Yggdrasil
Yggdrasil is a Mesh Network[1] that is fully Encrypted[2] and provides an IPv6 IP on the network to anyone.
My blog post Make the Internet Yours Again With an Instant Mesh Network[3] explains some of the possibilities of Yggdrasil and some of the ways that IP rigidity has served to concentrate Internet power in the hands of the very wealthy.
This is one of the items discussed in Recovering Our Lost Free Will Online: Tools and Techniques That Are Available Now[4].
More information
- Installing Yggdrasil on a Raspberry Pi[5]: Installing Debian Backports on Raspberry Pi[6]
- Using Yggdrasil As an Automatic Mesh Fabric to Connect All Your Docker Containers, VMs, and Servers[7]
- Yggdrasil is featured in Easily Accessing All Your Stuff with a Zero-Trust Mesh VPN[8]
- The quux.org NNCP public relay[9] is accessible over Yggdrasil; see NNCP over Yggdrasil[10]
--------------------------------------------------------------------------------
Links to this note
- Using Gensio and Ser2net[11]
gensio[12] and the related ser2net[13] are generic tools for communication.
- Easily Accessing All Your Stuff With a Zero-Trust Mesh VPN[14]
Probably everyone is familiar with a regular VPN. The traditional use case is to connect to a corporate or home network from a remote location, and access services as if you were there.
- Using Yggdrasil as an Automatic Mesh Fabric to Connect All Your Docker Containers, Vms, and Servers[15]
*An older version of this is also available on my blog[16].*
- Building an Asynchronous, Internet-Optional Instant Messaging System[17]
I loaded up this title with buzzwords. The basic idea is that IM systems shouldn't have to only use the Internet. Why not let them be carried across LoRa radios, USB sticks, local Wifi networks, and yes, the Internet? I'll first discuss how, and then why.
- The Joy of Easy Personal Radio: FRS, GMRS, and Motorola DLR/DTR[18]
Most of us carry cell phones with us almost everywhere we go. So much so that we often forget not just the usefulness, but even the joy, of having our own radios. For instance:
- Installing Debian Backports on Raspberry Pi[19]
This page is intended to describe how to run Debian[20]'s backports[21] on a Raspberry Pi[22] running Raspberry Pi OS (Raspbian).
- Tools for Communicating Offline and in Difficult Circumstances[23]
When things are difficult -- maybe there's been a disaster, or an invasion (this page is being written in 2022 just after Russia invaded Ukraine), or maybe you're just backpacking off the grid -- there are tools that can help you keep in touch, or move your data around. This page aims to survey some of them, roughly in order from easiest to more complex.
- NNCP over Yggdrasil[24]
NNCP[25] can be run over Yggdrasil[26] in two ways:
- Software and Operating Systems[27]
- Recovering Our Lost Free Will Online: Tools and Techniques That Are Available Now[28]
*This started out at a post on my blog[29]. This edited version is intended to be kept more up-to-date.*
- Encrypted[30]
Encryption is a way to encode data so that people that might intercept it can't decipher the original message (often called the "plaintext").
- Mesh Network[31]
A network in which the nodes typically discover each other and the routes between each other automatically.
- Raspberry Pi[32]
One of several single-board computers. The Raspberry Pi is an ARM computer that typically sells for less than $50. Generally is runs a derivative of Debian[33].
- Tunneling NNCP over Other Transports[34]
NNCP[35] has built-in support for running over TCP, with nncp-daemon and nncp-call/caller. NNCP's own use cases[36] page talks about various use cases for NNCP. Some of them, such as the no link[37] page, cover use of nncp-xfer; others, such as the one-way broadcasting[38] page go over nncp-bundle.
- Quux.Org NNCP Public Relay[39]
According to the NNCP documentation[40], NNCP[41] is intended to help build up small size ad-hoc friend-to-friend (F2F) statically routed darknet delay-tolerant[42] networks for fire-and-forget secure reliable files, file requests, Internet Email[43] and commands transmission. All packets are integrity checked, end-to-end Encrypted[44], explicitly authenticated by known participants public keys. Onion encryption is applied to relayed packets. Each node acts both as a client and server, can use push and poll behaviour model. Also there is multicasting area support.
- Old and Small Technology[45]
Old technology is any tech that's, well... old.
- Interesting Topics[46]
Here are some (potentially) interesting topics you can find here:
More on www.complete.org
(c) 2022-2024 John Goerzen