Bitcoin Forum
April 26, 2024, 06:21:03 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: Tutorial: Compiling Armory and getting it onto an offline computer  (Read 2236 times)
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
August 24, 2015, 01:08:04 PM
 #21

I use a webcam in my Raspberry setup to send transactions to the online computer. For your offline linux machine, I'd recommend qtQR, easy to use and powerful. I've tried the audio interface previously with another Bitcoin client, but I failed to set it up and eventually gave up on the idea.

I like the idea of that sort of thing, but I wonder how it could be perceived by others.

All types of visitors to your household (friends and ostensible friends alike) could interpret the sophisticated physical setup to mean "Is it possible he/she might have large stacks of BTC?". Keeping the hardware somewhere secure (and hence out of sight) is probably not so OTT a measure also, but it's not going to be possible to keep it thoroughly secret.

And I suppose the absolute worst case scenario is that you don't actually have that many bitcoins anyway, say holding onto 100,000 uBTC on the off chance that worldwide adoption takes off. Getting targeted then could be a little hairy, depending on how "worst case" your luck is.

Not wishing this on anyone! But I thought I'd throw it out there, perhaps there's a better way to keep the hardware unseen/unrecognised. Could your setup convincingly be construed as a pair of video calling devices in the same house? Without internet connections?

Vires in numeris
If you see garbage posts (off-topic, trolling, spam, no point, etc.), use the "report to moderator" links. All reports are investigated, though you will rarely be contacted about your reports.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714155663
Hero Member
*
Offline Offline

Posts: 1714155663

View Profile Personal Message (Offline)

Ignore
1714155663
Reply with quote  #2

1714155663
Report to moderator
pf (OP)
Full Member
***
Offline Offline

Activity: 176
Merit: 105


View Profile
August 24, 2015, 04:19:34 PM
 #22

Here's a suggestion to the OP: drop the SD's and the USB's on your offline system and use a webcam (easy way) or the audio interface (hard way). I use a webcam in my Raspberry setup to send transactions to the online computer. For your offline linux machine, I'd recommend qtQR, easy to use and powerful. I've tried the audio interface previously with another Bitcoin client, but I failed to set it up and eventually gave up on the idea.
Well, somehow I have to boot from Ubuntu and install it on my low-end laptop. So far I've been using USB. It doesn't have a CD drive. I guess I could use my external USB CD drive, but then we're back on USB again.

And no, SD connecting through the USB only gives and illusion of safety.
But why? Doesn't the device itself have to support the hackery in the first place? An SD card is an SD card, not a USB key. Different device, even if it's connecting to a USB on the computer internally. The malware we've been talking about regarding USB keys, can malware of the same kind also be placed on an SD card?
goatpig
Moderator
Legendary
*
Offline Offline

Activity: 3668
Merit: 1345

Armory Developer


View Profile
August 24, 2015, 04:37:06 PM
 #23

Any USB device comes with a firmware and class negotiation, even a plain hub. These manufacturers don't come up with their own MCUs, they buy generic MCUs from large manufacturers like TI, Microchip and FTDI. They upload a USB firmware in the MCU's NVRAM and this the vulnerability root kits target to survive a power cycle.

unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1005


View Profile
August 25, 2015, 02:50:28 PM
 #24

I use a webcam in my Raspberry setup to send transactions to the online computer. For your offline linux machine, I'd recommend qtQR, easy to use and powerful. I've tried the audio interface previously with another Bitcoin client, but I failed to set it up and eventually gave up on the idea.

I like the idea of that sort of thing, but I wonder how it could be perceived by others.

All types of visitors to your household (friends and ostensible friends alike) could interpret the sophisticated physical setup to mean "Is it possible he/she might have large stacks of BTC?". Keeping the hardware somewhere secure (and hence out of sight) is probably not so OTT a measure also, but it's not going to be possible to keep it thoroughly secret.

And I suppose the absolute worst case scenario is that you don't actually have that many bitcoins anyway, say holding onto 100,000 uBTC on the off chance that worldwide adoption takes off. Getting targeted then could be a little hairy, depending on how "worst case" your luck is.

Not wishing this on anyone! But I thought I'd throw it out there, perhaps there's a better way to keep the hardware unseen/unrecognised. Could your setup convincingly be construed as a pair of video calling devices in the same house? Without internet connections?

It can be perceived by others if you're using the system in front of others, which I don't. And the awareness of Bitcoin is really low here, if someone, somehow intercepted all the physical parts needed to run my system they probably wouldn't know how to use it, and if they did, they would need my password to do so (system + Armory password)

And things are indeed hidden out of sight for visitors and the people I live with, but there are ways to hide things "in plain sight" by making them look irrelevant/not the sort of thing that can hold cash Cheesy As I said, the system is a Raspberry. As an example, I have the machine in one place and the SD card in another.

One also has to consider methods to make sure others can retrieve the funds in case something happens to you, but that's a story for another topic.

I don't think it's relevant to have a video calling device system without internet connection... I mean, I only use the storage for a few minutes, when I really need to retrieve funds. I usually have enough online for urgent needs. It's not really cumbersome to setup the system when you need to use it and keep it hidden meanwhile, all in name of privacy. The system has far more funds coming in than out.

For the amount of coins usually on my storage, I think the physical and virtual security measures I have in practice are good enough, and as I've said, they're a good compromise between security and safety. One thing is for sure, it's not the best system. But it's one I'm happy with.


Here's a suggestion to the OP: drop the SD's and the USB's on your offline system and use a webcam (easy way) or the audio interface (hard way). I use a webcam in my Raspberry setup to send transactions to the online computer. For your offline linux machine, I'd recommend qtQR, easy to use and powerful. I've tried the audio interface previously with another Bitcoin client, but I failed to set it up and eventually gave up on the idea.
Well, somehow I have to boot from Ubuntu and install it on my low-end laptop. So far I've been using USB. It doesn't have a CD drive. I guess I could use my external USB CD drive, but then we're back on USB again.

And no, SD connecting through the USB only gives and illusion of safety.
But why? Doesn't the device itself have to support the hackery in the first place? An SD card is an SD card, not a USB key. Different device, even if it's connecting to a USB on the computer internally. The malware we've been talking about regarding USB keys, can malware of the same kind also be placed on an SD card?

Any USB device comes with a firmware and class negotiation, even a plain hub. These manufacturers don't come up with their own MCUs, they buy generic MCUs from large manufacturers like TI, Microchip and FTDI. They upload a USB firmware in the MCU's NVRAM and this the vulnerability root kits target to survive a power cycle.

There you go, pf Smiley The SD card cannot contain the malware. But you've got to make sure that, as an example, your laptop's SD card reader isn't just a simple USB reader to be safe with SD's
pf (OP)
Full Member
***
Offline Offline

Activity: 176
Merit: 105


View Profile
August 25, 2015, 04:31:53 PM
 #25

Interesting.

A few follow-up questions:

  • Once I have connected a read/write device to my USB or SD (assuming the SD goes through USB), must I from now on assume that my offline laptop is permanently compromised, or will I be fine just reinstalling Ubuntu on it through a readonly DVD, recreating my Armory wallet with a new passphrase, and making sure that no USB/SD ever connects to the computer again?
  • Since my offline laptop doesn't have a built-in DVD drive: am I safe connecting an external DVD drive through USB if I make sure to only put into it readonly DVDs? (To install Ubuntu.)

Once I'm all set there, I wonder what I'm going to use to get the unsigned transactions onto the laptop, and the signed transactions back to the online computer. People have been talking about images and audio and whatnot. This is getting a bit heavy (although I'm all for trying it!), so one final question:

What is the probability that a brand-new Kingston or Cruzer Blade USB key will mess with my bitcoins?!!!! Smiley Sometimes I wonder whether I'm going crazy.
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1000


https://gliph.me/hUF


View Profile
September 17, 2015, 05:36:59 PM
 #26

[...] I've tried the audio interface previously with another Bitcoin client, but I failed to set it up and eventually gave up on the idea.

Sorry, for the bump.

Which issues did you face in your setup? I still use successfully: https://bitcointalk.org/index.php?topic=735111.0


[...] All types of visitors to your household (friends and ostensible friends alike) could interpret the sophisticated physical setup to mean "Is it possible he/she might have large stacks of BTC?". Keeping the hardware somewhere secure (and hence out of sight) is probably not so OTT a measure also, but it's not going to be possible to keep it thoroughly secret. [...]

How do you handle your gold bars?

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
unamis76
Legendary
*
Offline Offline

Activity: 1512
Merit: 1005


View Profile
September 17, 2015, 09:45:20 PM
 #27

[...] I've tried the audio interface previously with another Bitcoin client, but I failed to set it up and eventually gave up on the idea.

Sorry, for the bump.

Which issues did you face in your setup? I still use successfully: https://bitcointalk.org/index.php?topic=735111.0

I managed to get the software installed but after that I simply could not execute it. I was using amodem with its Electrum plugin. Couldn't get Electrum to detect it either. Tried it in Ubuntu and Raspbian...

Never saw your tutorial around here, thanks for linking it! I'll see if someday I give it a try... Do you think it would work on Raspbian + Raspberry Pi B?
Newar
Legendary
*
Offline Offline

Activity: 1358
Merit: 1000


https://gliph.me/hUF


View Profile
September 19, 2015, 11:11:33 AM
 #28

[...] Do you think it would work on Raspbian + Raspberry Pi B?

I have not used it on a Pi myself, but according to this tutorial you can build yourself the latest version of minimodem and the author claims it all works as expected:

http://www.helptouser.com/raspberrypi/14954-installing-software-with-dependencies.html

OTC rating | GPG keyid 1DC91318EE785FDE | Gliph: lightning bicycle tree music | Mycelium, a swift & secure Bitcoin client for Android | LocalBitcoins
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!