Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

marsik@witter.czM

marsik@witter.cz

@marsik@witter.cz
About
Posts
2
Topics
0
Shares
0
Groups
0
Followers
0
Following
0

View Original

Posts

Recent Best Controversial

  • 100% FREE RESOURCE
    marsik@witter.czM marsik@witter.cz

    @nodestar Btw, about #LoRa in general.

    First, it is very low speed and gives the authorities plenty of time for triangulation. All the typical devices are also pretty much line of sight only (+ bounces).

    Second, it is unusual enough to mark the user for questioning. Operating such device in paranoid society might become unpleasant at least.

    As an activist I would probably prefer ethernet, landline (modem+ppp) or wifi as the transport layer. Ubiquous and so not suspicious. Hidden in the crowd.

    Uncategorized security reticulum meshcore meshtastic osint

  • 100% FREE RESOURCE
    marsik@witter.czM marsik@witter.cz

    @nodestar I like the analysis, but wonder about identity spoofing. It is correct that you cannot impersonate a Reticulum address. But how do you share your current hash with others so they start trusting it? A social level impersonation (different hash, same claimed identity) is a valid attack vector too.

    A scientifically fair comparison would include TOR that follows the same principles and is three decades older. Or the newest DTN option Bundle Protocol v7.

    Uncategorized security reticulum meshcore meshtastic osint
  • Login

  • Login or register to search.
  • First post
    Last post
0
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups