Riches in the ground¶
Imagine the Internet as a giant, constantly shifting map where every network (run by companies like Google, ISPs, or cloud providers) has to figure out how to send data to every other network. This is not done with a single master plan. It works through a mix of cooperation, handshake agreements, and some technology under the hood. When one digs deep enough though …
If your security relies on people being rude to strangers, you’re already hacked:
- Rootways of the World Tree (@Internet)
- Rootways of the World Tree (attack trees)
- Transmission Control Protocol (TCP)
- Network Layer Protocol (IPv4 or IPv6)
- Border Gateway Protocol (BGP)
- BGPsec validation
- Internet Control Message Protocol (ICMP)
- Domain Name System (DNS)
- TLS/SSL (for BGPsec)
- TCP-AO (Authentication Option)
- MD5 (for TCP-AO)
- Resource Public Key Infrastructure (RPKI)
- Patches of mycelium (@Home and @Org)
- The Grimoire
- Fungal forays: THM’s mycelial maze
- Rhizomatic ranges: Root-me’s network underworld
- Blight-Weaver's Spore-Songs @GitHub

Last update:
2025-05-12 14:16