From 80e5b06495f4107f0562bc45e08ad9d7430dc562 Mon Sep 17 00:00:00 2001 From: stcb <21@stcb.cc> Date: Thu, 12 Jun 2025 18:59:00 +0200 Subject: [PATCH] Updating Icing.md --- README.md | 2 +- docs/Icing.md | 39 ++++++++++++++++++--------------------- website/tmpl/vars.tmpl | 4 ---- 3 files changed, 19 insertions(+), 26 deletions(-) diff --git a/README.md b/README.md index 76bb4d2..a4215a2 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ An Epitech Innovation Project *By* -**Bartosz Michalak - Alexis Danlos - Florian Griffon - Ange Duhayon - Stéphane Corbière** +**Bartosz Michalak - Alexis Danlos - Florian Griffon - Stéphane Corbière** --- diff --git a/docs/Icing.md b/docs/Icing.md index 739ee8f..415fd23 100644 --- a/docs/Icing.md +++ b/docs/Icing.md @@ -3,7 +3,7 @@ An Epitech Innovation Project *By* -**Bartosz Michalak - Alexis Danlos - Florian Griffon - Ange Duhayon - Stéphane Corbière** +**Bartosz Michalak - Alexis Danlos - Florian Griffon - Stéphane Corbière** --- @@ -17,13 +17,25 @@ An Epitech Innovation Project ## Introduction to Icing -Icing is the name of our project, which is divided in **two interconnected goals**: -1. Provide an end-to-end (E2E) encryption **code library**, based on Eliptic Curve Cryptography (ECC), to encrypt phone-calls on an **analog audio** level. -2. Provide a reference implementation in the form of a totally seamless Android **smartphone dialer** application, that anybody could use without being aware of its encryption feature. +Icing is the name of our project, which is divided in **three interconnected goals**: +1. Build a mutual-authentication and end-to-end encryption protocol, NAAP, for half and full-duplex audio communication, network agnostic. Network Agnostic Authentication Protocol. +2. Provide a reference implementation in the form of an **Android Package**, that anybody can use to implement the protocol into their application. +3. Provide a reference implementation in the form of an **Android Dialer**, that uses the android package, and that could seamlessly replace any Android user's default dialer. -This idea came naturally to our minds, when we remarked the lack of such tool. -Where "private messaging" and other "encrypted communication" apps flourish, nowadays, they **all** require an internet access to work. +### Setting a new security standard + +#### ***"There is no way to create a backdoor that only the good guys can walk through"*** +> (*Meredith Whittaker - President of Signal Fundation - July 2023, Channel 4*) + +Enabling strong authentication on the phone network, either cellular or cable, would change the way we use our phone. + +Reduced phone-related scams, simplified and safer banking or government services interactions, reduced dependency to the internet, and more, are the benefits both consumers and organizations would enjoy. + +Encrypting the data end-to-end increases security globally by a considerable factor, particularly in low-bandwidth / no internet areas, and the added privacy would benefit everyone. + + +--- ### Privacy and security in telecoms should not depend on internet availability. @@ -35,21 +47,6 @@ So in a real-world, stressful and harsh condition, affording privacy or security Our solution is for the every-man that is not even aware of its smart phone weakness, as well as for the activists or journalists surviving in hostile environment around the globe. -### Setting a new security standard - -#### ***"There is no way to create a backdoor that only the good guys can walk through"*** -> (*Meredith Whittaker - President of Signal Fundation - July 2023, Channel 4*) - -If the police can listen to your calls with a mandate, hackers can, without mandate. - -Many online platforms, such as online bank accounts, uses phone calls, or voicemails to drop security codes needed for authentication. The idea is to bring extra security, by requiring a second factor to authenticate the user, but most voicemails security features have been obsolete for a long time now. - -**But this could change with globalized end-to-end encryption.** - -This not only enables obfuscation of the transmitted audio data, but also hard peer authentication. -This means that if you are in an important call, where you could communicate sensitive information such as passwords, or financial orders, using Icing protocol you and your peer would know that there is no man in the middle, listening and stealing information, and that your correspondent really is who it says. - ---- ### Icing's strategy diff --git a/website/tmpl/vars.tmpl b/website/tmpl/vars.tmpl index fbc9680..ec34d5a 100644 --- a/website/tmpl/vars.tmpl +++ b/website/tmpl/vars.tmpl @@ -2,10 +2,6 @@ Alexis DANLOS {{end}} -{{define "ange"}} -Ange DUHAYON -{{end}} - {{define "bartosz"}} Bartosz MICHALAK {{end}}