Setting up PGP
Stefan Claas
sac at 300baud.de
Mon Oct 12 03:23:43 PDT 2020
Karl wrote:
[...]
> After finding a good candidate airgapped device, you'll want to be
> careful with how you use it. Remember, whenever a new vulnerability
> is found, trojans cover the world taking advantage of it, and then try
> to find a way to hide inside the corners of all the systems they find.
> So, any drive you put in your new device, anything you plug into it,
> any update you apply, could be filled with computer-measles that would
> find a way to trick it into giving remote control to them. Keep it
> isolated until you have things set up for use.
>
> The next step after getting a reasonable airgapped device, maybe a pi
> zero, and ideally keeping it isolated, would be to install gnupg on
> it. Maybe in a forthcoming email!
GnuPG should be already installed with Linux (Raspberian OS etc.). The
thing I would like ask you, how would you communicate securely with your
air-gapped device?
What I did in the past was to install on the online device and offline
device the free (cross-platform) software CoolTerm and I connected both
devices with an FTDI USB to USB cable, so that I could do serial communications
and was also able to see how many bytes (from a PGP message) was transfered.
Another approach I am currently playing with is to play with NFC tags and
a reader/writer device, which can be used offline as well.
Regards
Stefan
--
NaClbox: cc5c5f846c661343745772156a7751a5eb34d3e83d84b7d6884e507e105fd675
The computer helps us to solve problems, we did not have without him.
More information about the cypherpunks
mailing list