From e14c72b32acc489284167413208ef066e64e0884 Mon Sep 17 00:00:00 2001 From: Bob Mottram Date: Fri, 9 Sep 2016 20:10:32 +0100 Subject: [PATCH] Update documentation --- doc/EN/mesh.org | 29 +++++++++--- website/EN/mesh.html | 103 ++++++++++++++++++++++++++++++++++--------- 2 files changed, 105 insertions(+), 27 deletions(-) diff --git a/doc/EN/mesh.org b/doc/EN/mesh.org index 2450ca1d..aa12b994 100644 --- a/doc/EN/mesh.org +++ b/doc/EN/mesh.org @@ -18,13 +18,32 @@ [[file:images/mesh_screenshot.jpg]] #+END_CENTER +|------------------------+---+-------------+---+----------------------+---+---------------| +| [[What the system can do]] | - | [[Disk Images]] | - | [[Building Disk Images]] | - | [[How to use it]] | +|------------------------+---+-------------+---+----------------------+---+---------------| + Mesh networks are useful as a quick way to make a fully decentralised communications system which is not connected to or reliant upon the internet. Think festivals, hacker conferences, onboard ships at sea, disaster/war zones, small business internal office communications, protests, remote areas of the world, temporary "digital blackouts", scientific expeditions and off-world space colonies. The down side is that you can't access any internet content. The upside is that you can securely communicate with anyone on the local mesh. No ISPs. No payments or subscriptions beyond the cost of obtaining the hardware. Systems need to be within wifi range of each other for the mesh to be created. It can be an ultra-convenient way to do purely local communications. - * [[Ready made images]] - * [[To build the disk image yourself]] - * [[How to use it]] +* What the system can do -* Ready made images + - Discovery of other users on the network + - Text based chat, one-to-one and in groups + - Voice chat (VoIP) + - Private and public sharing of files + - Blogging + - No network administration required + +Communication is local between systems within wifi range of each other. If systems are out of wifi range the data is mesh routed through intermediate peers. + +No servers, internet connection or cabling is needed. + +Works from bootable USB drives or microSD drives. + +Private communications is end-to-end secured with elliptic curve encryption and is forward secret. Not easy to censor or passively monitor. + +Publicly shared data is /content addressable/ and therefore scalable to many peers. + +* Disk Images ** Client images #+BEGIN_CENTER @@ -81,7 +100,7 @@ sudo dd bs=1M if=mesh-router-beaglebone-black.img of=/dev/sdX conv=fdatasync If you have a few Beaglebone Blacks to use as routers then repeat the /dd/ command to create however many microSD cards you need. -* To build the disk image yourself +* Building Disk Images It's better not to trust images downloaded from random places on the interwebs. Chances are that unless you are in the web of trust of the above GPG signatures then they don't mean very much to you. If you actually want something trustworthy then build the images from scratch. It will take some time. Here's how to do it. First you will need to create an image. On a Debian based system (tested on Debian Jessie and Trisquel 7): diff --git a/website/EN/mesh.html b/website/EN/mesh.html index 53b6f1ee..b226f4d6 100644 --- a/website/EN/mesh.html +++ b/website/EN/mesh.html @@ -3,7 +3,7 @@ "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> - + @@ -252,22 +252,81 @@ for the JavaScript code in this tag. + + + +++ ++ ++ ++ ++ ++ ++ + + + + + + + + + + + +
What the system can do-Disk Images-Building Disk Images-How to use it
+

Mesh networks are useful as a quick way to make a fully decentralised communications system which is not connected to or reliant upon the internet. Think festivals, hacker conferences, onboard ships at sea, disaster/war zones, small business internal office communications, protests, remote areas of the world, temporary "digital blackouts", scientific expeditions and off-world space colonies. The down side is that you can't access any internet content. The upside is that you can securely communicate with anyone on the local mesh. No ISPs. No payments or subscriptions beyond the cost of obtaining the hardware. Systems need to be within wifi range of each other for the mesh to be created. It can be an ultra-convenient way to do purely local communications.

+
+

What the system can do

+
-
-

Ready made images

-
-
-

Client images

-
+

+Communication is local between systems within wifi range of each other. If systems are out of wifi range the data is mesh routed through intermediate peers. +

+ +

+No servers, internet connection or cabling is needed. +

+ +

+Works from bootable USB drives or microSD drives. +

+ +

+Private communications is end-to-end secured with elliptic curve encryption and is forward secret. Not easy to censor or passively monitor. +

+ +

+Publicly shared data is content addressable and therefore scalable to many peers. +

+
+
+ +
+

Disk Images

+
+
+

Client images

+
@@ -316,16 +375,16 @@ sudo dd bs=1M -

Router images

-
+
+

Router images

+

Routers are intended to build network coverage for an area using small and low cost hardware. You can bolt them to walls or leave them on window ledges. They don't have any user interface and their only job is to haul network traffic across the mesh. Copy the image to a microSD card and insert it into the router, plug in an Atheros wifi dongle and power on. That should be all you need to do.

-
-

Beaglebone Black

-
+
+

Beaglebone Black

+
@@ -359,9 +418,9 @@ If you have a few Beaglebone Blacks to use as routers then repeat the dd
-
-

To build the disk image yourself

-
+
+

Building Disk Images

+

It's better not to trust images downloaded from random places on the interwebs. Chances are that unless you are in the web of trust of the above GPG signatures then they don't mean very much to you. If you actually want something trustworthy then build the images from scratch. It will take some time. Here's how to do it.

@@ -456,9 +515,9 @@ The resulting image can be copied to a microSD card, inserted into a Beaglebone
-
-

How to use it

-
+
+

How to use it

+

When you first boot from the USB drive the system will create some encryption keys, assign a unique network address to the system and then reboot itself. When that's done you should see a prompt asking for a username. This username just makes it easy for others to initially find you on the mesh and will appear in the list of users.