DUPLICATE KEY DETECTION โ CLONED IDENTITY GROUPS
0
Nodes sharing an identical public key โ a definitive indicator of device cloning, firmware key reuse, or mesh misconfiguration. Each group represents nodes that are cryptographically indistinguishable. Hardware and MAC divergence within a group indicates physical cloning. Scans run every 24 hours automatically.
Scanning...
THREAT DETECTION: ACTIVE CONFLICTS0
Nodes actively broadcasting a key that conflicts with their baselined identity. The RF Anomaly Engine evaluates the incoming signal against the mathematical average to flag physical cloning attempts.