Skip to content

Releases: globaleaks/globaleaks-usbarmory-image

USB armory Mk II - Globaleaks 4.0.16 image release 20200423 (beta)

23 Apr 15:27

Choose a tag to compare

This release contains an image for running GlobaLeaks 4.0.16 on the USB armory Mk II board.

The base image consists of a standard Linux distribution (Debian) prepared with the process outlined in the original repository https://github.com/f-secure-foundry/usbarmory-debian-base_image

Installation note

IMPORTANT: /dev/sdX, /dev/diskN must be replaced with your microSD device (not eventual microSD partitions), ensure that you are specifying the correct one. Errors in target specification will result in disk corruption.

NOTE: Remember to uncompress the downloaded image file before imaging.

sudo dd if=usbarmory-mark-two-globaleaks.raw of=/dev/sdX bs=1M conv=fsy

Connecting

After being boo ssh-keygen -f "/root/.ssh/known_hosts" -R "10.0.0.1"
ted, the image uses Ethernet over USB emulation (CDC Ethernet) to communicate with the host, with assigned IP address 10.0.0.1 (using 10.0.0.2 as gateway). Connection can be accomplished via SSH to 10.0.0.1, with default user usbarmory and password usbarmory. NOTE: There is a DHCP server running by default. Alternatively the host interface IP address can be statically set to 10.0.0.2/24.

GlobaLeaks will be reachable on port 10.0.0.1

Resizing

The default image is 4GB of size, to use the full microSD space a new partition can be added or the existing one can be resized as described here.

Release hash (sha256)

usbarmory-mark-two-globaleaks-4.0.16-20200423.raw.xz 90e36316ff545f3c37de88196cfd250d3ac4fee3ca1227e1754ec3c3c30a33e0

This release contains an image for running GlobaLeaks 4.0.16 on the USB armory Mk II board.

The base image consists of a standard Linux distribution (Debian) prepared with the process outlined in the original repository https://github.com/f-secure-foundry/usbarmory-debian-base_image

Installation note

IMPORTANT: /dev/sdX, /dev/diskN must be replaced with your microSD device (not eventual microSD partitions), ensure that you are specifying the correct one. Errors in target specification will result in disk corruption.

NOTE: Remember to uncompress the downloaded image file before imaging.

sudo dd if=usbarmory-mark-two-globaleaks.raw of=/dev/sdX bs=1M conv=fsy

Connecting

After being boo ssh-keygen -f "/root/.ssh/known_hosts" -R "10.0.0.1"
ted, the image uses Ethernet over USB emulation (CDC Ethernet) to communicate with the host, with assigned IP address 10.0.0.1 (using 10.0.0.2 as gateway). Connection can be accomplished via SSH to 10.0.0.1, with default user usbarmory and password usbarmory. NOTE: There is a DHCP server running by default. Alternatively the host interface IP address can be statically set to 10.0.0.2/24.

GlobaLeaks will be reachable on port 10.0.0.1

Resizing

The default image is 4GB of size, to use the full microSD space a new partition can be added or the existing one can be resized as described here.

Release hash (sha256)

usbarmory-mark-two-globaleaks-4.0.16-20200423.raw.xz 90e36316ff545f3c37de88196cfd250d3ac4fee3ca1227e1754ec3c3c30a33e0