Skip to main content

Getting Started

Welcome to JERC Sentry, the real-time telephony security platform designed to protect vulnerable individuals from voice-based scams and fraud. Unlike traditional call blockers, JERC Sentry acts as a proactive network-level intermediary that analyzes calls in real-time and empowers caregivers to intervene when threats are detected.


How It Works: The 4-Step Shield

JERC Sentry provides a multi-layered defense strategy that operates entirely in the background:

  1. Intercept: Unknown calls are automatically routed through our secure Telnyx-powered backbone using Conditional Call Forwarding (CCF).
  2. Analyze: Our AI pipeline (powered by Deepgram and Groq) converts speech to text and analyzes the conversation context for social engineering patterns (e.g., manufactured urgency, financial requests).
  3. Warn: If a threat is detected, the Protectee hears a private "whisper" warning, and the Protector receives a high-priority push notification.
  4. Intervene: The Protector can review the AI's reasoning in the mobile app and choose to Join the Call or Terminate it remotely.

Choose Your Path

Depending on your role, follow one of the guides below to get started with JERC Sentry.

I am a User (Protector or Protectee)

If you are setting up JERC Sentry to protect yourself or a loved one, start here:

  • Usage Guide: A step-by-step walkthrough for creating an account, configuring your iPhone, and mastering the intervention dashboard.
  • Features: Explore the core capabilities of the platform.
  • FAQ: Find answers to common questions about privacy, latency, and emergency calls.
  • Workflow: Visually walk through the primary user journey, exploring user actions, system responses and potential fail states.

I am a Developer or Beta Tester

If you are looking to install the platform from scratch or contribute to the codebase, follow these technical guides:

  • Setup Guide: Comprehensive instructions for launching the Backend, Mobile App, and Database.
  • Architecture: A deep dive into our system topology and tech stack.
  • Contributing: Learn how to report bugs, submit features, and join our development community.

Prerequisites for Beta

Before you begin, please ensure you meet the following requirements for the current beta release:

  • Protectee Device: Must be an iPhone (iOS 17+ recommended).
  • Protector Device: An Android or iOS device capable of running Flutter applications.
  • Carrier Support: The Protectee's carrier must support Conditional Call Forwarding (CCF).

Need Help?

If you encounter any issues during setup or usage, please Report a Bug through the Protector app or GitHub Issues, or reach out to the development team directly.