My blog post Make the Internet Yours Again With an Instant Mesh Network explains some of the possibilities of Yggdrasil and some of the ways that IP rigidity has served to concentrate Internet power in the hands of the very wealthy.
This is one of the items discussed in Recovering Our Lost Free Will Online: Tools and Techniques That Are Available Now.
Links to this note
A network in which the nodes typically discover each other and the routes between each other automatically.
Anything that uses encryption to keep content away from spying eyes.
Old technology is any tech that’s, well… old.
This started out at a post on my blog. This edited version is intended to be kept more up-to-date.
Here are some (potentially) interesting topics you can find here:
NNCP has built-in support for running over TCP, with nncp-daemon and nncp-call/caller. NNCP’s own use cases page talks about various use cases for NNCP. Some of them, such as the no link page, cover use of nncp-xfer; others, such as the one-way broadcasting page go over nncp-bundle.
When things are difficult – maybe there’s been a disaster, or an invasion (this page is being written in 2022 just after Russia invaded Ukraine), or maybe you’re just backpacking off the grid – there are tools that can help you keep in touch, or move your data around. This page aims to survey some of them, roughly in order from easiest to more complex.
One of several single-board computers. The Raspberry Pi is an ARM computer that typically sells for less than $50. Generally is runs a derivative of Debian.
This page is intended to describe how to run Debian’s backports on a Raspberry Pi. Backports is Debian’s way of building newer packages for its stable releases. I intend this page specifically to help people run the Debian packages for NNCP and Yggdrasil, both of which are maintained by me, John Goerzen.
According to the NNCP documentation, NNCP is intended to help build up small size ad-hoc friend-to-friend (F2F) statically routed darknet delay-tolerant networks for fire-and-forget secure reliable files, file requests, Internet Email and commands transmission. All packets are integrity checked, end-to-end Encrypted, explicitly authenticated by known participants public keys. Onion encryption is applied to relayed packets. Each node acts both as a client and server, can use push and poll behaviour model. Also there is multicasting area support.