Releases: globaleaks/globaleaks-usbarmory-image
USB armory Mk II - Globaleaks 4.0.16 image release 20200423 (beta)
This release contains an image for running GlobaLeaks 4.0.16 on the USB armory Mk II board.
The base image consists of a standard Linux distribution (Debian) prepared with the process outlined in the original repository https://github.com/f-secure-foundry/usbarmory-debian-base_image
Installation note
IMPORTANT: /dev/sdX, /dev/diskN must be replaced with your microSD device (not eventual microSD partitions), ensure that you are specifying the correct one. Errors in target specification will result in disk corruption.
NOTE: Remember to uncompress the downloaded image file before imaging.
sudo dd if=usbarmory-mark-two-globaleaks.raw of=/dev/sdX bs=1M conv=fsy
Connecting
After being boo ssh-keygen -f "/root/.ssh/known_hosts" -R "10.0.0.1"
ted, the image uses Ethernet over USB emulation (CDC Ethernet) to communicate with the host, with assigned IP address 10.0.0.1 (using 10.0.0.2 as gateway). Connection can be accomplished via SSH to 10.0.0.1, with default user usbarmory and password usbarmory. NOTE: There is a DHCP server running by default. Alternatively the host interface IP address can be statically set to 10.0.0.2/24.
GlobaLeaks will be reachable on port 10.0.0.1
Resizing
The default image is 4GB of size, to use the full microSD space a new partition can be added or the existing one can be resized as described here.
Release hash (sha256)
usbarmory-mark-two-globaleaks-4.0.16-20200423.raw.xz 90e36316ff545f3c37de88196cfd250d3ac4fee3ca1227e1754ec3c3c30a33e0
This release contains an image for running GlobaLeaks 4.0.16 on the USB armory Mk II board.
The base image consists of a standard Linux distribution (Debian) prepared with the process outlined in the original repository https://github.com/f-secure-foundry/usbarmory-debian-base_image
Installation note
IMPORTANT: /dev/sdX, /dev/diskN must be replaced with your microSD device (not eventual microSD partitions), ensure that you are specifying the correct one. Errors in target specification will result in disk corruption.
NOTE: Remember to uncompress the downloaded image file before imaging.
sudo dd if=usbarmory-mark-two-globaleaks.raw of=/dev/sdX bs=1M conv=fsy
Connecting
After being boo ssh-keygen -f "/root/.ssh/known_hosts" -R "10.0.0.1"
ted, the image uses Ethernet over USB emulation (CDC Ethernet) to communicate with the host, with assigned IP address 10.0.0.1 (using 10.0.0.2 as gateway). Connection can be accomplished via SSH to 10.0.0.1, with default user usbarmory and password usbarmory. NOTE: There is a DHCP server running by default. Alternatively the host interface IP address can be statically set to 10.0.0.2/24.
GlobaLeaks will be reachable on port 10.0.0.1
Resizing
The default image is 4GB of size, to use the full microSD space a new partition can be added or the existing one can be resized as described here.
Release hash (sha256)
usbarmory-mark-two-globaleaks-4.0.16-20200423.raw.xz 90e36316ff545f3c37de88196cfd250d3ac4fee3ca1227e1754ec3c3c30a33e0