68 lines
2.2 KiB
Markdown
68 lines
2.2 KiB
Markdown
# Beta Test Plan
|
|
|
|
## Core Functionalities
|
|
### Icing lib
|
|
- Key generation
|
|
- (De)crypt audio
|
|
|
|
### Icing dialer (based on Icing lib)
|
|
- Call
|
|
- Encrypted if public key available
|
|
- Call history
|
|
|
|
- Contacts
|
|
- Contact creation / editing
|
|
- Contact sharing via QR code / VCF
|
|
- Contact search
|
|
- Favorite contacts
|
|
- Storage of user public keys
|
|
- Blocked number
|
|
- Contact preview (picture, number, public key...)
|
|
|
|
- Visual voicemail
|
|
- Play / Pause
|
|
- Notification
|
|
- Quick link to call, text, block, share number...
|
|
|
|
- SIM settings
|
|
- Default SIM
|
|
|
|
- SMS?
|
|
|
|
## Beta Testing Scenarii
|
|
- Call from Icing dialer to another dialer (Google, Apple...)
|
|
- Normal call from Icing dialer to another Icing dialer
|
|
- Encrypted call from Icing dialer to another Icing dialer
|
|
- Normal call from Icing dialer to a contact that has an Icing public key but
|
|
not Icing dialer
|
|
- Create / Edit / Save contact with(out) public key
|
|
- Export contact as QR code / VCF
|
|
- Import contact
|
|
- Listen to voicemail
|
|
- Record encrypted call and check the encryption
|
|
- Change default SIM
|
|
|
|
## User Journeys
|
|
Karen, a 45 years-old mom just divorced from her husband. She wants to call her
|
|
layer about who is going to have custody of the children. The husband always
|
|
records and listens to the private conversations of her wife. To make sure he
|
|
cannot get any information, she uses Icing dialer to call her lawyer and
|
|
encrypt the full conversation.
|
|
|
|
Paul, a 22 years-old developer is currently working for the U.S. Government, on
|
|
a top secret project. He decides to go to China, for vacations but everything
|
|
goes wrong! His application is failing in the middle of the day and no one is
|
|
qualified to fix it. Paul doesn't have WiFi but he has an international plan
|
|
for his phone. With Icing dialer, he can call his company and help fix the
|
|
problem safe from potential Chinese spies.
|
|
|
|
## Evaluation Criteria
|
|
- Can a private key be generated
|
|
- Can a normal call be made?
|
|
- Can an encrypted call be made?
|
|
- Can a contact be created / edited / imported / exported?
|
|
- Can a voicemail be listened to?
|
|
- Is the encryption fast enough, light enough to be usable (audible call)
|
|
- Is the encryption strong enough not to be deciphered by a modern (as of 2025)
|
|
supercomputer?
|