Overview
Learn about MESH - what it is, how it works, and why it's the right tool for secure remote mobile forensic investigations.
What you'll learn
This section provides a comprehensive overview of MESH, covering:
- Core features and capabilities
- Architecture and system components
- Real-world use cases and scenarios
- Platform support and compatibility
- About the project and the team behind it
Quick Navigation
-
Features
Explore MESH's powerful capabilities including end-to-end encryption, censorship resistance, mobile forensics, and rapid deployment.
-
Architecture
Understand how MESH works with its three main components: Control plane, Analyst client, and Endpoint client.
-
Use cases
Discover real-world scenarios where MESH provides critical capabilities for forensic investigations.
-
Platform support
Check which platforms are currently supported and what's planned for future releases.
-
About
Learn about BARGHEST, the team behind MESH, licensing, and how to get help.
Why MESH?
MESH is designed specifically for digital forensics and mobile device analysis in challenging environments:
Problem
- Spyware targeting - Activists and journalists face sophisticated surveillance
- Censorship - Activists face restricted internet enviornments, that often block UDP protocols.
- Remote access - Physical device access is often impossible or impractical
- Scale - Hub-and-spoke topologies create high friction for high response enviornments.
Solution
- Self-hosted - Full control over your infrastructure
- Censorship-resistant - AmneziaWG obfuscation bypasses DPI
- Secure - End-to-end encrypted with WireGuard
- CGNAT Assignment - Making devices reachable from anywhere in the mesh (for ADB-over-Wifi or Libimobile usages)
- Rapid - Deploy in minutes, tear down instantly
Getting started
Ready to deploy MESH? Head to the Getting started Guide for step-by-step setup instructions.
Already familiar with MESH? Jump to:
- Installation - Detailed component installation
- User guide - Forensic workflows and usage
- Advanced - Advanced configuration topics
- Reference - CLI reference and troubleshooting
Next: Explore Features to see what MESH can do →