
Resources
Open Specifications
I. Architecture draft-hallambaker-mesh-architecture-19.html
Provides an overview of the Mesh as a system and the relationship between its constituent parts.
II. Uniform Data Fingerprint [draft-hallambaker-mesh-udf].
Describes the UDF format used to represent cryptographic nonces, keys and content digests in the Mesh and the use of Encrypted Authenticated Resource Locators (EARLs) and Strong Internet Names (SINs) that build on the UDF platform.
III. Data at Rest Encryption [draft-hallambaker-mesh-dare].
Describes the cryptographic message and append-only sequence formats used in Mesh applications and the Mesh Service protocol.
IV. Schema Reference [draft-hallambaker-mesh-schema].
Describes the syntax and semantics of Mesh Profiles, Catalog and Spool Entries and Mesh Messages and their use in Mesh Applications.
V. Protocol Reference [draft-hallambaker-mesh-protocol].
Describes the Mesh Service Protocol.
VI. Reliable User Datagram [draft-hallambaker-mesh-rud].
Describes the Mesh presentation and transport layer.
VII. Mesh Callsign Service [draft-hallambaker-mesh-callsign].
Describes the Mesh Callsign Service that supports mapping of Mesh callsigns to the corresponding Mesh Service Provider.
VIII. Security Considerations [draft-hallambaker-mesh-security]
Describes the recommended and required algorithm suites and the security considerations for the Mesh protocol suite.
IX. Cryptographic Algorithms [draft-hallambaker-mesh-security]
Describes the cryptographic algorithm suites used in the Mesh and the implementation of Multi-Party Encryption and Multi-Party Key Generation used in the Mesh.
Open Source Reference Code
Repositories
Support Libraries
Mesh Libraries
Mesh Command Line Applications
Test Suites
Code synthesis tools used to build the Mesh
Experimental
GUI Management Tool
Communicator
Password Vault
Presentations
Demonstration Reels
Service
Single User / Multiple Device Examples
Multiple User Examples
Cryptography Tutorial
Coming soon
Fixing Passwords
Beyond Zero Trust
Beyond Identity
Making IoT work for the customer
Threshold Cryptography
Old
Architecture videos [old]