1.8 KiB
Decrypt Namespace Secret
Requirements
{{ #include ../../operator-requirements.md:requirements }}
-
High Visibility Storage: plastic container or bag that's used to keep items while not in use in a visible location like the middle of a desk.
Procedure
-
Enter the designated location with required personnel and equipment
-
Lock access to the location - there should be no inflow or outflow of people during the ceremony
-
Retrieve Air-Gapped Bundle and polaroid tamper evidence from locked storage
{{ #include ../../../../component-documents/tamper-evidence-methods.md:vsbwf-procedure-unsealing}}
-
Place all materials except for the laptop into High Visibility Storage
-
Retrieve AirgapOS SD card from High Visibility Storage and plug it into air-gapped laptop
-
Turn on the machine
-
Once booted, remove the AirgapOS SD card and place it into High Visibility Storage
-
Retrieve Ceremony SD Card from High Visibility Storage and plug it into the machine
-
Copy the Ceremony SD Card contents to machine
-
{{ #include ../../../../component-documents/finding-device-name.md:content }}
-
Copy the contents of the card to machine:
cp -r /media/<device_name>/* ~
-
-
Start
keyfork
using the relevant Shardfile:-
keyfork recover shard --daemon /media/<device_name>/path/to/shardfile.asc
-
Follow on screen prompts
-
-
Derive the OpenPGP root certificate:
keyfork derive openpgp > secret_key.asc
-
Decrypt the secret material:
sq decrypt --recipient-file secret_key.asc < encrypted.asc --output decrypted
-
Proceed to transfer the secret (
decrypted
) to desired location such as hardware wallet, power washed chromebook (via SD card) etc.