The Frequency of Dissent

The Frequency of Dissent

Every internet shutdown begins the same way. A government official contacts an ISP, and the ISP complies. The connection between 92 million Iranians and the outside world runs through a handful of fiber optic cables that cross the border at known locations, and cutting those cables or ordering their operators to stop routing traffic is an afternoon's work. Myanmar's military junta proved this in February 2021 when it ordered the country's four mobile operators to go dark. They did. A billion-dollar communications infrastructure, built over decades, switched off by a phone call.

Access Now documented 296 internet shutdowns across 54 countries in 2024, a record that surpassed the previous year's 283 across 39 countries. Signal was blocked in nine countries, up from two the year before. The tools work, but every communication system that routes through centralized infrastructure inherits that infrastructure's obedience to whoever holds power over its operators. Encrypting the payload solves the confidentiality problem while leaving the availability problem untouched. A government that cannot read your messages can still ensure you never send them.

Mesh networking inverts this architecture. In a mesh, every device is both an endpoint and a relay, forwarding traffic for its neighbors through a web of short-range radio links that require no towers and no fiber, operating on unlicensed spectrum without permission from any operator or regulator. The network exists because its participants exist, growing as new nodes extend coverage and rerouting around any node that disappears. There is no cable to cut and no kill switch to flip, because the infrastructure is the crowd itself.

This inversion carries economic consequences that matter more than the topology itself. Centralized communications infrastructure is a public utility: expensive to build, impossible to fund without either taxation or monopoly pricing, and controlled by whoever paid for the construction. Mesh converts that same infrastructure into something closer to a club good, where each participant's contribution directly improves their own service while strengthening the network for everyone else. The incentive to participate is built into the physics, and no one needs to solve the funding problem because each node operator is already solving it for themselves.

The Topology Is the Economics

Traditional telecommunications infrastructure requires enormous capital investment concentrated in the hands of a few operators. A cell tower costs $150,000 to $300,000 to build and $30,000 to $50,000 per year to maintain. The fiber backhaul connecting it to the broader network costs millions per mile in urban areas. These costs create natural monopolies: only a handful of companies can afford to build national networks, and those companies become the chokepoints through which all communication flows. When a government wants to shut down the internet, it calls three or four executives. The cost structure guarantees the concentration of control.

Mesh networking distributes that capital investment across every participant. A LoRa radio capable of joining a Meshtastic mesh costs between $15 and $50. A solar panel and battery to run it indefinitely costs another $30. For roughly the price of one month's cell phone bill, a person can become a permanent node in a communication network that answers to no one. The aggregate investment across a thousand such nodes exceeds what any single operator would spend on a comparable coverage area, yet no individual participant bears more than a trivial cost or holds a position of control over anyone else.

This distribution of cost produces a distribution of authority that no organizational chart can replicate. Guifi.net in Catalonia operates over 37,000 nodes across 71,000 kilometers of links, making it the largest community network on earth. No corporation built it. No government funded it. Individual participants connected their rooftops to their neighbors' rooftops because each connection improved their own internet access while extending the network's reach. Freifunk in Germany runs more than 41,000 access points across 400 local communities, six of which exceed a thousand nodes each, built entirely on donated hardware running open-source firmware. NYC Mesh has connected over 2,000 member nodes across all five boroughs of New York City, charging nothing and accepting voluntary donations, because the people who built it needed internet access and discovered that building it together was cheaper than buying it alone.

The pattern across all three networks is the same: participants who invest in their own connectivity produce a network as a byproduct. The funding crisis that plagues privacy infrastructure like Signal and Tor, where the people who benefit most contribute least, dissolves when contribution and benefit are inseparable. Every node operator funds the network by participating in it, because participation is the funding mechanism.

The Physics Favors the Builder

Surveillance of centralized communications infrastructure is cheap because the architecture concentrates traffic at a small number of chokepoints. The NSA's PRISM program collected data from nine technology companies. The GCHQ's Tempora program tapped 200 fiber optic cables carrying transatlantic traffic. A few points of access yielded a complete view of global communications. The cost of surveillance scaled with the number of chokepoints, not with the number of targets, which made bulk collection economically rational for any sufficiently funded intelligence agency.

Mesh networking reverses this economics. Traffic in a mesh flows through short-range radio links between individual nodes, and each link carries only the traffic its neighbors generate or relay. Monitoring a mesh requires physical proximity to individual nodes, and the number of monitoring stations scales linearly with the number of nodes. A city with ten thousand mesh nodes would require thousands of receivers positioned within radio range of their targets, each capturing only a fragment of the network's total traffic. The cost of surveillance scales with the number of participants, which means the network becomes harder to monitor as it grows, the exact opposite of how centralized infrastructure behaves.

RF propagation compounds this advantage. A fiber cable follows a fixed, mappable path, but a radio signal bounces off buildings and diffracts around obstacles, reaching receivers through paths that shift with weather and environment. LoRa radios operating in the ISM bands at sub-watt power levels are individually difficult to distinguish from the growing background of IoT devices on the same frequencies, and locating every transmitter in a dense mesh requires resources proportional to the network's size.

This does not make mesh networks invisible. A software-defined radio with a high-gain antenna can passively capture LoRa traffic across a wide area from a single elevated position, and Meshtastic's AES-256 encryption is only as strong as pre-shared key hygiene in a stressed population during a crisis. Iran proved in January 2026 that governments can jam satellite communications, and LoRa transmissions are equally vulnerable to broadband jamming. The question is whether the cost of surveillance is prohibitive at scale. Tapping a fiber optic chokepoint costs one installation per cable. Covering a mesh costs one installation per node. That difference in cost structure determines which architecture a surveillance state prefers its citizens to use.

What Exists Today

The practical mesh field divides into two categories that critics and advocates tend to confuse: community Wi-Fi meshes that deliver real broadband, and LoRa meshes that deliver text messaging. Conflating the two inflates expectations for LoRa projects and undersells the achievements of community networks.

Meshtastic is the most widely adopted LoRa mesh platform, with over a hundred hardware variants from RAK Wireless, Heltec, LILYGO, and Seeed Studio. A Meshtastic node communicates on unlicensed spectrum in the 868 MHz or 915 MHz bands depending on region, propagating messages through flooding: every node that receives a message rebroadcasts it, hopping from node to node until it reaches its destination or expires. Encryption is on by default, using AES-256 with pre-shared keys for group channels and asymmetric encryption for direct messages.

The honest limitation is bandwidth. LoRa's default Meshtastic data rate is approximately one kilobit per second. A single photograph would take hours to transmit. Voice calls and video are impossible. Meshtastic is a text paging system, closer to 1990s SMS than to anything resembling the modern internet. The flooding protocol that makes it simple also limits its scalability: Meshtastic's own documentation recommends against the default LongFast preset for networks exceeding sixty nodes, because retransmissions saturate the available spectrum.

Reticulum, designed by Mark Qvist, operates at a different layer of abstraction. It is a networking stack that runs over anything: LoRa radios, Wi-Fi, packet radio, serial connections, even the internet itself. Every Reticulum link is encrypted end-to-end by default using X25519 key exchange with AES and HMAC, and the protocol assigns cryptographic addresses that work across any transport medium. The Sideband app provides a user-facing messenger, and the Nomad Network offers a terminal-based communication platform for more technical users. Reticulum's transport-agnostic design means a message can begin its life on a LoRa radio, hop to a Wi-Fi link, cross the internet, and arrive at its destination on a packet radio without any participant needing to know or care about the path it took.

Reticulum's weakness is organizational. Qvist announced in late 2025 that he would step away from development. His protocol is public domain and the source code is open, but a project with 4,800 GitHub stars and a single primary developer represents a strategic dependency that the community has not yet resolved. Sound code with a bus factor of one is a gift that could expire without warning.

What We Can Build

Mesh networking today works for text coordination without infrastructure and fails at everything the modern internet does well. The scenarios where mesh matters most are precisely the scenarios where everything else has already failed.

When Hurricane Helene destroyed first responder communications across rural North Carolina and Tennessee in late 2024, Meshtastic nodes provided the only inter-household communication in communities where cellular towers would remain down for weeks. Each device cost $30 apiece and ran on batteries or solar power. The information that mattered, where to find clean water, which roads were passable, who needed evacuation, fit in 200 characters. During the 2019 Hong Kong protests, Bridgefy recorded 60,000 downloads in seven days; after Myanmar's 2021 coup, it exceeded one million. Royal Holloway and ETH Zurich researchers broke Bridgefy's encryption twice, proving that "mesh" and "secure" are independent properties, but the demand signal for infrastructure-independent communication is unambiguous and accelerating. Access Now's 296 shutdowns in 2024 is not a number that will decrease, and every shutdown is an advertisement for communication that requires no infrastructure to control.

The conditions for building this layer have converged. Hardware has reached commodity pricing: a complete Meshtastic node can be assembled for under $50, and RAK Wireless and Heltec sell pre-assembled units that bring the barrier to entry down from "amateur radio hobbyist" to "can follow instructions on a screen." Meshtastic and Reticulum coexist on the same LoRa radio hardware, running on different frequency channels without duplicating physical infrastructure, providing protocol diversity at the same price point.

The longer-term possibility is more interesting. A dense urban mesh with thousands of nodes could carry more than text. Community Wi-Fi meshes have already proven this: Guifi.net delivers real broadband to its 37,000 nodes. The technical path from LoRa text paging to community broadband runs through hybrid architectures where LoRa provides the resilient signaling layer and Wi-Fi or point-to-point microwave links carry the bandwidth. A Meshtastic channel announces that a community gateway is available while a Reticulum link negotiates the encrypted connection over a directional Wi-Fi bridge that carries the actual data. The pieces exist today; what remains is the integration work to make them function as a single coherent stack.

Lightning payments over mesh links would complete the economic circuit, allowing node operators to price their bandwidth and relay services in sats, converting the club good into a functioning market where connectivity is bought and sold at the edges with no middleman collecting a toll. Meshtastic's extensible message types and Reticulum's transport-agnostic link negotiation already provide the protocol layer. Integration is the missing piece, and integration is engineering work with a clear specification, not a research problem waiting for a breakthrough.

GoTenna's acquisition by defense contractor Forterra in October 2025 illustrates the competing trajectory. Forterra absorbed goTenna's 85 employees along with its DHS and Air Force contracts and its hardware manufacturing relationships. The consumer mesh messenger became a military communications product. Defense procurement can buy development talent and production capacity, both of which the civilian mesh community lacks. The structural defense against this capture is that LoRa mesh protocols are open source and the hardware is commodity electronics: ESP32 and NRF microcontrollers that anyone can order for $15 from a dozen manufacturers. Forterra can corner the market for ruggedized tactical mesh radios, but it cannot corner the market for a $15 chip running firmware that anyone can compile.

The Choice

Every communication technology embeds an assumption about who controls the infrastructure. The telephone network assumed a regulated monopoly, the internet assumed cooperative peering between autonomous systems, and mobile networks assumed licensed spectrum operators answerable to national regulators. Mesh networking assumes that the people who communicate own the infrastructure they communicate through. Users own the radios and operate on unlicensed spectrum running open protocols, with no intermediate authority positioned to receive a shutdown order, because no intermediate authority exists.

296 times in 2024, someone with power over a centralized network chose to use that power against the people the network was supposed to serve. Each shutdown proved that centralized communication contains a vulnerability no amount of encryption can patch: the people who own the wires can always choose to cut them. A $30 radio in a window makes the shutdown playbook obsolete by removing the assumption on which every shutdown depends, that the government controls the infrastructure. That assumption holds only as long as citizens rely on infrastructure they do not own. The only people who can change this are the ones willing to put a radio in the window before the shutdown arrives.