Unfortunately this article requires paying money to read if you are not a subscriber. I don't think there's anything wrong with me writing my own--original--free ending to the free preview:<p>Those links mean that instead of communicating through Internet pipes run by ISPs, that communication is completely free. Further, any peer can connect with any other peer. So as peers join up, the network grows. Eventually if one peer in this cluster also has an Internet connection, then the network also does. Obviously bandwidth constraints limit infinitely sharing one ISP account with an arbitrary number of people. However, if that peer has purchased space within a data center, a cloud-hosted machine, then Internet access is realistic for those currently without access. In effect it not only allows nodes to connect, it allows any node to provide Internet.<p>So, the ultimate aim is not to replace the Internet. And it's not to piggy back on the Internet. It's simply to let computers communicate freely.<p>And part of free communication, in every sense of the word, is that communication must be encrypted. One node must be free to communicate directly to another without others listening. The idea of free speech is not merely to allow freely speaking to the public or a group, it's to allow individuals to communicate amongst only each other, while at the same time not restricting them from communication to a wider audience should they choose.<p>The way this security is implemented is through IPv6. Each IP is associated with a public key and shared secret. It would be feasible to incorporate a negotiated secret. But as part of the initial phase, the idea is to test the core of the project: cjdns (on Github as <a href="https://github.com/cjdelisle/cjdns/" rel="nofollow">https://github.com/cjdelisle/cjdns/</a>). This "invite" system, in effect, controls the spread of meshnet and limits the possibility for abuse of the network, since each member of a meshnet must share a secret to bring a new node in.<p>Plans are underway for rapid expansion of the meshnet. But careless growth is not possible, due to the current nature as a circle of trust, and importantly, the ability to de-peer malicious users.<p>This basic model of adding peers and sharing secrets is now being automated. And I'd tell you their specific plans, but that's a secret. Pass it on.