Greenwegian open-access public networks: Citizens' initiative 56 ver. 01.01.03.9 --- All non-military/non-strategic Public networks deployed by the government of Greenway shall also be available for use by the general public, and shall provide non-dedicated, un-censored, and un-restricted public access, as long as the network connection is accessible from a non-restricted area. Everyone shall be guaranteed free access to available Public-use networks, except those networks which may be protected by law from access to the general public, for lawful reasons constituting a compelling governmental interest in protecting Greenway's National security. All Public networks accessible to the People shall have the internet available to them whenever possible. Those [completed] networks deployed by the Greenwegian government which are reasonably accessible from Public areas by the general public, with equipment in their common use, shall be open and freely available, for general access to the People, for them to operate in all lawful ways with at their own volition. The [Federal] Communications and Public Access Network Commission is empowered to grant or deny commercial usage licenses to commercial entities, upon request after review, and to lease their access to the network, at a [uniform] rate equal to their share of the construction, operation, and maintenance costs entailed in providing them service, as determined by the Legislature, and at the discretion of the Legislature may be charged an additional uniform amount not exceeding 16.666666666666% of the base cost, with such licenses being issued and leases granted for the conduction of regular business activities (not those activities which are subletting access, to the Public network). The Federal interstate networks shall operate in co-operating connection to each State's own public networks, so long as each State desires this greater connectivity and each individually opts into connecting to the Federal interstate network of their own volition. The State networks shall be free to operate independently as seems most suitable through their individual constitutional ordainments of law. All network equipment shall consist of open-source hardware. The Department of Open-Source Projects and Information is empowered to design and oversee the manufacture of network equipment for deployment and use by the public body. All network equipment shall operate on a version of GNU linux. The Department of Open-Source Projects and Information is empowered to fork the existing open-source operating system "openWRT", to create a new operating system, for the purposes of a uniform implementation to deploy in governmental/Public networking hardware, with the exception of [general] servers. The operating system will come complete with full open-source documentation released along-side it. This operating system shall be named "greenWRT" (with "WRT" being an abbreviation standing for "[W]ireless [R]ou[t]er"), but this name may be subjected to revision/change at a later time by a Citizens' initiative amending this one. Those Public networks which are deployed for use by the Greenwegian government shall be "maximally compliant" with the most recent "IEEE" standards applicable to their appropriate technology [when available]. They shall be operated in such a fashion consistent with the characteristics of "Net 2.0" as defined by this initiative, to the "maximum extent possible". "Net 2.0" [in this initiative] shall mean those networks, and their effects, including but not limited to protocols and interacting software, which conform to: Emphasis on user-centricity, []which will extend to the implemention of a national standard for "self-sovereign identity" using both decentralized identifiers and []agnostically[] utilizing any blockchain medium of exchange, for the use at the user's discression while they are on the public network or using a public network resource such as a server[]; Customizability; [Scalable] democratic routing schemes (as opposed to hierarchical routing); Resilience against censorship and surveilance; Decentralization by design, including ease of a Citizen's participation in the network infrastructure; Pathway redundancy; Resilience against failure and hardware faults; Providing serval functionality; Adaptivity; Privacy by design, including but not limited to maximal theorhetically-possible anonymization of the network, such as it's users and their hardware; Trustless distributed consensus methods; Secure post-quantum forward-secrecy encryption secure protocols [by default] including but not limited to being used for packets, tunnels, and end-to-end transmission;And- Secure by design, including integrated military grade automated/autonomous security (e.g. behavioural/artificial_intelligence threat detection, automatic intrusion-detection, etc...) as well as Artificial and True Intelligence attack resistance; The Greenwegian governmental networks shall utilize a fully end-to-end encrypted "IPv4" and "IPv6" implementation. They shall make use of an []anoNet bottom-layer with an internal[] "I2P" []inner-layer[] for general routing, and provide for the operation of multiple independent "I2P" in/out-proxies to the main internet. The Department of Open-Source Projects and Information shall oversee the development of a modification or alternative to []"anoNet" and[] "I2P" which incorporates all applicable "Net 2.0" features as defined in this initiative, being equally suitable for deployment in both the wired and wireless networks of Greenway, and Congress will see to the amending of the provision stipulating the use of []"anoNet" and[] "I2P" as the standard anonymization protocol, to incorporate this new development, and thereafter deploy it to Greenwegian systems. After its adoption, the Department of Open-Source Projects and Information are encouraged to continue the development of the protocol to meet the future needs of Greenway, under the direction of the [Federal] Communications and Public Access Network Commission under Congress, or through the People under their popular initiatives. The Public networks shall be powered independently [off-grid], and possess a [hybrid] organic super-capacitor and rechargeable solid-state/crystal battery or ("self-reactive") powercell (with either of which being without galvanic decay at non-molten operating temperatures) backup system. They may possess, either or both, traditional and single-wire grid-ties to the governmental power system, but only for the purpose of their individual backup power in case of disruption or failure of their independent energy generation or [hybrid] backup systems, to use for "intelligent power re-routing" needed for both state and national security purposes, and to feed their generation excesses back into the governmental power system, as part of a "smart grid". All sources and consumers of grid-tie and "intelligently re-routed" power supplied or received to and from each [independent] wireless system shall be localized as near to the consuming or receiving unit/s as is reasonably possible. Equipment deployed for Public networking shall be made resilient to [moderate or greater] electromagnetic pulses, from natural and artificial sources, including but not limited to lightning, nuclear detonation, and solar flare. The [Federal] Communications and Public Access Network Commission shall operate and maintain a Publicly owned Internet exchange point ("IXP") for explicit use [only] in the Publicly owned networks of Greenway. The [Federal] Communications and Public Access Network Commission shall oversee the deployment of a space-satellite link/modem to each [global] internet linking site, as a [backup or emergency] means of inter-connecting detached segments of the Greenwegian networks and for attaching the networks to the greater internet; Greenway shall be encouraged to invest in the development and deployment of its own Publicly owned space-satellite internet system for this purpose, though they may contract with other entities to provide these space-satellite internet services while the government does not possess these capabilities for itself. The space-satellite deployment may be carried out through a Private spaceflight operations contractor working with the Greenwegian government, for this purpose. The [Federal] Communications and Public Access Network Commission shall oversee the wired network deployment of [quantum-compatible] wired mesh networks which are maximally connected to each other, for general use by the government. All conventionally wired networks established for governmental use shall be implemented through an open-standard, being a [maximally connected] decentralized mesh, and be broadly compatible with equipment available and in general use by the general public. The [Federal] Communications and Public Access Network Commission shall oversee the deployment of fiber-optic in all wired network systems, for use as their primary conduit of operation. Where their deployment in fiber-optic may be overly prohibitive or impractical, the highest availble giga-bit Cat6 ethernet shall be employed alternatively. The [Federal] Communications and Public Access Network Commission shall oversee the deployment of [physical mesh] power-line ethernet to all grid-tied network enabled systems [established for governmental use], for use as a backup network in case of general equipment failure, sabbotage, emergency, or disaster. All "single-conductor" wired networks established for governmental use shall be implemented through an open-standard, being a [quantum-compatible] [maximally connected] decentralized mesh, and be broadly compatible with equipment available and in general use by the general public. The Department of Open-Source Projects and Information shall oversee the development of a hardware and broadcast standard for [resonant]-single-conductor_single-wire Gigabit-networking, which shall be known as "SinGig", and which shall be quantum-compatible and capable of operation with both either a manufactured conductive pathway, or, directly through the ground using the earth as the single-conductor for single-wire transciever capabilities. All additional and future wired communications and networking established for governmental use shall be implemented through globally compatible open-standard/s. When reasonable, each wired network type shall have overlap with another in both coverage area and have redundancy of nodes, to ensure complete coverage and operation during a partial interruption or failure of equipment. The public wired networks shall employ "CJDNS" for the standard protocol in wired mesh networking for all governmental systems, except those of military purpose, which may be subject to a different prescription entirely, on the discression of the legislature, however, unless the legislature prescribes another remedy for these essential networks, the implementation by the military will default to the same as prescribed in this provision. The [Federal] Communications and Public Access Network Commission shall oversee the wireless network deployment of 2.4GHz and 5Ghz WiFi, 2.5GHz WiMAX, 60GHz WiGig, along with 850MHz and 1.9GHz cellular, for general use by the government and as may be provided for the People. These wireless networks will in addition to their nessesary distributions, be additionally distributed along the whole of the Federally controlled roads/highways, enabling lawful access by the general public from all un-restricted_access Federal roads/highways. The wireless nodes will have [pre-established] pathway redundancy, and be placed strategically, at the distance between two-thirds to three-quarters of the maximum range available to the system while under [absolute] maximum load, and when the wireless transmitters are experiencing the [lifetime] maximum predicted amount of interference from nearby competing transmitters [both Public and Private]. The congress will see that there be established limits on the electromagnetic emissions emanating from Public wireless networks, in accordance with preserving the People's and the environment's safety and health, and to prevent interference with other transmitters both Public and Private, as is reasonably possible. All "WiFi" wireless networks established for governmental use shall be implemented through an open-standard, being a decentralized ad-hoc mesh, and be broadly compatible with equipment available and in general use by the general public. All "WiMAX" wireless networks established for governmental use shall be implemented through an open-standard, being a decentralized_ad-hoc_mesh-capable WiMax[-Advanced] that is broadly compatible with equipment available and in general use by the general public, providing VoIP and general computer network capability. All "WiGig" wireless networks established for governmental use shall be implemented through an open-standard, being a decentralized ad-hoc mesh, and be broadly compatible with equipment available and in general use by the general public, providing general computer network capability. All "Cellular" wireless networks established for governmental use shall be implemented through an open-standard, being GSM-capable, 3GPP-compliant, low-power long-range and mesh capable, along with broad compatibility with equipment available and in general use by the general public, providing both dedicated cellular voice calling and nG (number-Generation) computer network technology. All cellular network equipment shall operate through a derivative of open-standard LTE-Advanced[] which has low-power long-range mesh capabilities for serval functions[]. The Department of Open-Source Projects and Information is empowered to fork the existing open-source operator environment "OpenLTE", to create a new operating environment, for the purposes of a uniform implementation to deploy in governmental/Public cellular networking hardware. The operating environment shall be named "greenBTS" (with "BTS" being an abbreviation standing for "[B]ase [T]ranceiver [S]tation"), but this name may be subjected to revision/change at a later time by a Citizen's initiative amending this one. All "radiant" wireless networks established for governmental use shall be implemented through an open-standard, being capable of operation as a [quantum-compatible] [maximally connected] decentralized mesh, and be broadly compatible with equipment available and in general use by the general public. The Department of Open-Source Projects and Information shall oversee the development of a hardware and broadcast standard for [resonant]-radiant Gigabit-networking, which shall be known as "RadiGig", and which shall be quantum-compatible and capable of operation with both either a floating magnifying transmitter or an earth/planetary/body grounded unit, whether or not it is using [stimulated] plasma-channel filaments as conductive pathways, or, directly through fully conductor-less electrostatic induction. [] All governmental wired network adapters as well as wireless receivers, transmittters, and transceivers, shall be maximally adaptable, including but not limited to being software defined, "to the greatest extent possible". [] All additional and future wireless communications and networking established for governmental use shall be implemented through globally compatible open-standard/s. When reasonable, each wireless network type shall have overlap with another in both coverage area and have redundancy of nodes, to ensure cross-'tower' coverage and operation during a partial interruption or failure of equipment; Public networks shall retain emergency [serval] functionality whenever possible. The public wireless networks shall employ "B.A.T.M.A.N." for the standard protocol in wireless ad-hoc mesh networking for all governmental systems, except those of military purpose, which may be subject to a different prescription entirely, on the discression of the Legislature, however, unless the legislature prescribes another remedy for these essential networks, the implementation by the military will default to the same as prescribed in this provision. The Department of Open-Source Projects and Information shall oversee the development of a modification or alternative to "CJDNS" and "B.A.T.M.A.N." which unifies their two sets of features as much as technically possible, as well as additionally incorporate all applicable "Net 2.0" features as defined in this initiative, being equally suitable for deployment in both the wired and wireless networks of Greenway, and Congress will see to the amending of the provisions stipulating the use of "CJDNS" and "B.A.T.M.A.N." as the standard mesh-networking protocols, to incorporate this new development, and thereafter deploy it to Greenwegian systems. After its adoption, the Department of Open-Source Projects and Information are encouraged to continue the development of the protocol to meet the future needs of Greenway, under the direction of the [Federal] Communications and Public Access Network Commission under Congress, or through the People under their popular initiatives. The Greenwegian government will maintain multiple independent IPv4 and IPv6 "openNIC"-compliant DNS servers that keep no logs, provide "DNS over HTTPS" as well as "DNS over TLS", employ "DNSSEC", and have "DNScrypt" enabled. The network shall remain neutral to "ghost servers" and "ghost users" accessible from or operating within it. "Ghost server" and "Ghost user" [in this initiative] shall mean a server or client on a network which attempts to maximally obfuscates their location and identity as well as leave the minimum possible trace of their existence. The network shall keep no logs of connected or disconnected network equipment that may operate upon or come into proximity to the system's operating hardware or remote sensors. The People, of their own volition, are encouraged to particiapte in development and testing of the Greenwegian governmental network deployment and related concurrent projects. The People are encouraged to volunteer suggestions for improvments, including additional features, that should be integrated into the efforts related to the governmental networking projects. The Congress may donate network parts and equipment to the several States, for the States' own development of Public network infrastructures, though only when such transfer does not bind the State/s to any debt or further obligation owed to the Federal government, other than the [eventual] deployment of the network components by each State for [any lawful] Public purposes; The States are free to auction off their received network components after they have been put to propper use, and are eventually decomissioned, by their State. All [permanently] decomissioned Federal network equipment shall be made available for purchase by the People through Public auction, which shall serve the entire Nation. Any equipment which is not purchased by the People shall be made available to neighboring Nations first, and then to the whole of other nations, so long as they are not rival to Greenway in a state of congressionally declared war. Any equipment remaining after a reasonably lengthy period of time in auction, which may be decided exactly by Congress, shall be made for repurposement into proto-types for future Department of Open-Source Projects and Information projects, or made to be salvaged or sold as scrap or e-waste; In the case of scrap and e-waste sales, it should first be considered for sale to the State constituting the Federal District, and next to the several States of Greenway, and then to the general customers who may exist within Greenway, and finally, the world. The generated funds from these activities shall be added to the funds of the Department of Open-Source Projects and Information, with any excesses flowing into the general fund of Greenway. "Self-sovereign identity" (SSI) is a concept in the digital movement that only the user should own their identity data fully without intervention from outside administration. With SSI, the individual identity holders can fully create and control their verifiable credentials, without being forced to request permission of an intermediary or centralised authority and gives control over how their personal data is shared and used. The individual has a means of generating and controlling unique identifiers as well as some facility to store identity data. A SSI can be a decentralised identity, but could also be data from a social media account (postal service sector only), a history of transactions on an e-commerce site ([?]depatrment of goods and services[?]; can only be through the public services, not a requirement of private businesses to retain licensing), or attestation from friends or colleagues (very important, we emphsize the ability of people to vouch for ones character). In the centralised identity paradigm a person’s identity is provided by some outside entity. In the decentralised identity paradigm the user is at the centre of the framework and there is no need for third parties to issue and administer an identity. The Legislature is empowered to enact legislation effectual to this initiative. The Legislature may amend this initiative by a simple majority vote, or move to repeal it, in favor of a more fitting enumeration that is representative in spirit to this initiative, by simple majority vote, otherwise it must be amended or repealed by the Citizens through a simple majority vote. --- proposed additions: the government gives out SIM cards enabling easy connection to the governmental cellular network at cost of manufacture to the People if they can prove citizenship. the use of governmental SIMs shall not preclude the people deploying their own SIMs to connect to the governmental network. the government shall provide for a free service to enable private persons to create their own SIMs and register on the network. all recipients of the government issued SIM as well as private SIM holders connecting upon the network, may opt-in for governmentally provided robocall and robo-text prevention services, and these services will be offered to all government and private SIM holders freely. these services will enable the specific opting-in or opting-out from user specifiable companies, at any time, so that the Individual Citizen may tailor their own telemarketing experience. [] part of the purpose is to create a seperate Command and Control System that would survive a nuclear or cyber attack (MilNet, which includes "SNet" {secrets network}, a (DoD classified) independently-run, segregated system based on the civillian/non-classified internet, however, both systems shall be inter-operable as may be needed, for example, for emergency patching for National-network auto-healing; contains the SECRETs/sensitive component of the Defense Information Systems Network, which handles information classified up to "Top-Secret"), as well as to limited number of large, powerful research computers in the country, and that many research investigators, who should have access to them, were geographically separated from them; secure communication. emphasize robustness and survivability, including the capability to withstand losses of large portions of the underlying networks; Separating the civil and military networks,; purpose is to create a "National Information Infrastructure" which itself will connecting into the international internet (GlobalNet) through controlled gateways (controlled for national security purposes, which for example, include, in case of a global cyber attack against the Greenwegian systems; connection to public schools and public research center network compute resources; CivNet (Civil network) will also be capable of running in DoD-certified classified-capable "SNet"-mode, and be capable of secure segmentation for pathways under control of a network-provider (public, or private, whether single or multi-node); CivNet shall be designed at the hardware, firmware, programming language, OS, protocol, and software level identically to the MilNet, except that the MilNet shall be physically seperated from the Civilian system, except at controlled entry/exit points, and unlike the CivNet, it shall be segmented to protect from intrusion and non-authorized use, through firewalls and other access-controlled network-pathways; States and Cities shall be welcome to create their own StateNets, CityNets, and LawNets, or any other variety of network as may be needed for Public business, as their People may direct; []this note will probably used to create another public network initiative, for military operations and other national security interests; Defense Information Systems Agency[] [] need definition of "serval" (as in the 'serval project', or "serval mesh") need definition of "self-reactive" (as in the 'self-reactive diode/rectifyer', or "energy-scavenging self-charging liquid/solid crystal-battery") access to the governmental networks is a privilege, not a right, but it is a privilege that may not be removed nor limited in its excercise, except during the term of incarceration for an inmate, with restoration upon release from imprisonment. prohibit mac address tracking, and other hardware identification single-wire internet connectivity for Greenwegian National governmental systems EMP and EMI resistance of the physical network components hardening against hacking, exspecially AI enhanced hacks (i.e. rule poking tools) interplanetary file system (IPFS) look more into Microsoft ION in regards to the self-sovereign identity stuff, partuclarly how they use IPFS (we will NOT use ION, but may base our design in part off of it); the identity platform is for online logins, [?]electronic requests for digital document replacements[?], and e-voting, and not to be used as a form of identification for anything else besides internet based services that require verification of the identity of a user; & no need for any form of identification to use the public network or a public website except for as may be required under public or national security, such as to log-in to a personal account held on a government server (such as an email or social media login), or identifying citizens of a particular state to allow e-voting, etc...; we do not want to require a state ID to use the internet, only for specific and limited reasons, such as voting and tax record submission[]; --- an internet without IP addresses, using an alternative for network addresses and routing; anonymous, private, and secure internet, by design Creating a fully anonymous, censorship resistant and DoS proof, decentralized, trust-less, web and internet without IP addresses ?or ports?, neither MAC addresses or IMEI, as well as no tracking or snooping; Anonymous, private, secure, and resilient by design, to promote the vast enabling, creating, and catalyzing potential of the open internet as well as other information communication technologies and services for community-building, civil society, and global economic, social, scientific, cultural and political development, contributing as such to the progress of humankind as a whole; forward secret, automatic encryption by default is a must; protocols must be re-written to take into account these procedural improvements, such as email protocols, instead forcing automatic PGP encryption and handling the process behind the scenes, more similar to Silence/SMSsecure automatic key handling, and the protocols must require minimal user-interventions to be useful to the common man on the internet; "protonmail auto-PGP as a default in the email protocol" - with sidewards compatibility for international-standard IP technology, for allowing attachment to the greater Greenwegian network newly designed base networking protocols to take anonymity into acount, as well as censorship resistance --- fingerprint-free networks --- --- have a protocol like IPFS, or even IPFS itself, if it will work with our darknet, that allows distributed hosting; distributed data storage for web-servers, like torrents; to view a site, you download a "torrent" (really its page magnet link, with the ability to reference to files in other torrents to fetch site info, so that there is not an over-redundance of information on the local users disk); --- --- AnonLAN: An idea An idea has been in my mind for some time now. Seeing how people are trying to fistfuck the Internet with ACTA, PIPA, SOPA and the like, I feel the urge to express it. It is not a complete solution and it is entierely possible that someone else has had this idea before, but it is a start. I propose AnonLAN, a software that manages selective and automatic sharing of information through wireless LAN. In our times wireless LAN has become a very common form of communication, so common in fact that the more densely populated areas of our planet are quickly becoming covered with overlapping wireless networks while a lot of people are carrying mobile phones that are capable of connecting to these networks. With the following set of rules it could be possible to turn these mobile phones into devices capable of automatic and selective information exchange: 1. There is a local drive/folder/file called ShareSpace with a capacity selectable by the user, in which files that shall openly be shared will be placed. 2. Each file placed in ShareSpace must be small enough to be transmitted via wireless LAN within a few seconds (Watergate.txt is ok, JarJars_Adventures_On_Idiot_Island_fullseason1080p.zip is not). 3. For each file in ShareSpace the following information must exist: one or more tags describing its content (i.e. #text, #news, #political, ...), a hash of the file (i.e. md5, sha256, ...), the date of its placement in ShareSpace and the number of times it has been transmitted. 4. The user is able to enter a list of tags that will be preferred while transmitting and a list of tags that will be blocked. 5. Wireless LAN will be turned on at all times, alternating between offering an unencrypted wireless network and scanning the environment for exactly these networks. 6. Once an open unencrypted network has been found, a point-to-point connection between the offering and the scanning device is established. 7. The two devices exchange complete lists containing the tags present in their respective ShareSpace. 8. Each device chooses a tag from the list of its counterpart at random. Preferred tags and tags that do not yet exist in a devices own ShareSpace have a higher chance of being chosen than any other tag. Blocked tags are never chosen. 9. Each device creates a list of hashes of its own files that match the chosen tag. 10. The two devices exchange their chosen tag along with the list of hashes. 11. Each device starts transmitting files from their own ShareSpace to the other device that match the received tag and do not match any of the listed hashes (i.e. every file that the other wants and doesn't have already). 12. If the connection does not break down on its own, it is severed after a short period of time (~ a minute). 13. Each device changes its MAC Address to a new random one. 14. Files in ShareSpace that have not finished transferring are deleted. 15. If the capacity of ShareSpace is about be be exceeded, files that have been transferred at least once and have been in ShareSpace for some time (selectable by user) are deleted as well to free up space. 16. Back to 5. This could be implemented for stationary devices with a bigger capacity as well, allowing them to exchange information with mobile phones or even other stationary devices if the grid grows dense enough. Cons: -Worms, Trojans, Virii and Spam will bloom like flowers in spring. -You can easily misuse tags and file childpr0n under #governmentleaks -Traps are easily laid. Imagine a siren going off if an AnoLAN instance is identified within a public building. -Will only work in areas with a dense enough population. Pros: -You are your own provider. -No censorship apart from the user choosing to not receive files with certain tags. -Tracing files back to their origin is nearly impossible. My hope is that this idea will be discussed, improved upon and maybe even implemented by people that have more time and skill at their hands than I do. For the future of free information. --- Create a global darknet, a decentralized web of interconnected wireless mesh networks that operate independently of each other and the conventional internet. In a wireless mesh network, individual nodes can relay data for other nodes, ensuring that the routing of data remains robust as nodes on the network are added and removed. The idea behind TDP is that such a network would be resistant to censorship and shutdown because there would be no central point of control over the infrastructure. "Basically, the goal of the darknet plan project is to create an alternative, more free internet through a global mesh network," explained a TDP organizer who goes by the Internet handle 'Wolfeater.' "To accomplish this, we will establish local meshes and connect them via current infrastructure until our infrastructure begins to reach other meshes." TDP seems to have been influenced in part by an earlier unofficial effort launched by the Internet group Anonymous called Operation Mesh ( see wiki.pirateparty.ca/index.php/Operation_Mesh ). The short-lived operation, which was conceived as a response to the Anti-Counterfeiting Trade Agreement (ACTA) and its potential impact on Internet infrastructure, called for supporters to create a parallel Internet of wireless mesh networks. The idea is intriguing, but it poses major technical and logistical challenges, and it's hard to imagine that TDP will ever move beyond the conceptual stage. The group behind the effort is big on ideas but short on technical solutions for rolling out a practical implementation. During the IRC meeting, they struggled to coordinate a simple discussion about how to proceed with their agenda. --- Operation Mesh - Contents 1 Introduction and Summary Instructions 2 Step One and Two: Installing OpenWrt on Your Wireless Router 3 Step Three: Running the B.A.T.M.A.N. Installation and Configuration Shell Script 4 Step Five: Implementing []anoNet and[] I2P 5 Related Reading - Introduction and Summary Instructions Operation Mesh is a world wide effort to establish anonymous wireless mesh networks through the use of the B.A.T.M.A.N. mesh networking protocol, []anoNet[], I2P (a garlic routing anonymity network), and torrents. If you own a wireless router, chances are that you can hack it and turn it into a mesh network node with relative ease. This article aims to provide documentation on this process in addition to information useful for wireless mesh networking and general anonymity. Step 1: Acquire a router compatible with the OpenWrt firmware. Chances are you have one in your house (the router you're using now) or could pick one up for a relatively low cost. Step 2: Install OpenWrt on that router and enable wireless. Step 3: Use the opmesh.sh script to configure your router for wireless mesh networking. Step 4: Establish wireless mesh networks using other routers and high-gain directional and omnidirectional antennas (e.g. Fabfi and 15 dbi omnidirectional antennas). Step 5: Implement supernodes with IP2 Step 6: ??????? Step 7: Profit! Step One and Two: Installing OpenWrt on Your Wireless Router - See the OpenWrt table of supported hardware, and follow the instructions specific to your variety of router. In most cases you will be able to use a web-based user interface (UI) to flash your your router with the OpenWrt firmware. - Step Three: Running the B.A.T.M.A.N. Installation and Configuration Shell Script This is an incomplete shell script that installs the required packages to make a B.A.T.M.A.N. mesh network, removes conflicting packages, configures your system to make a mesh bridge, and spoofs your wireless interface MAC address. Note: This script runs assuming that you removed the line under "# REMOVE THIS LINE TO ENABLE WIFI" in the directory /etc/config/wireless, and configured your device as needed during the installation of OpenWrt. It should look something like this: config wifi-device radio0 option type mac80211 option channel 1 option macaddr 00:24:a5:d7:85:2a option hwmode 11ng option htmode HT20 list ht_capab SHORT-GI-40 list ht_capab DSSS_CCK-40 # REMOVE THIS LINE TO ENABLE WIFI: config wifi-iface option device radio0 option network lan option mode adhoc option ssid OpMesh option encryption none | Script source on PiratePad - Step Five: Implementing []anoNet and[] I2P I would speculate that implementing []anoNet and[] I2P on a B.A.T.M.A.N. mesh network will require the construction of supernodes. This need arises out of the limitation that most routers don't exceed even 64mb of RAM or a CPU speed of 400 Mhz (these specifications belonging to the relatively powerful Buffalo WZR-HP-G300NH). []anoNet and[] I2P needs more resources than are typically available on routers. - Related Reading Opportunities and Challenges for Mesh Networks Using Directional Antennas https://web.archive.org/web/20120107182102/http://www.cs.ucdavis.edu/~prasant/WIMESH/p13.pdf|op FabFi(an open-source system to transmit wireless ethernet signals across distances of up to several miles) https://web.archive.org/web/20120107182102/http://fabfi.fablab.af/index.html|fab PirateBox (a self-contained mobile wireless communication and file sharing device) https://web.archive.org/web/20120107182102/http://wiki.daviddarts.com/PirateBox|pi Anon Ops pirate pad with relevant information https://web.archive.org/web/20120107182102/http://piratepad.net/iWmX0JdClJ|anon --- software defined radios for greenway internet --- interstate internet system, in co-operation with intra-state and intra-county closed networks with internet attachment exchang point connection --- device-to-devide VoIP calling system that allows unlimited size group calls, and also supports video streams; can also send files back and forth and text messages including MMS serives! ---