85 lines
2.7 KiB
Markdown
85 lines
2.7 KiB
Markdown
# Beta Test Plan
|
|
|
|
## Core Features
|
|
|
|
### Icing protocol
|
|
- Handshakes
|
|
- ECDH
|
|
- Compression
|
|
- Audio error correction
|
|
- In-call pubkey share
|
|
- Trust shifts
|
|
|
|
### Icing dialer (based on Icing kotlin library, an Icing protocol implementation)
|
|
- Call
|
|
- Encrypted if public key available
|
|
- Allows users to share their public keys
|
|
- Normal call if conditions unment
|
|
- Encrypted and clear DTMF transmission
|
|
- SIM choice on call
|
|
- Call history
|
|
|
|
- Contacts
|
|
- Contact creation / editing
|
|
- Contact sharing via QR code / VCF
|
|
- Contact search
|
|
- Favorite contacts
|
|
- Storage of user public keys
|
|
- Blocked number
|
|
- Contact preview (picture, number, public key...)
|
|
|
|
- Visual voicemail
|
|
- Play / Pause
|
|
- Notification
|
|
- Quick link to call, text, block, share number...
|
|
|
|
- SIM settings
|
|
- Default SIM choice
|
|
|
|
- Asymetric Keys
|
|
- Secure storage
|
|
- Generation at startup if missing
|
|
- Full key management
|
|
- Secure generation
|
|
- Exportation on creation (insecure generation)
|
|
- Importation
|
|
- Trust shift
|
|
|
|
|
|
## Beta Testing Scenarii
|
|
- Call from Icing dialer to another dialer (Google, Apple...)
|
|
- Normal call from Icing dialer to another Icing dialer
|
|
- Encrypted call from Icing dialer to another Icing dialer
|
|
- Normal call from Icing dialer to a contact that has an Icing public key but
|
|
not Icing dialer
|
|
- Create / Edit / Save contact with(out) public key
|
|
- Export contact as QR code / VCF
|
|
- Import contact
|
|
- Listen to voicemail
|
|
- Record encrypted call and check the encryption
|
|
- Change default SIM
|
|
|
|
## User Journeys
|
|
Karen, a 45 years-old mom just divorced from her husband. She wants to call her
|
|
layer about who is going to have custody of the children. The husband always
|
|
records and listens to the private conversations of her wife. To make sure he
|
|
cannot get any information, she uses Icing dialer to call her lawyer and
|
|
encrypt the full conversation.
|
|
|
|
Paul, a 22 years-old developer is currently working for the U.S. Government, on
|
|
a top secret project. He decides to go to China, for vacations but everything
|
|
goes wrong! His application is failing in the middle of the day and no one is
|
|
qualified to fix it. Paul doesn't have WiFi but he has an international plan
|
|
for his phone. With Icing dialer, he can call his company and help fix the
|
|
problem safe from potential Chinese spies.
|
|
|
|
## Evaluation Criteria
|
|
- Can a private key be generated
|
|
- Can a normal call be made?
|
|
- Can an encrypted call be made?
|
|
- Can a contact be created / edited / imported / exported?
|
|
- Can a voicemail be listened to?
|
|
- Is the encryption fast enough, light enough to be usable (audible call)
|
|
- Is the encryption strong enough not to be deciphered by a modern (as of 2025)
|
|
supercomputer?
|