


Sleep 30s before starting the process (give time to the rPi to detect the USB keys).Bump Raspbian => Support of every RaspberryPi versions up to 4.You can also find a detailed changelog of the P圜IRCLean library, and of CIRCLean/KittenGroomer itself. Also, a short description of all the conversion scripts is available in the same file. It is based on the mime type of the files, you can find more details in the README.md file of the git repository.

The sanitization is done by converting and copying the content of the untrusted key to the trusted one. Now you can copy the image to the SD card using dd: dd bs=1M if=_CIRCLean.img of=/dev/sdXĪs recommended by the RaspberryPi, use the Win32DiskImager utility to copy the file image to the SD card. The disk is most probably mounted and needs to be unmounted before the copy: umount /dev/sdX1 Then you can copy the image to the SD card using dd: sudo dd bs=1M if=_CIRCLean.img of=/dev/diskNįind the raw disk identifying your SD card (something like /dev/sdX1 where X is a character): df -h If the SD card is already formatted and mounted, you need to unmount it (replace N with the value found): diskutil unmountDisk /dev/diskN MacOSįind the raw disk identifying your SD card (something like diskN where N is the higher value): diskutil list While copying the pre-built image, make sure the destination disk is the SD card and not your disk. Copying the pre-built image to an SD card You can also verify the integrity of this web page by checking the PGP detached signature.įeedback is more than welcome. Please make sure you received the right file by checking the hash. If you prefer to use a pre-build image (last update: ), you can use: Needed to build your own image to write onto an SD card are available.
#Usb secure 2.0.2 code#
The source code with all the sources to convert the content and the scripts Unplug the device and remove the USB keys: When the music stops, the conversion is finished. Otherwise, plug a headset and listen to the music that is played during the conversion. If you have a Raspberry Pi with a diode, wait until the blinking stops: The extractedĭocuments are sometimes bigger than the original ones. Note: Make sure your own key is bigger than the untrusted one.

Plug your own, trusted key into the bottom usb slot: Plug the untrusted key into the top usb slot of the Raspberry Pi:
#Usb secure 2.0.2 how to#
The visual instructions how to use CIRCLean is available in vertical PDF format and horizontal PDF format. UsageĬIRCLean is designed to be used by everyone and the following visual shows how to use it in 8 easy steps. We also invite all organizations to actively reuse CIRCLean in their own products or contribute to the project.
#Usb secure 2.0.2 software#
CIRCLean is free software which can be audited and analyzed by third-parties. CIRCLean can be seen as a kind of air gap between the untrusted USB key and your operational computer.ĬIRCLean does not require any technical prerequisites of any kind and can be usedīy anyone. The code runs on a Raspberry Pi (a small hardware device), which also means it is not required to plug the original USB key into a computer. In the worst case, only the CIRCLean would be compromised, but not the computer reading the target (trusted) USB key/stick. The focus of CIRCLean is to establish document exchange even if the used transport layer (the USB stick) cannot be trusted or if there is a suspicion about whether the contained documents are free of malware or not. The device automatically converts untrusted documents into a readable but disarmed format and stores these clean files on a trusted (user owned) USB key/stick. Malware regularly uses USB sticks to infect victims, and the abuse of USB sticks is a common vector of infection (as an example Lost USB keys have 66% chance of malware).ĬIRCLean is an independent hardware solution to clean documents from untrusted (obtained) USB keys / USB sticks.
