Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Encryption Security Linux

Kali Linux On a Raspberry Pi (A/B+/2) With LUKS Disk Encryption 37

An anonymous reader writes With the advent of smaller, faster ARM hardware such as the new Raspberry Pi 2 (which now has a Kali image built for it), we've been seeing more and more use of these small devices as 'throw-away computers'. While this might be a new and novel technology, there's one major drawback to this concept – and that is the confidentiality of the data stored on the device itself. Most of the setups do little to protect the sensitive information saved on the SD cards of these little computers.
This discussion has been archived. No new comments can be posted.

Kali Linux On a Raspberry Pi (A/B+/2) With LUKS Disk Encryption

Comments Filter:
  • There's already a full-fledged distro for the RPi. Why not just use its encryption features?

    • by Anonymous Coward

      kali linux is totally pointless and the clueless twits behind it need to get back to the tech support desk, call volume peaks at 11 AM.

      this distro is also produced by a ridiculous "hacking" school/worthless diploma mill that for a fee will make a Hax0r out of you and give you a certificate in pen testing suitable for framing. it is a complete scam.

      witless jackassery of the most foolish variety is responsible for kali linux and its "hacking dojo" as they all it.

      bullshit. complete bullshit.

    • by hamjudo ( 64140 ) on Monday March 09, 2015 @04:36PM (#49218607) Homepage Journal
      They are not orthogonal. This should have been titled "if you are going to use Kali Linux on a Raspberry Pi, here is how to encrypt it".

      Kali Linux is designed for penetration testing, among other things. The logs from a penetration test are valuable to dark hats. The advantage of doing this from a Raspberry Pi, is that they are cheap enough to send to each branch of a company, so each network can be individually tested. Sometimes this means that physical security is difficult to ensure. It would be very embarrassing to lose a system during an internal audit. It could quite easily turn into a career ending event, if that led to a security breach.

      Disclaimer: I've never used Kali Linux, nor did I look closely at this technique to see if there is something stupid in the instructions.

  • by fisted ( 2295862 ) on Monday March 09, 2015 @05:08PM (#49219001)
    Oh yeah please. Make it even slower.
  • Does the SOC in tbe Rasbery PI 2 have hardware encryption support? 'cos it's going to be pretty slow without it.

Intel CPUs are not defective, they just act that way. -- Henry Spencer

Working...