// ENGINEERING DOCUMENTATION
System Architecture.
A breakdown of the long-range modulation, mesh topology, and security protocols powering the Aegis ecosystem.
1. The Physics: LoRa vs. Wi-Fi
How do we get 20km range without huge antennas?
The "Whisper" Technique
Standard radios scream loudly but have poor hearing. They need a line of sight and high power to maintain a connection.
Aegis uses LoRa (Long Range) modulation. Instead of shouting, it uses a chirp signal that sweeps across frequencies. This allows our receiver to decode signals that are below the noise floor.
| Feature | Standard Wi-Fi | Aegis (LoRa) |
|---|---|---|
| Range | ~100 meters | 15 - 20 km (Wilderness) |
| Autonomy | Hours | Months (Battery) |
| Environment | Indoor / Urban | Forests & Mountains |
| Bandwidth | High (Video/Voice) | Low (Text/GPS Only) |
2. The Topology: Distributed Mesh
Why the network survives when half the devices are destroyed.
Visualizing how signals traverse a realistic landscape.
3. Security Architecture
We built Aegis to be secure against both physical and digital threats.
Physical Isolation (Air-Gapped)
You have to be there to hack it. Unlike the internet, an attacker must be physically within range of our radio signals to even attempt an intercept.
AES-256 Encryption
Every packet is encrypted using AES-256. Even if a hostile actor is in range and records the signal, they will see nothing but random noise.
Zero-Trust Keys
Encryption keys are pre-shared physically or generated locally. We do not hold a "master key."
// LIVE PROTOCOL DEMONSTRATION
Scroll down to visualize the Asymmetric and Hybrid encryption flow.
Asymmetric Lock
Sending to one person? We wrap the message using their Public Key. This creates a mathematical lock that only the recipient possesses the key for.
Compromised Node
A hostile actor has physically hijacked a node. They attempt to read the packet.
Since the stolen node lacks the Target's Private Key, the math rejects the attempt. The network automatically reroutes around the threat.
Access Granted
The packet reaches the Target. They apply their Private Key. The message is revealed.
Hybrid Encryption
What if you need to broadcast to 50 people? Encrypting the full message 50 times would be slow and bloated.
Instead, Aegis uses a smarter approach: Hybrid Encryption.
The Single Master Key
First, the sender generates a random, one-time Session Key (AES-256).
This single key is used to encrypt the large message payload only once.
One Payload, Many Locks
Next, we take that tiny Session Key and encrypt it separately for each recipient using their unique Public Keys.
These encrypted keys are attached as "headers" to the main packet.
Universal Access
When the packet arrives, each user applies their Private Key to unlock only their specific header.
This reveals the Session Key, which then opens the main message. Secure, scalable, and efficient.
4. Technical Specifications
Aegis Public Node (V4)
| MCU | Quad-Core ARM Cortex-A53 @ 1GHz |
| Radio Module | SX1262 LoRa Transceiver |
| Frequency | 915 MHz (US) / 868 MHz (EU) / 923 MHz (Asia) |
| Sensitivity | -148 dBm (High Sensitivity) |
| Power Source | 80,000mAh LiFePO4 + 20W Solar Input |
| Operational Endurance | 6+ Months (Battery) / Years (Solar) |
Efficiency & Limits
| Tx Efficiency | 100+ Msgs/day with negligible drain. |
| Main Power Draw | OLED Screen (Active only during user input) |
| IP Rating | IP67 (Dust Tight, Immersion up to 1m) |
| Encryption | AES-256 GCM |
NOTE ON PROPRIETARY TECH:
Detailed hardware configurations and firmware architectures are omitted from public documentation to protect intellectual property.
Engineering FAQ
While no radio system is un-jammable, Aegis is highly resistant. We use CSS (Chirp Spread Spectrum), which spreads the signal across a wider bandwidth.
The Public Node features an 80,000mAh LiFePO4 battery. The system defaults to a deep sleep mode, waking only to repeat messages.
Yes. Aegis operates on the ISM bands (Industrial, Scientific, and Medical). These are license-free bands. We strictly adhere to the duty cycle and transmission power limits set by the FCC, ETSI, and regional authorities, ensuring legal operation without requiring user licenses.
Starlink requires a $500 dish, 100W of power, and a clear view of the sky. It connects to the internet.
Aegis connects people to people locally. It requires <1W of power, works in dense forests, costs $150, and creates its own offline network. We are the "last mile" solution where satellites cannot reach or are too expensive.