Home The Playbook
Learn
Settings Guide Field Guides & Resources Certifications
Get
Meshtastic Meshcore Reticulum Nodes About Contact
Node Star Field Guide Vol. 10 · 2026

The Hardened
Mesh

A practical security guide for Reticulum, MeshCore, and Meshtastic operators — covering OSINT exposure, active attack vectors, and how to harden each protocol against both.

Audience Activists · Journalists · Field Operators
Protocols Reticulum · MeshCore · Meshtastic
Focus OSINT + Active Security
Table of Contents

Off-Grid Is Not
Off-Radar

There is a persistent myth in mesh networking communities: that going off-grid means going off-radar. That because you're not using the internet, you're invisible. That because your messages never touch a cell tower, no one can read them.

This is not quite true.

Radio frequency is inherently observable. Anyone with the right hardware and patience can hear your transmissions, log your metadata, map your topology, and build a surprisingly detailed picture of your network and the people running it, without ever reading your messages. That's the passive threat. But there's an active attack surface too: things an adversary can do to your network rather than merely watch.

This guide covers both. It is written for people who have a real reason to care: activists, journalists, legal observers, field researchers, human rights workers, and anyone operating in an environment where communications security isn't abstract. It is also written for network builders who want to understand what their infrastructure reveals and withstands.

We cover three protocols in order from most resistant to least: Reticulum, MeshCore, and Meshtastic. Each has legitimate uses. Each has a different default exposure and attack profile.

Scope of This Guide

This is not a legal guide, and it does not guarantee security or anonymity. No technology does. What it offers is an accurate threat model and practical mitigation steps. The regulatory landscape varies by country and frequency band. Consult the rules for your jurisdiction before deployment.

Default Exposure at a Glance

The chart below shows each protocol's default OSINT and attack exposure — before any hardening. All three can be improved. None should be treated as secure out of the box without understanding what you're actually running.

Reticulum
Low Default Exposure
Mandatory encryption, no broadcast beaconing, cryptographic addressing. Strongest default posture of the three.
MeshCore
Medium Default Exposure
No aggressive GPS beaconing, smaller MQTT footprint. Configurable but not hardened by default. Anonymity set is small.
Meshtastic
High Default Exposure
GPS beaconing on by default, MQTT uplink to public maps, default channel key is publicly known. Requires deliberate hardening.

What a Watcher
Actually Sees

Before we talk about mitigation, we need to establish what we're mitigating against. Here is what a passive observer (someone with a compatible radio receiver and some patience) can collect from an active mesh network, without ever transmitting a single packet.

The RF Layer Is Always Visible

The moment a radio transmits, it announces its presence. Software-defined radios (SDRs) are cheap, widely available, and capable of monitoring the frequency bands used by all three protocols in this guide. An observer doesn't need to decode your packets to learn something useful. The fact that a transmission occurred, when it occurred, at what signal strength, and from what approximate direction is already intelligence.

Hop count and timing data can reveal network topology without a single message being read. If Node A's packets always arrive at Node C via Node B, that's a detectable relay relationship, even if everything is encrypted. This is traffic analysis, one of the oldest tools in signals intelligence.

Metadata Is Intelligence

The content of a message is only one layer of what a network reveals. Metadata (data about the data) is often more durable and more damning. In mesh networks, metadata includes node names, hardware IDs embedded in firmware, GPS coordinates if location beaconing is enabled, channel names, signal strength and distance measurements, and message frequency and timing patterns.

None of this requires breaking encryption. It's available at the packet level, often in plaintext, by design.

Real-World Example

"John K3XYZ" and "Maria-Phone" are not hypothetical examples. They are the kind of node names that appear constantly in real-world mesh deployments, because users configured their devices at home without thinking about what that name would broadcast to strangers in the field. Channel names like "PROTEST-MESH" or "LEGAL-OBS" communicate organizational intent to anyone who can receive a packet.

Radio Direction Finding and the Cost of Transmitting

Every transmission is a beacon. Beyond passive logging, a sufficiently motivated observer can use radio direction finding (RDF) to physically locate a transmitting node. This doesn't require exotic equipment: a directional antenna, an SDR, and basic triangulation software are enough to narrow a LoRa transmitter to a building or city block, especially with multiple receivers deployed in a small area.

RDF has a long operational history in signals intelligence and is actively used in amateur radio fox-hunting competitions, which means the techniques and tools are well-documented and accessible. In a high-density urban environment with multiple receivers, a node transmitting at regular intervals can be localized in minutes. GPS beaconing on Meshtastic is particularly acute here: a node that announces its position every 30 seconds is also announcing its RF location to anyone running an SDR within range, regardless of whether GPS is accurate.

Transmission Discipline

The single most effective RF opsec measure is also the simplest: transmit only when necessary. Every packet is a potential fix on your position. In sensitive contexts, turn the radio off when not in active use. Do not use periodic telemetry or position beaconing. If your use case requires real-time tracking, Meshtastic is the wrong protocol. If you are running Reticulum, rnsd will not transmit unless it has traffic to route or announce — but applications built on top of it (Sideband, NomadNet) may generate traffic of their own. Know what your software is sending and when.

The MQTT Bridge and the Public Map Problem

Meshtastic includes an MQTT uplink feature that relays traffic to an internet broker. Public resources like meshmap.net aggregate this data in real time; they are, functionally, an open OSINT dashboard for opted-in Meshtastic deployments. Node name, position, hardware ID, and message history are available to anyone who knows where to look.

Nodes that have been on the public map and later removed are not erased from history. Logs persist. Correlating a node seen on the map at a known time and place with a node observed in the field later is a real and practiced intelligence technique.

Social OSINT Around Mesh Communities

Mesh networking communities generate a significant open-source intelligence footprint through ordinary participation. GitHub repos, Discord servers, Reddit threads, and forum posts frequently contain node identifiers, deployment plans, location references, and hardware configurations, posted by real users using their real names.

LXMF addresses are pseudonymous, not anonymous. If you post your LXMF hash on a forum, that hash is now linkable to your forum account, your writing style, your IP address history. The pseudonym holds only as long as it's never connected to anything real. NomadNet pages are intentionally public; a crawler could map the entire visible graph of pages and link authors to their LXMF addresses. Know what you are making public and why.

What Leaks at Each Layer

The diagram below maps which intelligence a passive observer can extract at each layer of the stack, across all three protocols. Green means protected by default. Amber means conditional or partial. Red means exposed by default.

What leaks at each layer Protected Partial Exposed
Observable Reticulum MeshCore Meshtastic
RF presence / signal EXPOSED EXPOSED EXPOSED
Node name / callsign HIDDEN EXPOSED EXPOSED
Hardware ID HIDDEN EXPOSED EXPOSED
GPS / position HIDDEN HIDDEN DEFAULT ON
Source / destination ID HASH ONLY EXPOSED EXPOSED
Message content ENCRYPTED IF CONFIGURED IF CONFIGURED
Traffic timing / patterns EXPOSED EXPOSED EXPOSED
Channel name HIDDEN EXPOSED EXPOSED
Public map presence NONE MINIMAL OPT-IN DEFAULT
Node impersonation possible NO YES YES

* All values reflect default configurations. Meshtastic GPS and MQTT can be disabled; MeshCore encryption can be enabled. Reticulum RF presence is always detectable regardless of content encryption.

What an Attacker
Can Actually Do

Passive observation is one threat. Active attack is another. The two require different capabilities and different mitigations. This section covers the active attack surface across mesh networking protocols.

💉
Packet Injection
Meshtastic MeshCore
On unencrypted channels, an attacker with a compatible radio can inject packets attributed to any node name, including fake coordinates, false messages from trusted coordinators, or commands to automated systems.
🎭
Node Impersonation
Meshtastic MeshCore
Node names are arbitrary strings with no cryptographic binding. Any device can claim any name. Hardware IDs can be overridden in some firmware configs, enabling full identity cloning.
🌊
Channel Flooding (DoS)
All Protocols
LoRa bands require no authentication to transmit. A single attacker with cheap hardware can saturate a channel heard city-wide. No protocol-level defense exists — only frequency agility and geographic separation.
🕵️
Rogue Relay Node
Meshtastic MeshCore Reticulum*
A rogue relay logs all traffic passing through it. In unencrypted networks it captures content. In encrypted networks (including Reticulum) it still captures metadata and timing. Evil-twin nodes mimic trusted relay names.
👾
Firmware / Supply Chain
All Protocols
Gray-market hardware may carry modified firmware before you receive it. Web-based flashers execute JavaScript from a server and write to your device: a real trust surface. Firmware from unofficial sources should not be trusted.
📱
Companion Device Attack
Meshtastic All Protocols
The phone or laptop paired with your radio is often the weakest link. Meshtastic's BLE pairing can be sniffed or attacked by nearby adversaries. A compromised phone exposes all keys, messages, and channel configurations.
🔁
Replay Attack
Meshtastic MeshCore
Capturing a legitimate packet and retransmitting it later to trigger a repeated or out-of-context response. Defeated by properly implemented replay protection, which many deployments lack.
🌐
Sybil Attack
Reticulum
Flooding the network with fake node identities to disrupt routing or degrade anonymity. Requires significant resources; most relevant to state-level adversaries. Reticulum's opportunistic routing provides some resilience.

A Concrete Field Scenario: The Evil-Twin Relay

To make the rogue relay attack tangible, consider a realistic deployment. A team is using Meshtastic with a private channel key for coordination at a large outdoor event. They have a trusted relay node on a rooftop with good coverage, named "RELAY-NORTH." An adversary arrives an hour before the event, sets up a device named "RELAY-N0RTH" (zero instead of the letter O), and positions it slightly closer to the team's devices for better signal. Most Meshtastic clients display node names in a list — the difference is easy to miss.

Because the adversary doesn't hold the channel key, they cannot read content on the private channel. But they can: log every packet's source node ID, destination, timing, and hop count; observe which nodes are communicating with which; perform traffic analysis on message frequency and burst patterns; selectively drop packets to degrade communication without obviously going dark; and inject packets on any unencrypted channel running on the same frequency. If the team has any unencrypted traffic (position data, node announcements, ACKs) the adversary captures it in full.

The defense is straightforward but requires preparation: verify relay node IDs before the event, not during it. Node IDs are hardware-derived and unique — confirm them out-of-band and cross-check against what appears in the field. An unexpected relay node in your list is a red flag worth investigating before you transmit anything sensitive.

The Regulatory Angle

In the United States, Part 97 (the FCC rules governing amateur radio) prohibits encryption for the purpose of obscuring communications. Meshtastic and MeshCore are most commonly operated in unlicensed ISM bands (915 MHz in North America), where Part 97 does not apply and encryption is entirely legal. Reticulum, with its mandatory transport-layer encryption, cannot be legally operated on amateur frequencies for intentional communications. ISM bands or equivalent unlicensed spectrum are the appropriate choice.

Know Your Frequencies

This is not a reason to avoid encryption. It is a reason to understand which frequencies your hardware is using. Check your firmware configuration; most LoRa mesh hardware defaults to ISM bands, but this can be changed. The regulatory landscape varies by country.

Reticulum —
The Most Resistant Layer

Reticulum is not a consumer product. It is a cryptographic networking stack designed from first principles for resilience and privacy, built to run on anything from LoRa radios to TCP connections to serial links. It was created by Mark Qvist and underlies NomadNet, Sideband, and a growing application ecosystem.

By a significant margin, it is the most OSINT-resistant and attack-resistant protocol in this guide. Several architectural decisions explain why.

No Broadcast Beaconing

Reticulum nodes do not announce themselves. There is no periodic "I am here" transmission. Nodes respond to directed requests but do not broadcast presence, significantly reducing the passive monitoring surface.

Encryption Is Non-Optional

All traffic is encrypted at the transport layer. It is not a channel setting, not configurable. An observer at the RF layer always sees ciphertext. There is no version of Reticulum traffic that isn't encrypted.

Cryptographic Addressing

LXMF addresses are derived from public keys, not hardware IDs or callsigns. An observer sees opaque hashes. You cannot impersonate a Reticulum identity without its private key. Creating a fresh identity is trivial.

Relays See Only Ciphertext

Relay nodes cannot read content, source, or destination. A rogue relay inside a Reticulum network captures metadata and timing patterns — but not content or identities. A meaningful architectural advantage over all other protocols here.

Where Reticulum Still Has Exposure

Honest Accounting

The radio is still on. An RNode transmitting LoRa is detectable with an SDR regardless of content encryption. Physical-layer DoS applies equally to Reticulum. A public-facing TCPServerInterface is associated with a real IP address. And operator error — reusing identities across contexts, publishing NomadNet pages that mix operational and personal content, posting LXMF hashes on clearnet forums — undermines everything the protocol provides.

The companion device is the most realistic attack surface. Reticulum's security rests on the integrity of private keys, which live on your machine. A compromised machine means compromised keys.

Opsec Recommendations — Reticulum & NomadNet

Identity Management

Create a fresh LXMF identity for any context where anonymity matters. Do not reuse identities across personal and operational use. Back up identity keys to encrypted, physically controlled storage. Losing a key means losing your address; exposing a key means losing control of your identity.

NomadNet Page Hygiene

A page published on NomadNet is public to the network. Names, locations, and links to clearnet content that is attributable to you create visible associations. Audit your pages for any information that connects your pseudonymous identity to your real one. Keep LXMF hashes off clearnet forums when anonymity matters.

Infrastructure Security

Keep rnsd updated. Monitor for unusual connection patterns on TCPServerInterfaces. Treat the machine running rnsd as a security boundary: keep it updated, minimize running services, use disk encryption, and control physical access. Minimize transmissions in sensitive contexts, as RF presence is always detectable even when content is not.

MeshCore —
Configurable Middle Ground

MeshCore occupies an interesting middle position. It is less consumer-oriented than Meshtastic, more intentionally configurable, and designed with operators in mind. It has a smaller deployment footprint, which is both an advantage and a challenge.

How MeshCore Differs From Meshtastic

MeshCore does not default to GPS beaconing in the same aggressive way Meshtastic does, and it lacks the extensive MQTT bridge infrastructure that creates Meshtastic's public telemetry problem. A MeshCore node that never connects to a public broker does not feed a public map. Hardware IDs are still present and persistent — a structural characteristic of the LoRa hardware, not the protocol.

The Anonymity Set Problem

MeshCore's smaller deployment footprint means smaller anonymity sets. Anonymity is partly a function of how many other people look like you. In a large Meshtastic network with hundreds of active nodes, any single node is relatively hard to isolate. If you are the only MeshCore operator at an event or in a city, an observer looking for MeshCore traffic can attribute everything they see to a very small pool, possibly a pool of one.

The Protocol Fingerprint Problem

An unusual protocol choice in a context dominated by another protocol can itself be a fingerprint. Sometimes a more common protocol, well-configured, provides better cover than an unusual one assumed to be inherently secure. Consider what your protocol choice signals about you before deployment.

Active Attack Surface for MeshCore

MeshCore's attack surface largely mirrors the broader LoRa attack surface from Part Two. Node name spoofing is as trivial on MeshCore as on Meshtastic; names are not cryptographically bound. Channel flooding is equally applicable. Rogue relay nodes can log unencrypted traffic where encryption is not configured. The same firmware and supply chain risks apply. Where a BLE interface is present, the pairing attack surface exists.

Opsec Recommendations — MeshCore

Verify encryption is active for your specific firmware and configuration. Don't assume; check. Treat any unencrypted channel as a public broadcast. Disable or replace node names before deployment and use something generic and non-identifying. Dedicate hardware to operational contexts, as the same device used across contexts creates hardware ID linkages. Disable BLE when not actively configuring the device. Flash from official sources and verify firmware checksums.

Meshtastic —
Powerful, Popular, Leaky by Default

Meshtastic is the most widely deployed consumer mesh protocol in the world. It is well-funded, well-documented, actively developed, and has a large community. It is also, by default, the most OSINT-exposed and attack-accessible protocol in this guide.

This is not an accident. Meshtastic was designed for cases where transparency is a feature: search and rescue, community resilience, outdoor recreation. The GPS beacon broadcasting your location every thirty seconds is exactly right when a rescue team is looking for you. The problem arises when Meshtastic is deployed in contexts where those defaults are not appropriate, and operators don't realize what they're broadcasting.

What the Defaults Reveal

A stock Meshtastic device with MQTT uplink enabled broadcasts: user-configured node name, GPS coordinates on a regular interval, device hardware ID, channel names, and message traffic on unencrypted channels — available to anyone monitoring the relevant broker from anywhere in the world. Nodes removed from the public map are not erased from logs. Historical correlation between a node logged at a known event and a node seen in the field later is a practiced technique.

The Default Key Problem

Channel Encryption and the Header Problem

Meshtastic supports channel-level AES-256-CTR encryption via a shared pre-shared key (PSK). Since firmware v2.5.0, direct messages use a meaningfully stronger model: x25519 key exchange followed by AES-CCM, providing per-pair encryption and message authentication without relying on a shared group key. This is a genuine improvement for DM use cases.

The fundamental header exposure problem, however, remains unchanged as of the current firmware. Packet headers are always transmitted in plaintext by design. This is an intentional architectural decision: unencrypted headers allow relay nodes that don't hold a channel key to still forward packets, which is central to how Meshtastic routing works. A GitHub feature request for optional header encryption was open as of late 2025 and had not been implemented. Until that changes, source node ID, destination node ID, hop count, packet ID, and channel hash are visible to any receiver within RF range regardless of your channel key.

The default AES key on the "LongFast" channel is publicly documented and ships on every Meshtastic device. Any device in the world can receive and decrypt traffic on this channel. Treat the default channel as plaintext for all operational purposes, regardless of the fact that it is technically "encrypted."

Critical: Default Key Is Public

The "LongFast" default channel key is published in Meshtastic's documentation and widely known in the community. It provides zero operational security. For any sensitive use, configure a private channel with a non-default key distributed out-of-band before deployment.

CVE-2025-52464 — Check Your Firmware Version

A severe cryptographic vulnerability (CVSSv4 9.5) was patched in Meshtastic v2.6.11. The flaw caused certain hardware to generate identical X25519 key pairs across entire production batches due to low-entropy key generation and vendor cloning practices during manufacturing. Affected devices could have their DM encryption broken. If you are running firmware below v2.6.11, update immediately and regenerate your keys. Verify your firmware version in the app before relying on DM encryption for anything sensitive.

The BLE Attack Surface

BLE is Meshtastic's primary configuration interface for most users. An attacker in physical proximity can interact with a device that has BLE active and lacks authentication, reading channel configurations, extracting stored messages, and potentially modifying settings. BLE sniffing during the pairing process can yield session keys. This attack requires only proximity and commodity hardware.

The MQTT Attack Surface

Public community MQTT brokers are third-party-administered. Their security practices are not something individual users can assess or control. Traffic routed through a compromised broker is fully visible to the broker operator, including content on channels where the broker holds the channel key. Even on a secure broker, the operator can see all metadata.

Opsec Recommendations — Meshtastic

ActionPriorityWhere to Configure
Disable GPS beaconing Critical App → Device Config → Position
Disable MQTT uplink (verify for all nodes in network) Critical App → Module Config → MQTT
Set non-default channel key, distributed out-of-band Critical App → Channel Config
Rename node to something non-identifying High App → Device Config → User
Disable BLE when not actively configuring High Firmware-dependent
Use dedicated hardware with no prior trackable history High Hardware decision before deployment
Flash only official firmware, verify checksums Standard meshtastic.org releases
Rotate channel keys periodically Standard App → Channel Config
Architecture Limits

Even with all of the above in place, Meshtastic's architecture was not designed for the level of anonymity that Reticulum provides by default. Packet headers (including node IDs, hop counts, and channel hashes) are not encrypted even when channel content is. Metadata remains visible. For high-stakes sensitive communications, choose accordingly.

Cross-Protocol
Principles

Regardless of which protocol you're running, these operational habits determine whether your technical security measures hold up in practice. Technology is not a substitute for discipline.

Hardware Compartmentalization

A device carries a history. Hardware IDs are embedded in firmware and not easily changed. Use dedicated hardware for any context where separation matters, including the phones and laptops used to configure devices.

Channel Naming Discipline

Names are intelligence. Use generic, non-descriptive channel names. Rotate them. If your channel name would be informative on a police report, choose a different one.

RF Presence Is Detectable

No encryption makes your radio invisible. Minimize transmissions in high-stakes contexts. Being in a location where mesh traffic is observed is itself information, even if the traffic is unreadable.

The Anonymity Set Problem

Individual security is partly collective. One node on an empty channel is more attributable than one among dozens. An unusual protocol choice can itself be a fingerprint. Blend into existing traffic patterns where possible.

Identity Hygiene

Pseudonymity is not anonymity. Don't post your LXMF hash from an account with your name on it. Don't use the same node name across contexts you want separated. These connections are easy to make and essentially impossible to unmake.

Out-of-Band Key Exchange

Never distribute encryption keys over the channel they are meant to secure. Distribute keys before deployment, through a separate secure channel, to known recipients only.

Physical Security

Seizing your device is a much easier path than attacking your RF encryption. Physical security (who has access, what happens if it's lost) is integral to communications security. Encrypt device storage. Have a plan for device compromise.

Threat Model First

Be honest about who your observer is and what their capabilities are. Over-engineering for a threat that doesn't apply creates friction without benefit. Under-engineering for a real threat is dangerous. Ask before deployment.

Firmware Integrity

Flash only from official repositories. Verify checksums where provided. Gray-market hardware may carry modified firmware. Supply chain attacks against developer toolchains are a well-documented real-world category, not an edge case.

Choosing the
Right Tool

The right tool is the one that matches your threat model, your operators' ability to configure and maintain it correctly, and the operational context. A well-configured Meshtastic deployment may be more secure in practice than a sloppily configured Reticulum setup. Technology is not a substitute for operational discipline.

Scenario Recommended Stack Key Notes
Journalist in authoritarian context Reticulum + RNode, RF only Air-gapped identity, no TCP interfaces, dedicated hardware, minimize transmissions
Legal observer at protest Reticulum or MeshCore GPS off, anonymous node name, hardware compartmentalization, BLE disabled
SAR and community resilience Meshtastic Transparency is a feature here. Default settings may be entirely appropriate
Activist coordination, lower risk MeshCore with encryption Verify encryption config, channel naming discipline, dedicated hardware
High-risk field communications Reticulum only RF only, compartmentalized identity, secured companion device, no clearnet linkages
Community mesh, no sensitive traffic Any Optimize for usability and range. Security is not the primary concern
Network infrastructure operator Reticulum gateway Keep rnsd updated, monitor connections, understand attributability of your IP

The Watcher Is Real.
So Is the Attacker.

Mesh networking is not inherently secure or insecure. It is a collection of design decisions made by developers with specific use cases in mind, deployed by operators with varying levels of security awareness, into environments with varying threat profiles.

Reticulum was designed with privacy and resilience as foundational values, and it shows. Its architecture makes passive surveillance harder, traffic analysis less productive, identity management more flexible, and active attacks more difficult than any other protocol in this guide. Its mandatory encryption defeats content capture by rogue relays. Its cryptographic addressing defeats node impersonation. For high-stakes communications, it is the right foundation.

Meshtastic was designed for community resilience, outdoor recreation, and amateur radio exploration. Its defaults are generous with information because the use cases it was built for benefit from that generosity. It can be hardened, but hardening it requires overriding many defaults, and it remains more accessible to active attack than Reticulum by design.

MeshCore sits between them: more configurable and less exposed than Meshtastic, but subject to the structural challenges of a smaller deployment footprint and hardware-level identifiers that can't be configured away.

What all three share: the security of your mesh network is ultimately a function of the decisions made by the humans operating it. The best protocol in the world, misconfigured by an inattentive operator, is less secure than a modest protocol used with discipline and care. Threat modeling before deployment, hardware compartmentalization, identity hygiene, physical security, and consistent operational habits matter more than any single technical choice.

The Bottom Line

The tools to limit what watchers see and what attackers can do are available. Most of them require configuration, not hardware. The question is whether you use them before you need them, because after the fact is too late.

Opsec & Security
Checklist

Use this before any deployment. Print it out. Go through it with your team.

Before Any Deployment — All Protocols
  • Have I defined my threat model: who is the observer, what are their capabilities, are active attacks realistic?
  • Is this hardware dedicated to this operational context, or does it have a prior trackable history?
  • Have I renamed my node to something non-identifying?
  • Do I know which channels are encrypted, with what keys, distributed through what channel?
  • Have I flashed firmware from official sources and verified checksums?
  • Is disk encryption enabled on the companion device?
  • Do I have a plan if a device is lost or seized?
Reticulum / NomadNet
  • Am I using a fresh LXMF identity for this context?
  • Have I backed up identity keys to encrypted, physically controlled storage?
  • Have I audited my NomadNet page for attributable information?
  • Is my LXMF hash posted anywhere that links it to my real identity?
  • If running a TCPServerInterface, do I understand what that IP address reveals, and is rnsd kept updated?
  • Is the machine running rnsd updated, minimal in services, and physically secure?
  • Am I transmitting only when necessary?
MeshCore
  • Is encryption confirmed active for my firmware and configuration?
  • Are my channel names generic and non-descriptive?
  • Am I aware of how many other MeshCore nodes are in my operational context?
  • Is this hardware used exclusively for this context?
  • Is BLE disabled when not actively configuring the device?
  • Is firmware from official sources with verified checksums?
Meshtastic
  • Is GPS beaconing disabled?
  • Is MQTT uplink disabled, verified for all nodes in the network?
  • Am I using a non-default channel key, distributed out-of-band?
  • Is the node name non-identifying?
  • Is this hardware free of prior trackable history?
  • Is BLE disabled in the field?
  • Is firmware from official Meshtastic releases, checksums verified?
  • Do I understand that metadata (node IDs, timing, hop counts) is visible even on encrypted channels?

Glossary

TermDefinition
Anonymity setThe pool of individuals or nodes that an observer cannot distinguish among. Larger anonymity sets provide better cover. Being the only operator of a given protocol in a given context is an anonymity set of one.
BLEBluetooth Low Energy. The wireless interface used by most Meshtastic devices for configuration and monitoring. An attack surface for proximity-based adversaries; disable when not in active use.
Channel floodingA denial-of-service technique involving transmitting high volumes of traffic on a LoRa channel to render it unusable. Requires only a compatible radio; no protocol-level defense exists.
Evil-twin attackDeploying a rogue node with a name or identifier that mimics a trusted node, to capture traffic or manipulate network behavior.
FirmwareThe low-level software running on mesh hardware. A supply chain risk if obtained from untrusted sources; flash only from official repositories with checksum verification.
Hardware IDA persistent device identifier embedded in firmware, often visible at the packet level. Cannot typically be changed without firmware modification; enables cross-context device correlation.
LXMFLightweight Extensible Message Format. Reticulum's message protocol. Addresses are derived from cryptographic public keys, providing pseudonymous identity with no hardware binding.
MQTTMessage Queuing Telemetry Transport. Used to relay Meshtastic traffic to internet brokers and public maps. A significant exposure vector when connected to public brokers.
Node impersonationConfiguring a device to use the same name or identifier as a legitimate node. Trivial on name-based systems; defeated by cryptographic addressing in Reticulum.
Packet injectionTransmitting forged packets attributed to a different node. Possible on unencrypted channels; defeated by cryptographic authentication.
Part 97FCC regulations governing amateur radio in the US. Prohibits encryption for the purpose of obscuring meaning on amateur frequencies. Does not apply to unlicensed ISM bands.
Replay attackCapturing a legitimate packet and retransmitting it out of context to trigger a repeated response. Defeated by properly implemented replay protection.
RNodeA LoRa radio hardware platform compatible with Reticulum, designed by Mark Qvist. Preferred hardware for Reticulum field deployments.
rnsdThe Reticulum Network Stack daemon. The background service that manages Reticulum interfaces and routing on a host system.
Rogue relay nodeAn adversary-controlled node that appears to be a legitimate relay but logs, modifies, or selectively drops traffic passing through it.
SDRSoftware-Defined Radio. Inexpensive hardware capable of receiving and analyzing radio signals across a wide range of frequencies. Used for passive RF monitoring.
Sybil attackFlooding a network with large numbers of fake node identities to disrupt routing, degrade performance, or reduce the anonymity set of legitimate operators.
TCPServerInterfaceA Reticulum configuration that accepts incoming TCP connections from the internet, enabling the node to serve as a public gateway. Associates the service with a public IP address.
Traffic analysisIntelligence derived from patterns of communication (timing, volume, frequency, routing) rather than content. Effective against encrypted traffic; a foundational technique in signals intelligence.