Skip to content
RoklandRokland
How secure is Meshtastic?

How secure is Meshtastic?

Recently we received an inquiry from a user that "hacked" the "weak" security of Meshtastic. The user was a self-proclaimed expert that studied computer technology. Words from users like this can spread fast over forums and Discord. If you have come across data suggesting Meshtastic security is not strong, here is what you should know.

Meshtastic uses 256-bit AES (AES-256), which is considered extremely secure, effectively unbreakable with current technology when implemented correctly. No practical attack exists that can brute-force it.

It has 2^2561.16×10^77 possible keys, which is:

1,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 possible keys.

To put it in perspective, if you built a machine that could test 1 trillion keys per second and ran it for the entire age of the universe (~13.8 billion years), you would still not come close to exhausting the keyspace.

So how did our hacker friend do it so quickly and easily?

When AES-256 gets “broken”, it’s usually not the math — it’s the implementation:

Weakness What happens
Bad passwords Human-guessable keys defeat strong crypto
Reused IV/nonce Allows message pattern leakage
Side-channel attacks Power usage / timing leaks the key
Compromised endpoint Malware steals decrypted data
Poor key storage Keys found in memory, logs, firmware

256-bit AES is used for classified government data, military, and banking. Security is one of the strongest points of Meshtastic communications. 

Leave a comment

Your email address will not be published..