reticulum_website/source/index.md
2022-07-01 16:33:46 +02:00

2.2 KiB

Reticulum

Reticulum is the cryptography-based networking protocol for both local and wide-area networks built on readily available hardware. Reticulum can operate even with very high latency and extremely low bandwidth.

The vision of Reticulum is to allow anyone to operate their own sovereign communication networks, and to make it cheap and easy to cover vast areas with a myriad of independent, interconnectable and autonomous networks.

Reticulum is not one network. It is a tool for building thousands of networks. Networks without kill-switches, surveillance, censorship and control. Networks that can freely interoperate, associate and disassociate with each other. Reticulum is Networks for Human Beings. Reticulum is Unstoppable Networks for The People.

Notable Characteristics

While Reticulum solves the same problem that any network stack does, namely to get data reliably from one point to another over a number of intermediaries, it does so in a way that is very different from other networking technologies.

  • Reticulum does not use source addresses. No packets transmitted include information about the address, place, machine or person they originated from.
  • There is no central control over the address space in Reticulum. Anyone can allocate as many addresses as they need, when they need them.
  • Reticulum ensures end-to-end connectivity. Newly generated addresses become globally reachable in a matter of seconds to a few minutes.
  • Addresses are self-sovereign and portable. Once an address has been created, it can be moved physically to another place in the network, and continue to be reachable.
  • All communication is secured with strong, modern encryption by default.
  • All encryption keys are ephemeral, and communication offers forward secrecy by default.
  • It is not possible to establish unencrypted links in Reticulum networks.
  • It is not possible to send unencrypted packets to any destinations in the network.
  • Destinations receiving unencrypted packets will reject them as invalid.
  • The routing layer is not able to route unencrypted packets, and such packets will be dropped.

Next Topic: Get Started