Which brings me to part two, MeshMarauder.
An open source tool demonstrating proof-of-concept exploits against the DEFCON 33 Meshtastic firmware.
MeshMarauder will demostrate:
- Tracking user activity on any mesh regardless of encryption usage
- Hijack all meshtastic user profile metadata
- Change any users public key
- Send messages as any user in channel chats that appear authentic
- MITM direct messages
https://meshmarauder.net
#defcon #meshtastic #meshmarauder #cybersecurity
You have it correct. If you’re using ham mode, you’re allowed to use more power, but hams cannot have encrypted data. Therefore, ham mode is disabled by default.
Also with Ham Mode, if you do enable it, you can only talk to other nodes also using Ham Mode, unencrypted. Therefore, you lose access to the majority of the mesh, which makes it kind of pointless, except for experiments.
You have it correct. If you’re using ham mode, you’re allowed to use more power, but hams cannot have encrypted data. Therefore, ham mode is disabled by default.
Also with Ham Mode, if you do enable it, you can only talk to other nodes also using Ham Mode, unencrypted. Therefore, you lose access to the majority of the mesh, which makes it kind of pointless, except for experiments.