this post was submitted on 04 Jul 2024
3 points (80.0% liked)

Explorations in Networking and Computing

9 readers
1 users here now

A place for discussing the new developments in IT networking technologies that strive to enhance and assure privacy, security, and autonomy online, ensuring equitable and strong universal access to information.

You can share info about Confidential Computing software and hardware like Intel SGX enclaves, HSI, attestation, HEADS BIOS, and vendors like Nitrokey, Purism, Fairphone, Open Source Hardware, etc.

The Tor Project, Nym, mixmaster, Yggdrasil, Veilid, and other networking technologies can be discussed here. Questions could be answered by people versed in any of these networking projects.

Also, social media in such networking paradigms could be discussed and be of interest to the wider Mastodon community. You might think about how Amethyst with LND and LNC works, for example. Or have thoughts about developing a social media Veilid application. Facebook has an onion address. What about new networking technologies incorporated into the Fediverse?

founded 6 months ago
MODERATORS
 

Hardened Grub in Libreboot https://libreboot.org/docs/linux/grub_hardening.html

See Mate Kukri at upcoming Open Source Firmware Conference about TPM compromise.

https://libreboot.org/docs/install/spi.html Ready to get out your pi and external programmer? https://en.m.wikipedia.org/wiki/CryptoParty

you are viewing a single comment's thread
view the rest of the comments
[–] lightscription 1 points 2 months ago* (last edited 2 months ago)

RPi connects automatically (wpa supplicant) to SSID if you use their imager (not dd) but you need access to the router API to get the pi's IP (or nmap -sP ) and then a script automatically configures the ssh private-public key on first initialization which is default rsa but you can text box in a ssh-keygen ed25591 (521 bit 100+ rounds).

Beagle Bone or some other SBC may be preferable if you want to avoid wireless connections for sensitive firmware operations. Make sure your router is locked down tight because some asshole is supposed to hostile takeover your pi but there is no way for him to do so without an NSA because the ssh crypto curves are strong (no civilian breaks rsa 4096 let alone the newer quantum resistant ed25519).

~~No way to connect to rpi without peripherals because defaults need to be changed via terminal first for UART serial and WiFi ssh.~~ Editing bootfs and rootfs (unless you want to make time-consuming scripts) won't do it. This is probably by design since rpis ship with default Google DNS for telemetry and data mining. ~~Suggest changing resolv.conf~~ * so Google doesn't 8 all your pi before you get some.

*After ssh configuration, rpi uses DNS of router.