Sovereign Mesh Networking
Overview
NØN-OS operates entirely on a vendor-agnostic, sovereign mesh network designed to replace traditional DNS, ISP, and centralized routing dependencies. The mesh layer is the primary transport for:
Capsule distribution
zkProof receipt broadcasting
Peer discovery
Trust score propagation
Unlike typical overlay networks that ride on top of corporate-controlled infrastructure, NØN-OS treats the mesh as first-class infrastructure — bootstrapped locally, discovered peer-to-peer, and verified cryptographically.
Core Design Goals
No Hardcoded Authorities — The mesh must function without root servers, public bootstrap nodes, or fixed entry points.
Privacy by Default — Onion-routed paths prevent observer correlation.
Resilience to Partitioning — Nodes continue operation in isolated mesh segments with eventual consistency.
Proof-Aware Transport — Every data payload can carry an attached zkProof receipt for verifiable authenticity.
Layered Architecture
The NØN-OS mesh stack is implemented across several key modules in the repository:
Discovery
beacon.rs
Periodic broadcast of node presence and capabilities over LAN/WAN with signed identity packets.
Trust Sync
trust.rs
Distributes and reconciles operator trust scores across the network.
Routing
mesh.rs
Maintains onion-routed link state tables for peer-to-peer capsule and proof transfer.
Gossip
gossip.rs
Rebroadcast layer for proof receipts, manifest updates, and operator events.
State Hash
state.rs
Produces runtime state digests for verification and sync purposes.
Discovery & Beaconing
Signed Presence Packets
Every node periodically emits Beacon Packets containing:
Node onion address
Public ed25519 identity key
Supported capabilities (zkProof, storage capacity, bandwidth class)
Trust score
Security — The packet is signed by the node’s private key, making spoofing or impersonation computationally infeasible.
Adaptive Broadcast Domains
Beacon intervals and target peers are adaptive:
Dense meshes → Reduced broadcast frequency to avoid saturation.
Sparse meshes → Increased frequency for rapid convergence.
Routing, Onion-Routed Paths
All mesh traffic is encapsulated in multi-layer encryption envelopes empowering Anyone Network, but with:
Short-lived circuit IDs bound to proof cycles.
Integration with
onion.rsfor key exchange and layered decryption.
Multipath Resilience
Capsule data is split into chunks and routed over multiple independent paths. This:
Prevents single-path correlation.
Improves throughput in volatile topologies.
Allows partial reconstruction even if some paths are disrupted.
Gossip Protocol
Proof-Aware Gossip
gossip.rs implements a selective rebroadcast algorithm:
Prioritizes zkProof receipts and capsule manifest updates.
Uses an exponential backoff to avoid redundant flooding.
Anti-Sybil Flood Control
Nodes cross-reference gossip source keys against trust.rs:
Low-trust peers’ messages propagate slower.
Proof-verified peers enjoy fast-lane rebroadcast privileges.
State Synchronization
Hash-Based State Snapshots
state.rs periodically computes Merkle root hashes of local runtime state:
Running capsules and their digests.
Stored capsule manifests.
Pending proof receipts.
These hashes are exchanged with peers to detect divergence without full data transfer.
Eventual Consistency
If discrepancies are detected:
Nodes request missing proofs or manifests.
Requests travel over onion-routed channels.
Data is reconciled locally and hash trees updated.
Trust-Weighted Topology
trust.rs assigns each peer a dynamic trust score based on:
Proof submission reliability.
Uptime and availability.
Absence of malicious gossip or invalid proofs.
Routing Bias — High-trust peers are more likely to be selected for critical proof and manifest transfers.
Failure Modes & Countermeasures
Targeted Peer Blacklisting
Multipath routing and adaptive peer re-selection.
Sybil Flooding
Trust-gated gossip and proof prioritization.
Metadata Leakage
Onion-routing with ephemeral circuit IDs.
Partition Isolation
Autonomous operation with delayed proof sync.
Integration with zkProof-Bound Execution
The mesh layer is proof-native:
Capsules and their proofs are first-class network objects.
Verification can happen in-flight before storage or execution.
Operators earn micro-fees for proof relay and capsule seeding.
Future Extensions
Mesh-Layer Market — Operators can price relay/bandwidth as a service for higher-value capsule distribution.
Post-Quantum Onion Layer — Replace curve25519 key exchanges with Kyber/Dilithium for PQ security.
Cold-Start Bootstrap Protocol — Satellite or LoRa-based broadcast for fully air-gapped mesh seeding.
Last updated


