Compare commits
No commits in common. "9acce5d2d15f1ed6a82a44d91054a6f8d55da1fd" and "831e1d49a3e526d96c78456165fb379528fee2d3" have entirely different histories.
9acce5d2d1
...
831e1d49a3
@ -27,13 +27,14 @@ The protocol definition will include as completed:
|
|||||||
- Handshakes
|
- Handshakes
|
||||||
- Real-time data-stream encryption (and decryption)
|
- Real-time data-stream encryption (and decryption)
|
||||||
- Encrypted stream compression
|
- Encrypted stream compression
|
||||||
- Transmission over audio stream (at least one modulation type)
|
- Transmission over audio stream
|
||||||
- First steps in FEC (Forward Error Correction): detecting half of transmission errors
|
- Minimal error correction in audio-based transmission
|
||||||
|
- Error handling and user prevention
|
||||||
|
|
||||||
And should include prototype or scratches functionalities, among which:
|
And should include prototype or scratches functionalities, among which:
|
||||||
- Embedded silent data transmission (such as DTMF)
|
- Embedded silent data transmission (silently transmit light data during an encrypted phone call)
|
||||||
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
|
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
|
||||||
- Stronger FEC: detecting >80%, correcting 20% of transmission errors
|
- Strong error correction
|
||||||
|
|
||||||
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
||||||
|
|
||||||
@ -127,15 +128,16 @@ The remote bank advisor asks him to authenticate, making him type his password o
|
|||||||
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
|
||||||
but also that the call is coming from Jeff's phone and not an impersonator.
|
but also that the call is coming from Jeff's phone and not an impersonator.
|
||||||
|
|
||||||
Elise, 42 years-old, is a journalist covering sensitive topics.
|
Elise is a 42 years-old extreme reporter.
|
||||||
Her work draws attention from people who want to know what she's saying - and to whom.
|
After interviewing Russians opposition's leader, the FSB is looking to interview her.
|
||||||
Forced to stay discreet, with unreliable signal and a likely monitored phone line,
|
She tries to stay discreet and hidden, but those measures constrains her to barely receive cellular network.
|
||||||
she uses Icing dialer to make secure calls without exposing herself.
|
She suspects her phone line to be monitored, so the best she can do to call safely, is to use her Icing dialer.
|
||||||
|
|
||||||
Paul, a 22 years-old developer, is enjoying its vacations abroad.
|
Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
|
||||||
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
|
||||||
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in his country.
|
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
|
||||||
With Icing dialer, he can call his collegues and help fix the problem, completely safe.
|
With Icing dialer, he can call his collegues and help fix the
|
||||||
|
problem, safe from potential Chinese spies.
|
||||||
|
|
||||||
## Evaluation Criteria
|
## Evaluation Criteria
|
||||||
### Protocol and lib
|
### Protocol and lib
|
||||||
|
Loading…
Reference in New Issue
Block a user