Security Architecture
How anon0mesh protects your identity and payload using Arcium's encrypted supercomputer.
In an off-grid environment, security is the foundation. Every packet transmitted over the mesh is encrypted, authenticated, and metadata-minimized using the Noise Protocol.
Security Standards
AES-256-GCM
Authenticated encryption for symmetric symmetric in-transit packets via the @magicred1/ble-mesh stack.
XChaCha20-Poly1305
Provides robust end-to-end encryption for message content between sender and recipient keypairs.
Ed25519 Signatures
Solana-native signing ensures transaction authenticity and integrity without relying on central authorities.
Threat Model
anon0mesh is designed to resist common attack vectors in hostile network environments:
- Passive Eavesdropping: RF signals (BLE/LoRa) are encrypted; an attacker monitoring frequencies cannot read content or transaction intent.
- Malicious Relay Nodes: A compromised Beacon can refuse to forward packets but cannot decrypt them or alter content without detection since signatures remain valid.
- On-Chain Clustering: Use of Disposable Wallets (ephemeral keypairs) prevents long-term transaction graph analysis from linking activity to a persistent identity.
- Cloud Surveillance: Since the Multimodal LLM runs locally on your device, no prompts or data are ever sent to a central server for inference, eliminating the risk of data harvesting or censorship.
Known Limitations
- Physical Range: BLE is typically limited to 10-100m. LoRa extends this significantly to 2-10km but requires compatible hardware.
- Nonce Funding: Durable Nonces require a small SOL reserve (~0.0014 SOL) that must be funded while the user is online.
- Radio Regulation: LoRa spectrum regulations vary by region; users are responsible for operating within local legal constraints.
Arcium DeCC Layer
We integrate with Arcium's Decentralized Confidential Computing (DeCC) network. Computation occurs inside Multi-Party Execution Environments (MXEs), which utilize Multi-Party Computation (MPC) and Fully Homomorphic Encryption (FHE). This protects data in use: when a transaction is relayed through third-party mesh nodes,neither the relayers nor the Arcium nodes themselves can see the plaintext data.
This reliability is further extended via Jito BAM, which provides a transparent and verifiable marketplace for block assembly. By utilizing open-source sequencing plugins, we ensure that anon0mesh transactions land on Solana with high-speed finality without relying on opaque, proprietary block engines.
Confidential Computation Flow
1. User generates & performs encrypted signing (Offline)
2. Encrypted intent split into MPC shares
3. Shares relayed via Mesh (BLE/LoRa) -> Beacon
4. Arcium MXEs execute logic on encrypted state
5. Proof of execution & settlement submitted to Solana"Identity verification happens locally. Activity stays local until online. No emails, no phone numbers, no persistent tracking."
