Compare commits

...

2 Commits

Author SHA1 Message Date
9acce5d2d1 Merge branch 'dev' into callNotifications
All checks were successful
/ mirror (push) Successful in 4s
2025-04-17 12:26:13 +00:00
22941f78d0 Argiliser exemples (#53)
All checks were successful
/ mirror (push) Successful in 4s
Reviewed-on: #53
2025-04-15 12:54:41 +00:00

View File

@ -27,14 +27,13 @@ The protocol definition will include as completed:
- Handshakes - Handshakes
- Real-time data-stream encryption (and decryption) - Real-time data-stream encryption (and decryption)
- Encrypted stream compression - Encrypted stream compression
- Transmission over audio stream - Transmission over audio stream (at least one modulation type)
- Minimal error correction in audio-based transmission - First steps in FEC (Forward Error Correction): detecting half of transmission errors
- Error handling and user prevention
And should include prototype or scratches functionalities, among which: And should include prototype or scratches functionalities, among which:
- Embedded silent data transmission (silently transmit light data during an encrypted phone call) - Embedded silent data transmission (such as DTMF)
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security) - On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
- Strong error correction - Stronger FEC: detecting >80%, correcting 20% of transmission errors
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation) #### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
@ -128,16 +127,15 @@ The remote bank advisor asks him to authenticate, making him type his password o
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely, By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
but also that the call is coming from Jeff's phone and not an impersonator. but also that the call is coming from Jeff's phone and not an impersonator.
Elise is a 42 years-old extreme reporter. Elise, 42 years-old, is a journalist covering sensitive topics.
After interviewing Russians opposition's leader, the FSB is looking to interview her. Her work draws attention from people who want to know what she's saying - and to whom.
She tries to stay discreet and hidden, but those measures constrains her to barely receive cellular network. Forced to stay discreet, with unreliable signal and a likely monitored phone line,
She suspects her phone line to be monitored, so the best she can do to call safely, is to use her Icing dialer. she uses Icing dialer to make secure calls without exposing herself.
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations. Paul, a 22 years-old developer, is enjoying its vacations abroad.
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China. qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in his country.
With Icing dialer, he can call his collegues and help fix the With Icing dialer, he can call his collegues and help fix the problem, completely safe.
problem, safe from potential Chinese spies.
## Evaluation Criteria ## Evaluation Criteria
### Protocol and lib ### Protocol and lib