Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. 100% FREE RESOURCE

100% FREE RESOURCE

Scheduled Pinned Locked Moved Uncategorized
securityreticulummeshcoremeshtasticosint
6 Posts 5 Posters 4 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • nodestar@mastodon.socialN This user is from outside of this forum
    nodestar@mastodon.socialN This user is from outside of this forum
    nodestar@mastodon.social
    wrote on last edited by
    #1

    100% FREE RESOURCE

    A practical #security guide for your mesh.

    For #Reticulum #MeshCore and #Meshtastic node operators.

    #OSINT exposure, active attack vectors, and how to harden the protocols against both.

    Link Preview Image
    The Hardened Mesh — Node Star Field Guide Vol. 10

    What OSINT operators can collect from your mesh, what attackers can do to it, and how to make both jobs harder. A practical security guide for Reticulum, MeshCore, and Meshtastic operators.

    favicon

    Node Star (nodestar.net)

    Link Preview Image
    marsik@witter.czM dumont@corteximplant.comD djh@chaos.socialD 4 Replies Last reply
    0
    • nodestar@mastodon.socialN nodestar@mastodon.social

      100% FREE RESOURCE

      A practical #security guide for your mesh.

      For #Reticulum #MeshCore and #Meshtastic node operators.

      #OSINT exposure, active attack vectors, and how to harden the protocols against both.

      Link Preview Image
      The Hardened Mesh — Node Star Field Guide Vol. 10

      What OSINT operators can collect from your mesh, what attackers can do to it, and how to make both jobs harder. A practical security guide for Reticulum, MeshCore, and Meshtastic operators.

      favicon

      Node Star (nodestar.net)

      Link Preview Image
      marsik@witter.czM This user is from outside of this forum
      marsik@witter.czM This user is from outside of this forum
      marsik@witter.cz
      wrote on last edited by
      #2

      @nodestar I like the analysis, but wonder about identity spoofing. It is correct that you cannot impersonate a Reticulum address. But how do you share your current hash with others so they start trusting it? A social level impersonation (different hash, same claimed identity) is a valid attack vector too.

      A scientifically fair comparison would include TOR that follows the same principles and is three decades older. Or the newest DTN option Bundle Protocol v7.

      1 Reply Last reply
      0
      • nodestar@mastodon.socialN nodestar@mastodon.social

        100% FREE RESOURCE

        A practical #security guide for your mesh.

        For #Reticulum #MeshCore and #Meshtastic node operators.

        #OSINT exposure, active attack vectors, and how to harden the protocols against both.

        Link Preview Image
        The Hardened Mesh — Node Star Field Guide Vol. 10

        What OSINT operators can collect from your mesh, what attackers can do to it, and how to make both jobs harder. A practical security guide for Reticulum, MeshCore, and Meshtastic operators.

        favicon

        Node Star (nodestar.net)

        Link Preview Image
        marsik@witter.czM This user is from outside of this forum
        marsik@witter.czM This user is from outside of this forum
        marsik@witter.cz
        wrote on last edited by
        #3

        @nodestar Btw, about #LoRa in general.

        First, it is very low speed and gives the authorities plenty of time for triangulation. All the typical devices are also pretty much line of sight only (+ bounces).

        Second, it is unusual enough to mark the user for questioning. Operating such device in paranoid society might become unpleasant at least.

        As an activist I would probably prefer ethernet, landline (modem+ppp) or wifi as the transport layer. Ubiquous and so not suspicious. Hidden in the crowd.

        dupe@infosec.exchangeD 1 Reply Last reply
        0
        • nodestar@mastodon.socialN nodestar@mastodon.social

          100% FREE RESOURCE

          A practical #security guide for your mesh.

          For #Reticulum #MeshCore and #Meshtastic node operators.

          #OSINT exposure, active attack vectors, and how to harden the protocols against both.

          Link Preview Image
          The Hardened Mesh — Node Star Field Guide Vol. 10

          What OSINT operators can collect from your mesh, what attackers can do to it, and how to make both jobs harder. A practical security guide for Reticulum, MeshCore, and Meshtastic operators.

          favicon

          Node Star (nodestar.net)

          Link Preview Image
          dumont@corteximplant.comD This user is from outside of this forum
          dumont@corteximplant.comD This user is from outside of this forum
          dumont@corteximplant.com
          wrote on last edited by
          #4

          @nodestar this is fantastic! Thanks for the comprehensive write-up. Even for hobby / personal uses It can be hard to understand what is actually private vs public in this space. It took me a while to sus this out when I was looking for a solution for my property.

          We'll have to beg you to add SpectraMesh to the list too!

          1 Reply Last reply
          0
          • nodestar@mastodon.socialN nodestar@mastodon.social

            100% FREE RESOURCE

            A practical #security guide for your mesh.

            For #Reticulum #MeshCore and #Meshtastic node operators.

            #OSINT exposure, active attack vectors, and how to harden the protocols against both.

            Link Preview Image
            The Hardened Mesh — Node Star Field Guide Vol. 10

            What OSINT operators can collect from your mesh, what attackers can do to it, and how to make both jobs harder. A practical security guide for Reticulum, MeshCore, and Meshtastic operators.

            favicon

            Node Star (nodestar.net)

            Link Preview Image
            djh@chaos.socialD This user is from outside of this forum
            djh@chaos.socialD This user is from outside of this forum
            djh@chaos.social
            wrote on last edited by
            #5

            @nodestar Pretty solid writeup! Maybe add the lack of forward secrecy (at least in meshcore I know about this) and that we must assume that all packets get logged all the time and forever.

            1 Reply Last reply
            0
            • marsik@witter.czM marsik@witter.cz

              @nodestar Btw, about #LoRa in general.

              First, it is very low speed and gives the authorities plenty of time for triangulation. All the typical devices are also pretty much line of sight only (+ bounces).

              Second, it is unusual enough to mark the user for questioning. Operating such device in paranoid society might become unpleasant at least.

              As an activist I would probably prefer ethernet, landline (modem+ppp) or wifi as the transport layer. Ubiquous and so not suspicious. Hidden in the crowd.

              dupe@infosec.exchangeD This user is from outside of this forum
              dupe@infosec.exchangeD This user is from outside of this forum
              dupe@infosec.exchange
              wrote last edited by
              #6

              @marsik @nodestar
              But it uses the same freq as many other things, it uses low power and messages could be sent through many different nodes. It dont think it is that easy to triangulate. But I am no expert in fox hunting.

              1 Reply Last reply
              1
              0
              • R relay@relay.infosec.exchange shared this topic
              Reply
              • Reply as topic
              Log in to reply
              • Oldest to Newest
              • Newest to Oldest
              • Most Votes


              • Login

              • Login or register to search.
              • First post
                Last post
              0
              • Categories
              • Recent
              • Tags
              • Popular
              • World
              • Users
              • Groups