Skip to content

wanxewoj/armbian-userpatches

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

What is zHIVErbox?

zHIVErbox - pronounced like 'cypher box' (sī′fər bŏks) - is an unfairly secure and unfairly cheap base system for the era of distributed networks (meshnets).
Minds joining those networks form a HIVE (swarm) of self-sovereign individuals who DON'T TRUST, BUT VERIFY.

zHIVErbox is based on Armbian, a Debian-based distribution for single-board ARM development boards.

Why zHIVErbox?

Unfortunatly, security cannot be provided as a simple 'download'. A secure system requires individual encryption and a secure source of randomness (entropy). Therefore a secure system can only be created by a self-sovereign individual themself - and only for themself. However, not everybody in a HIVE (society) can aquire the highly specialized knowledge and skills to create their own secure system from scratch.

Therefore Cypherpunks write software and provide technology that can be used by other individuals to achieve the same level of security, privacy and self sovereignty. Those tools should be as user friendly as possible without compromising on security. Ideally, those tools still provide a certain level of education, to retain their users from developing a 'blindly trusting attitude'.
DON'T TRUST! VERIFY!

zHIVERbox Features

While Armbian is perfect for development purposes, zHIVErbox customizations try to turn Armbian into a Security Fortress for production purposes. The goal is to reduce typical and possible attack vectors to a minimum.

High-level differences with Vanilla Armbian:

  • LUKS encrypted root partition with Btrfs filesystem / subvolumes (flat layout)
  • btrfs-snap tool for easy cron-based btrfs snapshots
  • Security-hardened Linux kernel
  • Firewall (ferm)
  • Enforces all Internet traffic (incl. DNS) over Tor
  • Filter (proxy) for fine-graned access to Tor control port (onion grater)
  • Tor-based time syncing instead of NTP (tordate and htpdate)
  • Ships with Cjdns (OSI-Layer-3 meshnet routing software) by default
  • Ships with KadNode (DHT based, decentalized DNS alternative) by default
  • Ships with IPFS (InterPlanetary File System) by default

For details please see the Security Design (SECURITY.md).

Which hardware does zHIVErbox support?

As many meshnet applications (IPFS, Bitcoin, ...) require a significant amount of storage, there's only one cheap and consumer-friendly single-board computer available right now - that allows to attach a hard disk in a solid/reliable way: The Odroid HC1/HC2 Therefore zHIVErbox is currently only designed for and tested on the Odroid HC1/HC2 (and therefore implicitly their parent also, the Odroid XU4).
But the zHIVErbox distribution would love to support more hardware in the future if it becomes available.

How to build a zHIVErbox image?

Please follow the build instructions (BUILD.md)

How to install/flash a zHIVErbox image?

The build process only creates a source image which allows for distribution to users, but needs to be customized and re-encrypted by every self-souvereign individual before installation on their own hardware. zHIVErbox provides an Installer (currently an Ubuntu shell script) which helps the user with the required customizations. Please see the installation instructions (INSTALL.md)

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 94.6%
  • Perl 5.4%