Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/offlinedevice/offlinedevice
A device to create and manage encryption keys offline.
https://github.com/offlinedevice/offlinedevice
bitcoin bitcoin-wallet boltcard digitalidentity fido2 gpg passwordmanager yubikey-manager
Last synced: about 1 month ago
JSON representation
A device to create and manage encryption keys offline.
- Host: GitHub
- URL: https://github.com/offlinedevice/offlinedevice
- Owner: Offlinedevice
- License: gpl-2.0
- Created: 2024-06-28T15:09:58.000Z (5 months ago)
- Default Branch: main
- Last Pushed: 2024-09-19T10:18:07.000Z (about 2 months ago)
- Last Synced: 2024-09-29T03:42:18.597Z (about 2 months ago)
- Topics: bitcoin, bitcoin-wallet, boltcard, digitalidentity, fido2, gpg, passwordmanager, yubikey-manager
- Language: Python
- Homepage:
- Size: 7.24 MB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Offline device
Offline device is a hardware device that runs on a Raspberry OS (Linux based) operating system. It can be built with standard components found in the Internet and all the plastic parts can be printed on a 3D-printer.
The Graphical User Interface is written in Python 3 (GUIApp.py).
Read more in the [getting started paper](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/getstartedHelp.txt).
## Features
- [x] Create strong encryption keys offline
- [x] Manage your keys and do backups/export or add subkeys etc
- [x] Sign and validate keys and documents in a secure way
- [x] Fully open source (APGLv2)
- [x] Manage your Yubikey 5C, including loading subkeys
- [x] Secure archive of files that can be encrypted and backed-up
- [x] Encrypt and sign messages
- [x] Decrypt messages and check its signature
- [x] Backup and restore function including complete system cloning
- [x] Generate Bitcoin keys offline and store/access through graphical interface
- [x] Encrypted password storage
- [x] Encrypted bitcoin wallet storage (seed's words, LNURLs etc)
- [x] Generate and manage your own digital ID's
- [x] Generate your own Nostr Keys (NEW from GUIApp version 0.2.8!)
- [x] Transfer a Nostr private Key to a Nostr Signing Device (NEW from GUIApp version 0.2.8!)
- [x] Export IDs as image or as file (for upload to the "web-of-trust")
- [x] Validate others digital ID's (standard (RFC4880)
- [x] Store Bolt cards data for accessing load links (lighning Bitcoin), programming and resetting cards
- [x] Read and program Bolt cards with a connected Smart card reader
- [x] Customize your user settings with theme and colors
- [x] Include support for Real Time Clock (battery powered hardware clock)## Using the Offine device
Connect the Offline device with cables to a monitor, a keyboard and a mouse. It supports multiple account on the same device. Import or generate GPG keys without being connected to the Internet. During setup a backup USB- device is created. The Offline device facilitates complete privacy and unbreakable encryption for sensitive data and also provides a mechanism for securely send and receive data over the Internet. Others features include Bitcoin wallet generation/storage.
### Guides
* [Getting started guide](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/getstartedHelp.txt)
* [GPG guide](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/gpgHelp.txt)
* [Yubikey guide](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/yubikeyHelp.txt)
* [Secure archive guide](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/securearchiveHelp.txt)
* [Digital ID guide](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/digitalIDHelp.txt)
* [Bolt card guide](https://github.com/Offlinedevice/project/blob/291037e6e33de97521e22a7abb742123ab7c2843/help/boltcardHelp.txt)## Start here
### Build hardware
Build the Offline device using common parts. See "Getting started guide".### 3D- print parts
Print the plastic parts you need. See folder "3D".### Download and burn image
Download [the image](https://www.mediafire.com/file/hz4bb3kw2phr0v1/offline_device_0_2_8.img.gz/file) and burn it to a microSD-card (min 32 gb) with balenaEtcher (recommended) or Raspberry Pi Imager. Please note that it might be necessary to restart the device after initial power on for it to start.To run the Offline device with GUIApp version 0.2.8, and later, it's necessary to first burn the relevant/latest Image to the microSD-card (see above):
### Install the software yourself
You can choose to install the operating system, programs and libraries yourself. See details in the "Getting started"- document.## Digital IDs
Controlling your own digital ID is as important as controlling your own digital money. The Offline device gives an easy way to create IDs and encrypted files that can be uploaded to public keyservers around the word. Including picture ID/key.One for personal use:
And maybe one for epic gamer ID:
### Update GUI
Make sure you are running the latest graphical interface, GUIApp.py. Download the latest tar- file from the download section and select "settings -> Update software" on the Offline device.## Locales
Using a Raspberry Pi keyboard and mouse supports in getting the Locales (correct layout of keys etc.). Always set the correct time and date before staring to use the device. This is important for encryption key generation and date/time stamps.
## Release + Commit Verification
All releases and commits as of June 28, 2024 are signed by key `BEF873B4691EB2C24E399445FE86F26704C3F74A` ([email protected]).
### Past Keys
None.## Donations
If you'd like to help us with the cost of running the Offline device project you can send a payment to us via our BTC address bc1qyufesfamy2qvuc0twce3xsqh8nwrs48placp6f.Thank you.
## License
Distributed under the GNU Affero General Public License (AGPL v2). See [LICENSE file](LICENSE).