Compare commits
2 Commits
831e1d49a3
...
9acce5d2d1
Author | SHA1 | Date | |
---|---|---|---|
9acce5d2d1 | |||
22941f78d0 |
@ -27,14 +27,13 @@ The protocol definition will include as completed:
|
|||||||
- Handshakes
|
- Handshakes
|
||||||
- Real-time data-stream encryption (and decryption)
|
- Real-time data-stream encryption (and decryption)
|
||||||
- Encrypted stream compression
|
- Encrypted stream compression
|
||||||
- Transmission over audio stream
|
- Transmission over audio stream (at least one modulation type)
|
||||||
- Minimal error correction in audio-based transmission
|
- First steps in FEC (Forward Error Correction): detecting half of transmission errors
|
||||||
- Error handling and user prevention
|
|
||||||
|
|
||||||
And should include prototype or scratches functionalities, among which:
|
And should include prototype or scratches functionalities, among which:
|
||||||
- Embedded silent data transmission (silently transmit light data during an encrypted phone call)
|
- Embedded silent data transmission (such as DTMF)
|
||||||
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
|
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
|
||||||
- Strong error correction
|
- Stronger FEC: detecting >80%, correcting 20% of transmission errors
|
||||||
|
|
||||||
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
||||||
|
|
||||||
@ -128,16 +127,15 @@ The remote bank advisor asks him to authenticate, making him type his password o
|
|||||||
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
||||||
but also that the call is coming from Jeff's phone and not an impersonator.
|
but also that the call is coming from Jeff's phone and not an impersonator.
|
||||||
|
|
||||||
Elise is a 42 years-old extreme reporter.
|
Elise, 42 years-old, is a journalist covering sensitive topics.
|
||||||
After interviewing Russians opposition's leader, the FSB is looking to interview her.
|
Her work draws attention from people who want to know what she's saying - and to whom.
|
||||||
She tries to stay discreet and hidden, but those measures constrains her to barely receive cellular network.
|
Forced to stay discreet, with unreliable signal and a likely monitored phone line,
|
||||||
She suspects her phone line to be monitored, so the best she can do to call safely, is to use her Icing dialer.
|
she uses Icing dialer to make secure calls without exposing herself.
|
||||||
|
|
||||||
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
|
Paul, a 22 years-old developer, is enjoying its vacations abroad.
|
||||||
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
||||||
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
|
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in his country.
|
||||||
With Icing dialer, he can call his collegues and help fix the
|
With Icing dialer, he can call his collegues and help fix the problem, completely safe.
|
||||||
problem, safe from potential Chinese spies.
|
|
||||||
|
|
||||||
## Evaluation Criteria
|
## Evaluation Criteria
|
||||||
### Protocol and lib
|
### Protocol and lib
|
||||||
|
Loading…
Reference in New Issue
Block a user