|||||||
- Trust shift
|
- Trust shift
|
||||||
|
|
||||||
|
|
||||||
## Beta Testing Scenarii
|
## Beta Testing Scenarios
|
||||||
- Call from Icing dialer to another dialer (Google, Apple...)
|
- Clear call from Icing dialer to another dialer (Google, Apple...)
|
||||||
- Normal call from Icing dialer to another Icing dialer
|
- Clear call from Icing dialer to another Icing dialer
|
||||||
- Encrypted call from Icing dialer to another Icing dialer
|
- Clear call from Icing dialer to an icing pubkey-known contact but without Icing dialer
|
||||||
- Normal call from Icing dialer to a contact that has an Icing public key but
|
- Encrypted call from Icing dialer to a known contact with Icing dialer
|
||||||
not Icing dialer
|
- Encrypted call from Icing dialer to an unknown contact with Icing dialer
|
||||||
- Create / Edit / Save contact with(out) public key
|
- Create / Edit / Save contact with(out) public key
|
||||||
- Export contact as QR code / VCF
|
- Share contact as QR code / Vcard
|
||||||
- Import contact
|
- Import contact from QR code / Vcard
|
||||||
- Listen to voicemail
|
- Listen to voicemail
|
||||||
- Record encrypted call and check the encryption
|
- Record encrypted call and check the encryption
|
||||||
- Change default SIM
|
- Change default SIM
|
||||||
|
|
||||||
## User Journeys
|
## User Journeys
|
||||||
Karen, a 45 years-old mom just divorced from her husband. She wants to call her
|
|
||||||
layer about who is going to have custody of the children. The husband always
|
|
||||||
records and listens to the private conversations of her wife. To make sure he
|
|
||||||
cannot get any information, she uses Icing dialer to call her lawyer and
|
|
||||||
encrypt the full conversation.
|
|
||||||
|
|
||||||
Paul, a 22 years-old developer is currently working for the U.S. Government, on
|
Mathilda, 34 years-old, connects to her PayPal account from a new device.
|
||||||
a top secret project. He decides to go to China, for vacations but everything
|
To authenticate herself, PayPal sends her a code on her voicemail.
|
||||||
goes wrong! His application is failing in the middle of the day and no one is
|
Mathilda being aware of the risks of this technology, she has set up strong Icing authentication with her network provider by registering a pair of her Icing public keys.
|
||||||
qualified to fix it. Paul doesn't have WiFi but he has an international plan
|
When she calls her voicemail, Icing protocol is triggered and checks for her key authentication ;
|
||||||
for his phone. With Icing dialer, he can call his company and help fix the
|
it will fail if the caller does not pocesses the required Icing keys.
|
||||||
problem safe from potential Chinese spies.
|
Mathilda is thus the only one granted access, and she can retreive her PayPal code securely.
|
||||||
|
|
||||||
|
Jeff, 70 years-old, calls his bank after he had a problem on his bank app.
|
||||||
|
The remote bank advisor asks him to authenticate, making him type his password on the phone dialer.
|
||||||
|
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
||||||
|
but also that the call is coming from Jeff's phone and not an impersonator.
|
||||||
|
|
||||||
|
Elise is a 42 years-old extreme reporter.
|
||||||
|
After interviewing Ukrainian opposition's leader, the SBU (ex KGB) are looking for her accross the whole country.
|
||||||
|
She hides in western moutains near Romania, and she barely receive cellular network.
|
||||||
|
She suspects her phone line to be monitored, so the best she can do to call for extraction safely, is to use her Icing dialer.
|
||||||
|
|
||||||
|
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
|
||||||
|
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
||||||
|
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
|
||||||
|
With Icing dialer, he can call his collegues and help fix the
|
||||||
|
problem, safe from potential Chinese spies.
|
||||||
|
|
||||||
## Evaluation Criteria
|
## Evaluation Criteria
|
||||||
- Can a private key be generated
|
- Can a private key be generated
|
||||||
|
Loading…
Reference in New Issue
Block a user