mirror of
https://github.com/sunknudsen/privacy-guides.git
synced 2025-02-23 17:43:56 +00:00
Fixed SHA512 hash bug
This commit is contained in:
parent
919b1abc76
commit
af923001be
@ -194,31 +194,41 @@ sudo sed -i -e 's/vfat\s*defaults\s/vfat defaults,ro/' /etc/fstab
|
|||||||
sudo sed -i -e 's/ext4\s*defaults,noatime\s/ext4 defaults,noatime,ro,noload/' /etc/fstab
|
sudo sed -i -e 's/ext4\s*defaults,noatime\s/ext4 defaults,noatime,ro,noload/' /etc/fstab
|
||||||
```
|
```
|
||||||
|
|
||||||
#### Disable `/boot` macOS `fseventsd` logging and Spotlight indexing
|
### Step 11: delete macOS hidden files (if present)
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
sudo touch /boot/.metadata_never_index
|
sudo rm -fr /boot/.fseventsd /boot/.DS_Store /boot/.Spotlight-V100
|
||||||
sudo mkdir -p /boot/.fseventsd
|
|
||||||
sudo touch /boot/.fseventsd/no_log
|
|
||||||
```
|
```
|
||||||
|
|
||||||
### Step 11: disable Wi-Fi (if not using ethernet) or disconnect ethernet cable
|
### Step 12: disable Wi-Fi (if not using ethernet) or disconnect ethernet cable
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
echo "dtoverlay=disable-wifi" | sudo tee -a /boot/config.txt
|
echo "dtoverlay=disable-wifi" | sudo tee -a /boot/config.txt
|
||||||
```
|
```
|
||||||
|
|
||||||
### Step 12: reboot
|
### Step 13: reboot
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
sudo systemctl reboot
|
sudo systemctl poweroff
|
||||||
```
|
```
|
||||||
|
|
||||||
> WARNING: DO NOT CONNECT RASPBERRY PI TO NETWORK EVER AGAIN WITHOUT REINSTALLING RASPBERRY PI OS FIRST (DEVICE IS NOW "READ-ONLY" AND “COLD”).
|
> WARNING: DO NOT CONNECT RASPBERRY PI TO NETWORK EVER AGAIN WITHOUT REINSTALLING RASPBERRY PI OS FIRST (DEVICE IS NOW "READ-ONLY" AND “COLD”).
|
||||||
|
|
||||||
### Step 13 (optional): compute SHA512 hash of SD card and store in password manager (on macOS)
|
### Step 14 (optional): disable auto-mount of `boot` volume (on macOS)
|
||||||
|
|
||||||
Run `diskutil list` to find disk ID of SD card with “Raspberry Pi OS Lite” installed (`disk2` in the following example).
|
> Heads-up: done to prevent macOS from writing [hidden files](#step-11-delete-macos-hidden-files-if-present) to `boot` volume which would invalidate stored SHA512 hash of micro SD card.
|
||||||
|
|
||||||
|
Insert micro SD card into macOS computer, run following and eject card.
|
||||||
|
|
||||||
|
```shell
|
||||||
|
volume_path="/Volumes/boot"
|
||||||
|
volume_uuid=`diskutil info "$volume_path" | awk '/Volume UUID:/ { print $3 }'`
|
||||||
|
echo "UUID=$volume_uuid none msdos rw,noauto" | sudo tee -a /etc/fstab
|
||||||
|
```
|
||||||
|
|
||||||
|
### Step 15 (optional): compute SHA512 hash of micro SD card and store in password manager (on macOS)
|
||||||
|
|
||||||
|
Run `diskutil list` to find disk ID of micro SD card with “Raspberry Pi OS Lite” installed (`disk2` in the following example).
|
||||||
|
|
||||||
```console
|
```console
|
||||||
$ diskutil list
|
$ diskutil list
|
||||||
@ -248,7 +258,7 @@ $ sudo diskutil unmountDisk /dev/diskn (if previous step fails)
|
|||||||
Unmount of all volumes on disk2 was successful
|
Unmount of all volumes on disk2 was successful
|
||||||
|
|
||||||
$ sudo openssl dgst -sha512 /dev/rdisk2
|
$ sudo openssl dgst -sha512 /dev/rdisk2
|
||||||
SHA512(/dev/rdisk3)= 353af7e9bd78d7d98875f0e2a58da3d7cdfc494f2ab5474b2ab4a8fd212ac6a37c996d54f6c650838adb61e4b30801bcf1150081f6dbb51998cf33a74fa7f0fe
|
SHA512(/dev/rdisk2)= 353af7e9bd78d7d98875f0e2a58da3d7cdfc494f2ab5474b2ab4a8fd212ac6a37c996d54f6c650838adb61e4b30801bcf1150081f6dbb51998cf33a74fa7f0fe
|
||||||
```
|
```
|
||||||
|
|
||||||
👍
|
👍
|
||||||
|
Loading…
x
Reference in New Issue
Block a user