Podcast
Root Causes 205: Anatomy of an Encrypted Peer-to-Peer Mesh Network


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 9, 2022
Secure online collaboration poses logistical and technical challenges under the best of circumstances. Now imagine you have no designated IT staff, no designated hardware, a small budget, and remote participants who are not deeply technical. In this episode Jason Soroko explains how he was able to quickly and easily create an encrypted communications mesh for use by him and his collaboration team.
Podcast Transcript
Lightly edited for flow and brevity.
And this is peer-to-peer mesh network encryption underlying all of this. I hope that’s a good enough explanation for what the use case is and what I’ve accomplished with the software. I’d like to talk about why this is interesting on this podcast. So, what’s going on here? Yes, it’s crypto keys. This is what’s underlying all of this. Obviously, because we’re talking about an encrypted mesh, each of the encrypted tunnels between peer-to-peers are being created by basically a key pair that was generated at the point of provisioning the users. So, the user themselves possesses the private key on their device. All the public keys are managed in a central server, and my instance basically it’s Tailscale who actually hosts to those public keys for me.
All I know is that the free-tier option of what they’re doing what they call the friends and family tier, I’ve got essentially one administrator with a handful of different nodes that are connecting, and it’s working beautifully for me.

