Security - Phantomojo/GhostWire-secure-mesh-communication GitHub Wiki
Security & Privacy
GhostWire is built with security and privacy as core principles. This page details the security architecture, features, and best practices.
Encryption
- End-to-End Encryption: All messages are encrypted using industry-standard cryptography (AES-256-GCM, X25519, HMAC-SHA256).
- Perfect Forward Secrecy: Ephemeral keys and session rotation.
- Hybrid Crypto: Support for post-quantum algorithms (planned).
Key Management
- Ed25519/X25519: For identity and session keys.
- Ephemeral Identities: Temporary keys for privacy.
- Key Rotation: Automated and manual rotation supported.
- Secure Storage: Keys stored encrypted on disk or in secure enclaves.
Trust & Defense Modules
- Sybil Defense: Prevents fake node attacks using reputation, proof-of-work, and social trust.
- Quotas: Rate limits to prevent spam and abuse.
- Blacklists: Block malicious nodes or addresses.
- Disaster Triggers: Emergency wipe, panic button, and rapid shutdown.
- Reputation: Nodes earn trust over time; bad actors are penalized.
- Federation: Multiple networks can interconnect with trust boundaries.
- Traffic Obfuscation: Cover traffic, timing randomization, and packet padding to resist surveillance.
Threat Model
- Adversaries: Censors, eavesdroppers, Sybil attackers, spammers, malicious insiders.
- Goals: Confidentiality, integrity, availability, plausible deniability.
- Mitigations: Strong crypto, modular trust, rapid response to threats.
Best Practices
- Always use the latest release.
- Rotate keys regularly.
- Enable all security modules.
- Report vulnerabilities via GitHub Security.