User Tools

Site Tools


security-best-practices-for-packet

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

security-best-practices-for-packet [2024/11/28 03:16] – created kc2ihxsecurity-best-practices-for-packet [2024/11/28 17:22] (current) – [Network Security Best Practices for Packet Radio] kc2ihx
Line 1: Line 1:
-====== Network Security Best Practices for Packet Radio ======+====== DRAFT - Network Security Best Practices for Packet Radio ====== 
 +//TODO: write more// 
 This is our attempt to document best practices for securing your packet radio node.  This is primarily concerned with network security in regards to connecting your packet node to the Internet or 44net, rather than over-the-air security.  The software used for packet radio is developed by //amateurs// who are doing this for fun, and thus may not follow many modern best practices.  While there are likely very few people targeting vulnerabilities in packet radio nodes, it is wise to take these measures on your node. This is our attempt to document best practices for securing your packet radio node.  This is primarily concerned with network security in regards to connecting your packet node to the Internet or 44net, rather than over-the-air security.  The software used for packet radio is developed by //amateurs// who are doing this for fun, and thus may not follow many modern best practices.  While there are likely very few people targeting vulnerabilities in packet radio nodes, it is wise to take these measures on your node.
  
security-best-practices-for-packet.1732763819.txt.gz · Last modified: 2024/11/28 03:16 by kc2ihx