Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

have a look at these:

https://en.wikipedia.org/wiki/B.A.T.M.A.N.

https://www.open-mesh.org/projects/open-mesh/wiki

https://kb.datto.com/hc/en-us/articles/360024059951-Legacy-O...

http://developer.servalproject.org/dokuwiki/doku.php?id=cont...

there is also an open mesh for routers if you have the hardware and propensity look at openWRT and find a mesh add on for it find out what routers you have available to flash it onto and then you will have a MESH node.



Do you know of any good resources talking about considerations for handling adversarial nodes in these networks? For example, what's to stop a rogue implementation from advertising that it has a low cost / short distance to every other node it's ever seen, reporting that data has been sent successfully that actually wasn't, etc? These links give some good background but I haven't seen anything on there about trust in a hostile environment.




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: