Make computers easier to use by making computers secure
Any set of instructions that can be given to a user can be turned into code and given to a machine. The Mesh is a repository in-the-cloud for configuration data. Mesh tools pull configurations from the cloud to configure devices with no user effort.
Automating security administration allows security without compromises and with much less risk of error. The Mesh management tools use strong end-to-end encryption internally to enable strong end-to-end encryption in applications they are used to manage.
The Mesh reference libraries are written in C# under the .Net/Mono runtime and run on all the major desktop platforms.
Ports of the reference libraries to the .NetCore 10 and C are planned. This will allow support for tablet and phone devices and make native integration with legacy applications easier.
The mesh makes it easy to secure the applications you use today. Including Outlook and Google Chrome.
Enables and maintains OpenPGP, S/MIME and STARTTLS security.
End-to-end encrypted management of passwords and bookmarks.
Secure authentication to remote machines and GIT code repositories.
The Mesh also provides a powerful platform for developing next generation applications designed with security from the ground up.
Two factor authentication that finally makes sense
Confidential document control using proxy re-encryption technology
Email, chat, video, voice, unified with security the default
Getting started with the Mesh is really easy. Alice can create her Mesh profile and secure all the network applications on her machine using the command line mesh manager with just a few keystrokes:
personal create firstname.lastname@example.org
Created new personal profile MA6E4-GYIM6-PTSJ4-QGR7W-OZQFE-H5VAC Profile registered to email@example.com
Created new profile RBTZC-YQOGC-FRSI2-TOTY7-WGN2K-Z3S4Q
password add ftp.example.com alice badpassword
There is also a GUI based administration tool of course.
At the moment, the Mesh is at 'open alpha' testing stage. All the code and specifications are open. You can download the tools and install them. The only catch is that the protocols and data formats might change before beta testing begins.
Read the Getting Started guide for instructions on how to install the Mesh tools on your machines and use them to secure applications. Once you have got started, you can read the architecture guides to see what the various data objects created do.