Hi all
Just tested the best way of using offline part of Amory I can think of.
1. Download
Tails. This is Debian LiveCD/LiveUSB system. Why Tails? Because it is well-known system designed with max security in mind (to leave system and disks untouched in particular), has a lot of users and testers and supported by Tor project. These ones are enough for me to trust it.
2. Boot it in custom way: pass 'truecrypt' parameter to kernel and set up root password in welcome screen.
3. Go to online computer and download needed packages from Debian repositories or from
here, we need these:
python-twisted-conch_10.1.0-1_all.deb
python-twisted-runner_10.1.0-2_i386.deb
python-twisted-core_10.1.0-3_all.deb
python-twisted-web_10.1.0-1_all.deb
python-crypto_2.1.0-2+squeeze1_i386.deb
python-twisted-lore_10.1.0-1_all.deb
python-twisted-words_10.1.0-1_all.deb
python-openssl_0.10-1_i386.deb
python-twisted-mail_10.1.0-1_all.deb
python-twisted_10.1.0-3_all.deb
python-pyasn1_0.0.11a-1_all.deb
python-twisted-names_10.1.0-1_all.deb
python-twisted-bin_10.1.0-3_i386.deb
python-twisted-news_10.1.0-1_all.deb
Don`t forget to check hashes and signatures!
Also download latest Armory .deb file from
Armory website.
4. Make Truecrypt container in USB drive, put all debs to folder, say, 'armory' in this tc-container.
5. Plug in USB drive to computer booted with Tails as said above. Mount tc-container, run
dpkg -i /media/truecrypt1/armory/*.deb
6. We got an secure offline environment: if it is unencrypted, it disappears when you shutdown computer. Total geek
Did I miss something? Maybe we should ask etotheipi to include offline bundle for Tails as it is already made for Ubuntu?
Added comments from my trials:
Step 3: I tried downloading the newer v12 packages, but they were not compatible with the version of python in Tails 0.17.2, so I went back to the v10 packages that you suggested.
Also, the Terminal informed me that armory_0.88.1-beta_i386.deb also required
python-psutil_0.1.3-1_all.debHere are the links to all of the files needed:
http://packages.debian.org/stable/python/python-cryptohttp://packages.debian.org/stable/python/python-opensslhttp://packages.debian.org/stable/python/python-psutilhttp://packages.debian.org/stable/python/python-pyasn1http://packages.debian.org/stable/python/python-twistedhttp://packages.debian.org/stable/python/python-twisted-binhttp://packages.debian.org/stable/python/python-twisted-conchhttp://packages.debian.org/stable/python/python-twisted-corehttp://packages.debian.org/stable/python/python-twisted-lorehttp://packages.debian.org/stable/python/python-twisted-mailhttp://packages.debian.org/stable/python/python-twisted-nameshttp://packages.debian.org/stable/python/python-twisted-newshttp://packages.debian.org/stable/python/python-twisted-runnerhttp://packages.debian.org/stable/python/python-twisted-webhttp://packages.debian.org/stable/python/python-twisted-wordsThe first step after opening one of those links is to click on the "squeeze" link at the top-right section of the page. That is a codeword for "the second-most recent stable release version". Wheezy is code for "the most recent stable release version". "Jessie", "sid", and "experimental" are all for non-stable releases.
The second step in those links is to scroll all the way to the bottom and select the proper architecture. If the only selection is "all", then you choose "all". If there are multiple architectures listed, then for 99% of use cases, only two matter:
i386 = 32-bit systems (regardless of CPU manufacturer)
amd64 = 64-bit systems (regardless of CPU manufacturer)
This selection should match your Armory file, which is either
armory_0.88.1-beta_amd64.deb or
armory_0.88.1-beta_i386.deb. Keep in mind that 32-bit programs still run just fine on 64-bit CPUs, so if you're having any problems with 64-bit builds, you can move to 32-bit builds. I have an Intel Core 2 Duo and since I only need 1 program to work correctly on it (Armory off-line), I didn't care about 32 vs 64, so I went the conservative route and chose Armory_i386 along with i386 Debian packages.
On this final page, choose a mirror to download the file from. If you want to verify the checksums, they are at the very bottom of this page.
Here is a tutorial on an easy way to verify checksums in Mozilla Firefox.
Step 5: Be sure to enter this in "Root Terminal", not regular "Terminal", as "Root Terminal" gives the needed root access to initiate this command. Not difficult to figure out, but good info for a newbie.
--------------------------------------------------------------------------------
Thank you very much for sharing this, N.Z. I've been spending days learning how to use Bitcoin, Linux, Armory, TrueCrypt, LiveCD creation, working out a dedicated offline PC purchase, and sorting through various methods of combining those variables into a workable solution. Your proposal best satisfies my security/ease-of-use balance.
EDIT: I drafted all of this into
a single hyperlinked word document for first-time readers.