<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[100% FREE RESOURCE]]></title><description><![CDATA[<p>100% FREE RESOURCE</p><p>A practical <a href="https://mastodon.social/tags/security" rel="tag">#<span>security</span></a> guide for your mesh.</p><p>For <a href="https://mastodon.social/tags/Reticulum" rel="tag">#<span>Reticulum</span></a> <a href="https://mastodon.social/tags/MeshCore" rel="tag">#<span>MeshCore</span></a> and <a href="https://mastodon.social/tags/Meshtastic" rel="tag">#<span>Meshtastic</span></a> node operators.</p><p><a href="https://mastodon.social/tags/OSINT" rel="tag">#<span>OSINT</span></a> exposure, active attack vectors, and how to harden the protocols against both.</p><p><div class="card col-md-9 col-lg-6 position-relative link-preview p-0">



<a href="https://nodestar.net/hardened-mesh-guide" title="The Hardened Mesh — Node Star Field Guide Vol. 10">
<img src="https://nodestar.net/68f0b1ba784eac66.png" class="card-img-top not-responsive" style="max-height: 15rem;" alt="Link Preview Image" />
</a>



<div class="card-body">
<h5 class="card-title">
<a href="https://nodestar.net/hardened-mesh-guide">
The Hardened Mesh — Node Star Field Guide Vol. 10
</a>
</h5>
<p class="card-text line-clamp-3">What OSINT operators can collect from your mesh, what attackers can do to it, and how to make both jobs harder. A practical security guide for Reticulum, MeshCore, and Meshtastic operators.</p>
</div>
<a href="https://nodestar.net/hardened-mesh-guide" class="card-footer text-body-secondary small d-flex gap-2 align-items-center lh-2">



<img src="https://nodestar.net/68f0b1ba784eac66.png" alt="favicon" class="not-responsive overflow-hiddden" style="max-width: 21px; max-height: 21px;" />



<p class="d-inline-block text-truncate mb-0">Node Star <span class="text-secondary">(nodestar.net)</span></p>
</a>
</div></p>]]></description><link>https://board.circlewithadot.net/topic/a1c13f8b-6753-4943-974d-1659079c0b83/100-free-resource</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 03:48:59 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/a1c13f8b-6753-4943-974d-1659079c0b83.rss" rel="self" type="application/rss+xml"/><pubDate>Mon, 13 Apr 2026 06:32:18 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to 100% FREE RESOURCE on Fri, 17 Apr 2026 20:31:51 GMT]]></title><description><![CDATA[<p><span><a href="/user/marsik%40witter.cz">@<span>marsik</span></a></span> <span><a href="https://mastodon.social/@nodestar">@<span>nodestar</span></a></span> <br />But it uses the same freq as many other things, it uses low power and messages could be sent through many different nodes. It dont think it is that easy to triangulate. But I am no expert in fox hunting.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/dupe/statuses/116421945695995001</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/dupe/statuses/116421945695995001</guid><dc:creator><![CDATA[dupe@infosec.exchange]]></dc:creator><pubDate>Fri, 17 Apr 2026 20:31:51 GMT</pubDate></item><item><title><![CDATA[Reply to 100% FREE RESOURCE on Mon, 13 Apr 2026 17:12:24 GMT]]></title><description><![CDATA[<p><span><a href="https://mastodon.social/@nodestar">@<span>nodestar</span></a></span> Pretty solid writeup! Maybe add the lack of forward secrecy (at least in meshcore I know about this) and that we must assume that all packets get logged all the time and forever.</p>]]></description><link>https://board.circlewithadot.net/post/https://chaos.social/users/djh/statuses/116398512204247049</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://chaos.social/users/djh/statuses/116398512204247049</guid><dc:creator><![CDATA[djh@chaos.social]]></dc:creator><pubDate>Mon, 13 Apr 2026 17:12:24 GMT</pubDate></item><item><title><![CDATA[Reply to 100% FREE RESOURCE on Mon, 13 Apr 2026 11:28:08 GMT]]></title><description><![CDATA[<p><span><a href="https://mastodon.social/@nodestar">@<span>nodestar</span></a></span> this is fantastic! Thanks for the comprehensive write-up. Even for hobby / personal uses It can be hard to understand what is actually private vs public in this space. It took me a while to sus this out when I was looking for a solution for my property.</p><p>We'll have to beg you to add SpectraMesh to the list too!</p>]]></description><link>https://board.circlewithadot.net/post/https://corteximplant.com/users/dumont/statuses/116397158469204889</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://corteximplant.com/users/dumont/statuses/116397158469204889</guid><dc:creator><![CDATA[dumont@corteximplant.com]]></dc:creator><pubDate>Mon, 13 Apr 2026 11:28:08 GMT</pubDate></item><item><title><![CDATA[Reply to 100% FREE RESOURCE on Mon, 13 Apr 2026 07:29:57 GMT]]></title><description><![CDATA[<p><span><a href="https://mastodon.social/@nodestar">@<span>nodestar</span></a></span> Btw, about <a href="https://witter.cz/tags/LoRa" rel="tag">#<span>LoRa</span></a> in general.</p><p>First, it is very low speed and gives the authorities plenty of time for triangulation. All the typical devices are also pretty much line of sight only (+ bounces).</p><p>Second, it is unusual enough to mark the user for questioning. Operating such device in paranoid society might become unpleasant at least.</p><p>As an activist I would probably prefer ethernet, landline (modem+ppp) or wifi as the transport layer. Ubiquous and so not suspicious. Hidden in the crowd.</p>]]></description><link>https://board.circlewithadot.net/post/https://witter.cz/users/marsik/statuses/116396221897307027</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://witter.cz/users/marsik/statuses/116396221897307027</guid><dc:creator><![CDATA[marsik@witter.cz]]></dc:creator><pubDate>Mon, 13 Apr 2026 07:29:57 GMT</pubDate></item><item><title><![CDATA[Reply to 100% FREE RESOURCE on Mon, 13 Apr 2026 07:08:22 GMT]]></title><description><![CDATA[<p><span><a href="https://mastodon.social/@nodestar">@<span>nodestar</span></a></span> I like the analysis, but wonder about identity spoofing. It is correct that you cannot impersonate a Reticulum address. But how do you share your current hash with others so they start trusting it? A social level impersonation (different hash, same claimed identity) is a valid attack vector too.</p><p>A scientifically fair comparison would include TOR that follows the same principles and is three decades older. Or the newest DTN option Bundle Protocol v7.</p>]]></description><link>https://board.circlewithadot.net/post/https://witter.cz/users/marsik/statuses/116396137047426017</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://witter.cz/users/marsik/statuses/116396137047426017</guid><dc:creator><![CDATA[marsik@witter.cz]]></dc:creator><pubDate>Mon, 13 Apr 2026 07:08:22 GMT</pubDate></item></channel></rss>