top of page
  • Facebook
  • X
  • LinkedIn
  • Youtube
  • Etsy

Blackout Comms Security

Blackout Comms offers two different operating models with slightly different security. The Private Cluster security model is described below.

crown(1).png
Private Clusters

Devices in a cluster share a common root (admin), and must be onboarded one time by that device, in-person and in proximity.

 

Devices are ignored & blocked from communication unless they are part of the private cluster.

mesh_example (1).png

A cluster is a group of 2 or more Blackout Comms devices that trust one another and assist in mesh-related functions.

frequency.png
Frequency Hopping

The cluster automatically rotates frequencies every minute or so in an unpredictable pattern, determined by a key-dependent algorithm.

Not only does this keep off-cluster devices from seeing the traffic, but also lowers risk of interference & jamming.

 

When two devices exchange packets directly, each packet is transmitted on a different frequency, determined using an asymmetric-key dependent algorithm, meaning the pattern is specific to those two devices.

 

Learn More

sign.png
Digital Signatures

All messages are automatically digitally signed with the sender’s private key, using ECDSA. The signature follows the message all the way to the the recipient.

 

Thanks to the chain of trust, all devices on the cluster will automatically receive one another’s public keys, and be able to validate the signature.

 

The signature includes a timestamp element, so the freshness can be validated, along with the content.

 

For asymmetrically encrypted messages, any device in the cluster can validate the signature before meshing, even though it can’t decrypt the payload.

 

Learn More

link.png
Chain of Trust

All devices that the root device trusts become automatically trusted by other on-cluster devices.

​

Check the onboarding page for more details about this, but in essence a chain of trust, with root at the top, helps keep the cluster secure and private.

​

Learn More

data-encryption.png
Encryption

Every message, ping, location, and mesh packet is encrypted during transmission.

 

Direct messages (one device to another) are encrypted asymmetrically, so even other devices assisting in delivery cannot decrypt.

 

Broadcast messages and pings are encrypted symmetrically, so all on-cluster devices are able to decrypt.

 

All sensitive data is symmetrically encrypted at rest using your password or device-generated key.

 

Learn More

floppy-disk.png
Data Storage

With private clusters, no keys are ever manually shared or even viewable. You cannot export or view any symmetric or private keys.

​

If you are using an SD card, all sensitive data and configuration is encrypted at rest, with a password you choose, or by a device-generated key if you don’t choose one.

​

Learn More

delete.png
No Operating System

Blackout Comms is a fully embedded firmware system. Depending on your device, it either uses Free RTOS or no OS.

 

Either way, there is simply no mechanism for an OS to analyze your data and decide whether to leak it or not. There is no way for the OS to suddenly decide to disable an “app” or lock / share your data.

 

The device is also not leaking your position and behavior to tech companies 24/7.

bottom of page