100% FREE RESOURCE
A practical #security guide for your mesh.
For #Reticulum #MeshCore and #Meshtastic node operators.
#OSINT exposure, active attack vectors, and how to harden the protocols against both.
100% FREE RESOURCE
A practical #security guide for your mesh.
For #Reticulum #MeshCore and #Meshtastic node operators.
#OSINT exposure, active attack vectors, and how to harden the protocols against both.
@nodestar I like the analysis, but wonder about identity spoofing. It is correct that you cannot impersonate a Reticulum address. But how do you share your current hash with others so they start trusting it? A social level impersonation (different hash, same claimed identity) is a valid attack vector too.
A scientifically fair comparison would include TOR that follows the same principles and is three decades older. Or the newest DTN option Bundle Protocol v7.