Mycoria is an open and secure overlay network that connects all participants
Project scope & goals
- Described as an open, secure layer‑3 mesh overlay focused on interconnecting participants, not on generic “browse the whole Internet anonymously” use.
- Emphasis on resilience (working even when the public Internet is degraded) and simplicity of setup; currently an MVP proven at small scale.
Primary use cases
- Accessing home servers or NAS from anywhere without public IPs.
- Replacing or simplifying traditional corporate VPNs for remote teams.
- Building semi-private/darknet-style services with eventual stronger privacy.
- Not aimed at consumer “watch Netflix from another country” use; that still needs classic VPN/Tor or potential future exit nodes.
Comparison to VPNs, Tailscale, WireGuard, ZeroTier, etc.
- Functionally similar to a VPN in the textbook sense (virtual private network), but:
- Global mesh rather than separate per-organization LANs.
- Automatic routing and peer discovery instead of static peer lists (e.g., WireGuard alone).
- Compared to Tailscale/ZeroTier:
- Similar “global tailnet” feel, but Mycoria is a cooperative mesh with no central policy server.
- Can be used as a drop‑in for some use cases, but still early.
- Different from consumer VPN services, which are essentially secure proxies.
Relationship to Yggdrasil, cjdns, Reticulum, etc.
- Inspired by Yggdrasil/cjdns hashed-key‑to‑IP idea and distance-based routing.
- Commenters see it as closer to Yggdrasil/Reticulum-style overlay than to simple tunneling tools or tinc.
- Some suggest contributing to existing projects; author positions Mycoria as a separate, fun, experimental effort.
Security model & privacy
- “Secure by default”: built‑in firewall denies all inbound access unless services and “friends” are explicitly configured.
- Multicast disabled; no automatic broad exposure of services.
- Everything is authenticated via cryptographic IDs, which improves spoofing resistance but implies limited anonymity.
- No onion routing; less privacy than Tor, more focus on scalability. Prior work (SPN) targeted strong privacy instead.
Routing, addressing & DNS
- Router IDs are IPv6 addresses derived from public-key fingerprints, sometimes brute‑forced to include geo‑prefixes (country/state).
- Geo‑marked prefixes help scalable routing; raises concerns about policy/geoblocking and location leakage. Planned “private” non‑geo, non‑routable addresses to mitigate this.
- Routing takes geographical buckets and latency into account; transport is custom (not raw WireGuard) to support source routing.
- DNS is local: each node maintains its own mapping. Access uses special URLs that bind names to specific Mycoria addresses on demand, reducing centralized DNS poisoning risk.
Adoption, incentives & legal/abuse concerns
- No built‑in economic incentive layer yet; currently a hobby/side project, with future reuse in other projects.
- Some worry about running infrastructure that may route illegal content (e.g., CP), similar to Tor‑style liability fears.
- Debate over the ethics of anonymity vs. abuse, and the likelihood of state/ISP pressure based on geo‑aware prefixes or traffic.