Compare commits

..

No commits in common. "9acce5d2d15f1ed6a82a44d91054a6f8d55da1fd" and "831e1d49a3e526d96c78456165fb379528fee2d3" have entirely different histories.

View File

@ -27,13 +27,14 @@ The protocol definition will include as completed:
- Handshakes - Handshakes
- Real-time data-stream encryption (and decryption) - Real-time data-stream encryption (and decryption)
- Encrypted stream compression - Encrypted stream compression
- Transmission over audio stream (at least one modulation type) - Transmission over audio stream
- First steps in FEC (Forward Error Correction): detecting half of transmission errors - Minimal error correction in audio-based transmission
- Error handling and user prevention
And should include prototype or scratches functionalities, among which: And should include prototype or scratches functionalities, among which:
- Embedded silent data transmission (such as DTMF) - Embedded silent data transmission (silently transmit light data during an encrypted phone call)
- On-the-fly key exchange (does not require prior key exchange, sacrifying some security) - On-the-fly key exchange (does not require prior key exchange, sacrifying some security)
- Stronger FEC: detecting >80%, correcting 20% of transmission errors - Strong error correction
#### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation) #### The Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
@ -127,15 +128,16 @@ The remote bank advisor asks him to authenticate, making him type his password o
By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely, By using the Icing protocol, not only would Jeff and the bank be assured that the informations are transmitted safely,
but also that the call is coming from Jeff's phone and not an impersonator. but also that the call is coming from Jeff's phone and not an impersonator.
Elise, 42 years-old, is a journalist covering sensitive topics. Elise is a 42 years-old extreme reporter.
Her work draws attention from people who want to know what she's saying - and to whom. After interviewing Russians opposition's leader, the FSB is looking to interview her.
Forced to stay discreet, with unreliable signal and a likely monitored phone line, She tries to stay discreet and hidden, but those measures constrains her to barely receive cellular network.
she uses Icing dialer to make secure calls without exposing herself. She suspects her phone line to be monitored, so the best she can do to call safely, is to use her Icing dialer.
Paul, a 22 years-old developer, is enjoying its vacations abroad. Paul, a 22 years-old developer working for a big company, decides to go to China for vacations.
But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is But everything goes wrong! The company's product he works on, is failling in the middle of the day and no one is
qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in his country. qualified to fix it. Paul doesn't have WiFi and his phone plan only covers voice calls in China.
With Icing dialer, he can call his collegues and help fix the problem, completely safe. With Icing dialer, he can call his collegues and help fix the
problem, safe from potential Chinese spies.
## Evaluation Criteria ## Evaluation Criteria
### Protocol and lib ### Protocol and lib