I hereby claim:
- I am valyakuttan on github.
- I am valyakuttan (https://keybase.io/valyakuttan) on keybase.
- I have a public key ASD8so6H4iN9XaQ5_KHQAjxtOxQEWRGHn12S-2TisyhX5wo
To claim this, I am signing this object:
I hereby claim:
To claim this, I am signing this object:
Here we create the master key. We want only Certify
capability: we use the master key only to create the subkeys, Sign - Encrypt - Authenticate
capabilities will be assigned to the subkeys.
Run the following command to start the master key generation process. Select the set your own capabilities
creation process (type 8
)
▶ gpg --full-generate-key --expert
gpg (GnuPG) 2.2.9; Copyright (C) 2018 Free Software Foundation, Inc.
$ sudo pacman -S iwd
Info:
Command:
$ sudo pacman -S terminus-font
This guide provides instructions for an Arch Linux installation featuring full-disk encryption via LVM on LUKS and an encrypted boot partition (GRUB) for UEFI systems.
Following the main installation are further instructions to harden against Evil Maid attacks via UEFI Secure Boot custom key enrollment and self-signed kernel and bootloader.
You will find most of this information pulled from the Arch Wiki and other resources linked thereof.
Note: The system was installed on an NVMe SSD, substitute /dev/nvme0nX
with /dev/sdX
or your device as needed.
$ sudo pacman -S tor
$ ## nyx provides a terminal status monitor for bandwidth usage, connection details and more.
$ sudo pacman -S nyx