Use cases
MESH is designed for forensic investigators, human rights defenders, and security researchers operating in challenging environments. Here are real-world scenarios where MESH provides critical capabilities.
Remote mobile forensics
Investigate Android and iOS devices remotely without physical access. Collect artifacts, run spyware scans, and perform live analysis over an encrypted mesh network.
Scenario
A human rights organisation needs to analyse the phone of an activist who suspects they've been targeted with spyware. The activist is in a different country and cannot safely mail their device.
How MESH helps
- Deploy endpoint client - Activist installs MESH app on their device
- Enable ADB - Activist enables ADB-over-Wifi on their device
- Establish secure connection - Device joins the mesh over encrypted tunnel
- Remote analysis - Investigator runs AndroidQF/MVT/WARD to detect spyware
- Collect evidence - Artifacts are securely transferred over the mesh
- Tear down - Mesh connection is terminated
Benefits
- No physical access required - Investigate devices anywhere in the world
- Secure data transfer - All forensic data is encrypted end-to-end
- Real-time analysis - Perform live forensics on running devices
- Minimal user interaction - Simple app installation, no technical expertise needed
- Low configuration
Network monitoring and packet capture
Deploy forensic capabilities to remote locations for network monitoring and evidence collection.
Scenario
An incident response team needs to monitor network traffic from a compromised device in a remote office to identify command-and-control (C2) communications.
How MESH helps
- Deploy endpoint client - Install MESH on the compromised device
- Enable exit node - Route device traffic through analyst node
- Capture traffic - Monitor and log all network connections
- Analyse patterns - Identify malicious C2 traffic
- Collect evidence - Preserve network forensics for investigation
Benefits
- Remote deployment - No need to travel to remote locations
- Real-time monitoring - Live visibility into device network activity
- Encrypted collection - Evidence is protected during transfer
- Rapid response - Deploy in minutes, not hours or days
Workflow
Human rights investigations
Securely analyse devices of activists, journalists, and human rights defenders in hostile environments where network traffic is monitored or censored.
Scenario
A journalist in an authoritarian country suspects their phone has been compromised. They need their device analysed but cannot risk exposing the investigation to state surveillance.
How MESH Helps
- Censorship resistance - AmneziaWG obfuscation bypasses DPI and VPN blocking
- Encrypted communication - All forensic data is protected from interception
- Secure analysis - Remote investigation without physical device transfer
- Evidence preservation - Forensic artifacts collected securely
- Operational security - No suspicious VPN traffic visible to censors
Benefits
- Bypasses censorship - Works in countries with aggressive internet filtering
- Protects investigators - Encrypted connections hide forensic activity
- Protects subjects - No need to physically transport devices across borders
- Maintains evidence integrity - Secure chain of custody
Operational security
When operating in hostile environments, follow proper OPSEC:
- Use AmneziaWG obfuscation or HTTPS DERP relays (see configuration guide)
- Deploy control plane in a safe jurisdiction with reverse proxy
- Use HTTPS relay fallback for maximum compatibility
- Consider using Tor or other anonymity networks for control plane access
Censored network operations
Operate forensic investigations in countries with aggressive internet censorship using AmneziaWG obfuscation and HTTPS fallback.
Scenario
A security researcher needs to investigate devices in China, Russia, or Iran where VPN protocols are actively blocked by state-level firewalls.c
How MESH Helps
- AmneziaWG obfuscation - Makes VPN traffic appear as regular HTTPS
- HTTPS relay fallback - Works when UDP is completely blocked
- DPI evasion - Bypasses Deep packet inspection systems
- Reliable connectivity - Maintains connection despite censorship attempts
Tested Against
- Great Firewall of China - Successfully bypasses DPI and protocol blocking
- Russian SORM - Evades traffic analysis and VPN detection
- Iranian filtering - Works through national firewall infrastructure
- Corporate DPI - Bypasses enterprise-grade packet inspection
Benefits
- Reliable access - Works where traditional VPNs fail
- Indistinguishable traffic - Appears as normal HTTPS web browsing
- Automatic adaptation - Falls back to relay when P2P is blocked
- Proven effectiveness - Tested in real-world censored environments
Configuration for censored networks
See the AmneziaWG Configuration guide for detailed setup instructions optimized for censored environments.
MESH provides in all cases
- Speed - Deploy in minutes, not hours
- No persistent infrastructure - Ephemeral mesh leaves no trace
- Secure evidence handling - Encrypted transfer maintains chain of custody
- Minimal disruption - No need to power down or transport devices
Incident Response Timeline
- T+0 min: Incident detected
- T+5 min: Control plane deployed
- T+10 min: Analyst client connected
- T+15 min: Endpoint client installed on compromised device
- T+20 min: Forensic collection begins
- T+60 min: Evidence collected, mesh torn down
Next: Check Platform support to see which platforms are supported →