fix: comments from issue 57
This commit is contained in:
parent
02e3efb7d5
commit
d9991e27ad
|
@ -11,7 +11,7 @@
|
|||
$ cp -r /media/vaults ~/vaults/
|
||||
$ cd ~/vaults
|
||||
$ git add .
|
||||
$ git commit -m -S "<message>"
|
||||
$ git commit -S -m "<message>"
|
||||
$ git push origin HEAD
|
||||
```
|
||||
// ANCHOR_END: content
|
||||
|
|
|
@ -12,8 +12,8 @@
|
|||
$ git config --global user.name <name>
|
||||
$ git config --global user.email <email>
|
||||
$ git config --global user.signingKey <pgp_key_id>
|
||||
$ git config --global commit.gpgsign = true
|
||||
$ git config --global commit.merge = true
|
||||
$ git config --global commit.gpgsign true
|
||||
$ git config --global commit.merge true
|
||||
```
|
||||
|
||||
1. Configure ssh to authenticate with smartcard
|
||||
|
|
|
@ -5,9 +5,9 @@
|
|||
|
||||
* Import OpenPGP keys:
|
||||
|
||||
* `gpg --import /media/<device_name>/vaults/keys/all/*.asc`
|
||||
* `gpg --import /media/vaults/keys/all/*.asc`
|
||||
|
||||
* `gpg --detach-sign $account_id.txt`
|
||||
* `gpg --detach-sign $account_id.json`
|
||||
|
||||
1. You may repeat the previous steps, starting at the step where the `account_id` is set.
|
||||
|
||||
|
@ -19,4 +19,4 @@
|
|||
|
||||
1. Unplug the Ceremony SD card and place it into High Visibility Storage
|
||||
// ANCHOR_END: content
|
||||
/* ANCHOR_END: all */
|
||||
/* ANCHOR_END: all */
|
||||
|
|
|
@ -6,7 +6,7 @@
|
|||
|
||||
* Tamper proofing evidence (photographs)
|
||||
|
||||
* [SD Card Pack(s)](../procurer/procure-sd-card-pack.md)
|
||||
* [SD Card Pack(s)](../procurer/procure-sd-card-pack.md)
|
||||
|
||||
* High Visibility Storage
|
||||
|
||||
|
@ -18,7 +18,7 @@
|
|||
|
||||
1. Turn on one of the computers - this one will be used for writing the SD cards
|
||||
|
||||
1. Build the software according to the [readme](https://git.distrust.co/public/airgap) in the repository.
|
||||
1. Build the software according to the [readme](https://git.distrust.co/public/airgap) in the repository.
|
||||
|
||||
1. Use the `make reproduce` command
|
||||
|
||||
|
@ -36,9 +36,9 @@
|
|||
|
||||
1. Flash `airgap.iso` to an SD Card:
|
||||
|
||||
* `dd if=out/airgap.iso of=/dev/<device_name> bs=4M status=progress conv=fsync`
|
||||
* `dd if=out/airgap.iso of=/dev/<device_name> bs=4M conv=fsync`
|
||||
|
||||
1. Reset the computer, and boot the SD card
|
||||
1. Reset the computer, and boot the SD card
|
||||
|
||||
1. Once booted, the card needs to be locked using `sdtool` which is available in `AirgapOS`:
|
||||
|
||||
|
@ -56,6 +56,6 @@
|
|||
|
||||
1. Verify the card can't be written to:
|
||||
|
||||
* `echo "42" | dd of=/dev/<device_name>`
|
||||
* `echo "42" | dd of=/dev/<device_name>`
|
||||
|
||||
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
||||
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-sealing }}
|
||||
|
|
Loading…
Reference in New Issue