Skip to content
This repository has been archived by the owner on Oct 6, 2023. It is now read-only.

6. User manual

nereasainzdelamaza edited this page Nov 30, 2019 · 27 revisions

In this page we will explain how to use ASSAP. ASSAP aims to protect all kind of people, including people without computing or security knowledge. So, there

First of all, when launching the app, the user must activate the camera and uncover the camera if it is covered. The application will be placed in the upper right corner, in order not to disturb user. However, it is draggable to place it where least bothers in each moment.

Furthermore, in the menu bar, there is an incognito button to minimize the window. This incognito mode can also be enabled by a shortcut ⌘M or ⌃M depending on the OS.

When clicking on the Play button, a box highlights the user's face because the app detects a person face.

At the top bar we can find the recording control. If we press the stop button, the recording would stop (and it also switches off the laptop's camera LED). And we have the close button that closes the application.

At the right side there is a drop down to select the actions to be done when detecting a possible shoulder surfing attack. These actions are:

  • Send a notification
  • Reduce screen brightness to difficult the vision of the screen content.
  • Block the laptop, which is the most restrictive action.

At the right corner, there is a Configuration button. This button resizes the window to easily configure advanced options.

To access this functionality, it is necessary to provide an authentication to avoid other people editing these options. So the first time using ASSAP, you will be asked for the PASSWORD that will be necessary in the incoming times when updating the options. The password must be alphanumeric and the minimum characters is 6.

Apart from setting the password, the first time the configuration starts, it will require user facial descriptor to set him/her as the computer owner. The user must follow the instruction, as shown below:

  1. Start configuration

  1. Start the training

  1. Verify the training

  1. If there is a problem when configuring initial setup, it is necessary to repeat the process.

The first tab is Alerts. The 3 possible new alerts are the following ones:

  • Sending an email to Gmail accounts
  • Telegram notification
  • Slack notification

In these cases the user must enter the data requested to enable the alerts. In the Configuration section you can find the steps to obtain the requested data (such as telegram chat_id, token, slack webhook...).

The second tab is Identity. Here, the user could configure who is authorized to see screen content by adding, editting or deleting people. Moreover, it is possible to deselect people without deleting them. (This feature is under construction).

If the person in front of the laptop is not the owner, it will appear the following notification.

In the third tab, the user can choose the minimum time (in seconds) between alerts in order not to spam with hundreds of notifications in a small amount of time.

Clone this wiki locally