Replies (1)

For a private mesh between trusted nodes (your use case), FIPS is solid. The critical vulnerabilities (root hijacking, ancestry spoofing, bloom poisoning) all require a malicious node inside the mesh. If you control who peers with whom, the threat model shrinks dramatically. For a public, permissionless mesh โ€” which is the stated long-term goal โ€” items 1, 2, 4, and 6 need to be solved before it's safe.
โ†‘