INITIALIZING AEGIS PROTOCOL...

// ENGINEERING DOCUMENTATION

System Architecture.

A breakdown of the long-range modulation, mesh topology, and security protocols powering the Aegis ecosystem.

1. The Physics: LoRa vs. Wi-Fi

How do we get 20km range without huge antennas?

The "Whisper" Technique

Standard radios scream loudly but have poor hearing. They need a line of sight and high power to maintain a connection.

Aegis uses LoRa (Long Range) modulation. Instead of shouting, it uses a chirp signal that sweeps across frequencies. This allows our receiver to decode signals that are below the noise floor.

FeatureStandard Wi-FiAegis (LoRa)
Range~100 meters15 - 20 km (Wilderness)
AutonomyHoursMonths (Battery)
EnvironmentIndoor / UrbanForests & Mountains
BandwidthHigh (Video/Voice)Low (Text/GPS Only)

2. The Topology: Distributed Mesh

Why the network survives when half the devices are destroyed.

Visualizing how signals traverse a realistic landscape.

ā— Signal ā— Receiver ā— Failed Node

3. Security Architecture

We built Aegis to be secure against both physical and digital threats.

Physical Isolation (Air-Gapped)

You have to be there to hack it. Unlike the internet, an attacker must be physically within range of our radio signals to even attempt an intercept.

AES-256 Encryption

Every packet is encrypted using AES-256. Even if a hostile actor is in range and records the signal, they will see nothing but random noise.

Zero-Trust Keys

Encryption keys are pre-shared physically or generated locally. We do not hold a "master key."

// LIVE PROTOCOL DEMONSTRATION

Scroll down to visualize the Asymmetric and Hybrid encryption flow.

Sender ORIGIN
Compromised Node MAN-IN-MIDDLE
Target Recipient DESTINATION
USER A
USER B
USER C
SECRETS
PLAINTEXT
3.1 // PRIVATE MESSAGE

Asymmetric Lock

Sending to one person? We wrap the message using their Public Key. This creates a mathematical lock that only the recipient possesses the key for.

3.2 // INTERCEPTION FAIL

Compromised Node

A hostile actor has physically hijacked a node. They attempt to read the packet.

Since the stolen node lacks the Target's Private Key, the math rejects the attempt. The network automatically reroutes around the threat.

3.3 // VERIFIED DELIVERY

Access Granted

The packet reaches the Target. They apply their Private Key. The message is revealed.

3.4 // GROUP MODE

Hybrid Encryption

What if you need to broadcast to 50 people? Encrypting the full message 50 times would be slow and bloated.

Instead, Aegis uses a smarter approach: Hybrid Encryption.

3.5 // SESSION KEY GENERATION

The Single Master Key

First, the sender generates a random, one-time Session Key (AES-256).

This single key is used to encrypt the large message payload only once.

3.6 // CREATING HEADERS

One Payload, Many Locks

Next, we take that tiny Session Key and encrypt it separately for each recipient using their unique Public Keys.

These encrypted keys are attached as "headers" to the main packet.

3.7 // GROUP DECRYPTION

Universal Access

When the packet arrives, each user applies their Private Key to unlock only their specific header.

This reveals the Session Key, which then opens the main message. Secure, scalable, and efficient.

4. Technical Specifications

Aegis Public Node (V4)

MCUQuad-Core ARM Cortex-A53 @ 1GHz
Radio ModuleSX1262 LoRa Transceiver
Frequency915 MHz (US) / 868 MHz (EU) / 923 MHz (Asia)
Sensitivity-148 dBm (High Sensitivity)
Power Source80,000mAh LiFePO4 + 20W Solar Input
Operational Endurance6+ Months (Battery) / Years (Solar)

Efficiency & Limits

Tx Efficiency100+ Msgs/day with negligible drain.
Main Power DrawOLED Screen (Active only during user input)
IP RatingIP67 (Dust Tight, Immersion up to 1m)
EncryptionAES-256 GCM

NOTE ON PROPRIETARY TECH:

Detailed hardware configurations and firmware architectures are omitted from public documentation to protect intellectual property.

Engineering FAQ

Can the network be jammed? ā–¼

While no radio system is un-jammable, Aegis is highly resistant. We use CSS (Chirp Spread Spectrum), which spreads the signal across a wider bandwidth.

What happens during a nuclear winter / prolonged storm? ā–¼

The Public Node features an 80,000mAh LiFePO4 battery. The system defaults to a deep sleep mode, waking only to repeat messages.

Is this legal on civilian frequencies? ā–¼

Yes. Aegis operates on the ISM bands (Industrial, Scientific, and Medical). These are license-free bands. We strictly adhere to the duty cycle and transmission power limits set by the FCC, ETSI, and regional authorities, ensuring legal operation without requiring user licenses.

How does it differ from Starlink? ā–¼

Starlink requires a $500 dish, 100W of power, and a clear view of the sky. It connects to the internet.

Aegis connects people to people locally. It requires <1W of power, works in dense forests, costs $150, and creates its own offline network. We are the "last mile" solution where satellites cannot reach or are too expensive.