Installing BZL Wallet on Ubuntu 17.10 with Linux WINE


If like me you were keen to get your hands on a BZL wallet for the exciting new Portuguese airdrop that has started, as a Linux user you may of been left disappointed.

While I imagine that the latest wallet works well in more stable distributions such as the long-term supported Ubuntu 16.04, with the latest 17.10 I had no success in getting the wallet to install. I tried building different versions from source as well as testing the QT images (that usually work) but none of these helped. I was left riddled with dependency issues despite how many libboost symlinks I produced.

So I turned to Linux WINE (Wine Is Not an Emulator) and unsurprisingly the Windows executable for the latest v1.0.2 works perfectly well, as well as previous versions in fact. If you are facing the same problem as me in artful or stretch for example I’d recommend doing the same. Continue reading “Installing BZL Wallet on Ubuntu 17.10 with Linux WINE”


DeepOnion Wallet In Tails Persistent Volume


Posted below are chapters 3-5 of the tutorial “DeepOnion in Tails persistent volume” that covers configuring DeepOnion into a Tails encrypted persistence. Building from source and creating the AppImage (credit: @thxminer) in Tails are not included here as are merely tailored versions of the unix build and QT packaging instructions. For building DeepOnion in Tails from scratch please refer to the full tutorial published on GitHub, this is however not a requirement for installation.

Disclaimer: This is only one example of configuring DeepOnion in Tails, any suggestions or improvements to the configuration are more than welcome. This method has been tested in Tails from source as well as with downloaded AppImages but should otherwise be considered experimental and relevant warnings should be taken into account. Please only test with the correct version of Tails: the latest version. As of posting this is Tails 3.5. Testing and feedback is appreciated. Continue reading “DeepOnion Wallet In Tails Persistent Volume”

Installation workarounds for a corrupt BIOS: GRUB Rescue and removing the hard drive solution


In the Linux world, sometimes it’s not a hardware compatibility issue or a complication with customising your Linux systems it comes down to your computer’s BIOS.

You might of come across this page because your BIOS or efibootmgr has also corrupted, meaning that you can no longer boot from USB and otherwise change systems. One of these problems can be your BIOS registering bootloaders on EFI System Partitions (ESP), or otherwise being suck in 32-bit Legacy when you want it in 64-bit UEFI bootloading.

For me, I was luck enough to have both problems, so if you have either then you’ve come to right place! Fortunately, I was eventually able to re-install 64-bit Linux onto a new internal HDD with the compromise of 32-bit booting in Legacy, due to a faulty BIOS. Continue reading “Installation workarounds for a corrupt BIOS: GRUB Rescue and removing the hard drive solution”

Tutorial: Installing DeepOnion v1.5.1 on Ubuntu/Debian

Build / Configure / Launch / Launcher / Troubleshooting

Build instructions from GitHub


Click here for latest build instructions from GitHub as versions will update.

​The following are commands needed to build on Ubuntu/Debian from scratch.
It is verified with Ubuntu 16.04, 17.04 and has also been tested on 17.10.
For configuring and troubleshooting, scroll further down.​

Continue reading “Tutorial: Installing DeepOnion v1.5.1 on Ubuntu/Debian”

Installing Debian 9 / Kali 2.0 to an already LUKS encrypted LVM volume group

A quick guide for those of you struggling to install Debian Stretch, Kali 2.0 or other Linux systems that use the Debian installer, into a previously configured LVM volume group – i.e. into a LUKS encrypted partition.

Example: You have your disk already encrypted with other Linux system(s) present and now you want to install Debian / Kali 2.0 into this encrypted disk. You’d prefer one encrypted partition for your systems, rather than shrinking the size of one to create another.

I recently came across this problems and after searching online found limited information on how this was possible. Debian doesn’t have a Live version to unlock/decrypt a previously configured LVM volume group, Kali does have a Live version, but from 2.0 it is no longer possible to access the installer from the Live version, for whatever reason. So this needs to be done from the Debian installer using BusyBox.

Note: The installer does have the option to set up LVM, but unfortunately does not have a built-into-installer solution for decrypting and mounting a volume group. This has been tested on Debian Jessie 8, Stretch 9 and Kali 2.0.
Continue reading “Installing Debian 9 / Kali 2.0 to an already LUKS encrypted LVM volume group”

Triple booting the Asus T100TA: Windows, Lubuntu and encrypted Linux Mint


As the title suggests, this post is about triple booting the Asus T100TA with Windows, Lubuntu and an encrypted Linux Mint.

This was made possible with thanks to John Well’s blog post on installing Ubuntu onto the T100TA, a custom encryption setup tutorial, a full disk encryption tutorial, as well as documentation from elsewhere such as Ubuntu and Debian help pages.

Here you will find instructions on how to successfully have three functioning operating systems, information on setting up custom encryption on the T100TA, as well as the usual issues.

This information is only relevant to you if you are looking to triple boot, encrypt your Linux system on the T100 series, searching for updates in regards to installing Linux, and/or differences when installing an Xcfe desktop such as Lubuntu. You are otherwise best referring to John Well’s post on how to install Ubuntu dual booting with Windows – if this is ultimately what you are looking to do.

In case you’re wondering why on Earth would you want to triple boot an Asus T100 additionally with an encrypted system? It’s a good question, with a few good answers:

  1. First and foremost, the T100TA-H1 comes with an additional 500g HDD keyboard dock (therefore located under the keyboard) – as well as the 32g SSD. See here for more details. Its hardware and specifications are otherwise that of the T100TA, but with some real hard drive space.
  2. Whilst there is still no onboard keyboard support for cryptsetup, therefore no simple way to unlock a LUKS encryption without a keyboard, a 500g disk located under the keyboard of this machine means that you would only be using this OS with a keyboard. Therefore encryption makes sense for the security of this ‘docked-only’ operating system.
  3. Having an un-encrypted Linux based system, in this case Lubuntu, installed on the 32g SSD is necessary to in order to use Linux on the transformer book when undocked. Not to mention a lightweight desktop is a good idea when partitioning an already small disk (32g).

Continue reading “Triple booting the Asus T100TA: Windows, Lubuntu and encrypted Linux Mint”

Easy & Secure Thunderbird: PGP encryption with Tor Birdy for Linux

pgp-smallThe following is a step by step guide for setting up Mozilla Thunderbird using PGP with the Engmail add-on over the Tor anonymity network via the TorBirdy add-on.

This is more of a compilation of instructions based on manuals for installing and setting up Thunderbird, followed by installing and setting up TorBirdy and Enigmail add-ons. Also includes additional configuration settings for best security and easiest access, as well as a few borrowed screenshot to help you through the process.

Requirements: Full disk or system encryption using Linux, otherwise the security of this procedure is not complete. An up to date version of Tor Browser, as well as a functional internet connection.

Tested on: Linux Mint 18.1 and Lubuntu 16.10/17.04.  This should otherwise work for all Debian-based systems, as well as those where Thunderbird is available. Instructions should work for Windows and OS X from steps 2-10, after Thunderbird installation.  Continue reading “Easy & Secure Thunderbird: PGP encryption with Tor Birdy for Linux”