▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
 ╚════════════════════════════════════════════════════════╝ 
▒▒╗    ▒▒╗ ▒▒▒▒▒╗ ▒▒▒▒▒▒╗ ▒▒▒╗   ▒▒╗▒▒╗▒▒▒╗   ▒▒╗ ▒▒▒▒▒▒╗ 
▒▒║    ▒▒║▒▒╔══▒▒╗▒▒╔══▒▒╗▒▒▒▒╗  ▒▒║▒▒║▒▒▒▒╗  ▒▒║▒▒╔════╝ 
▒▒║ ▒╗ ▒▒║▒▒▒▒▒▒▒║▒▒▒▒▒▒╔╝▒▒╔▒▒╗ ▒▒║▒▒║▒▒╔▒▒╗ ▒▒║▒▒║  ▒▒▒╗
▒▒║▒▒▒╗▒▒║▒▒╔══▒▒║▒▒╔══▒▒╗▒▒║╚▒▒╗▒▒║▒▒║▒▒║╚▒▒╗▒▒║▒▒║   ▒▒║
╚▒▒▒╔▒▒▒╔╝▒▒║  ▒▒║▒▒║  ▒▒║▒▒║ ╚▒▒▒▒║▒▒║▒▒║ ╚▒▒▒▒║╚▒▒▒▒▒▒╔╝
 ╚══╝╚══╝ ╚═╝  ╚═╝╚═╝  ╚═╝╚═╝  ╚═══╝╚═╝╚═╝  ╚═══╝ ╚═════╝ 
▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒▒
 ╚════════════════════════════════════════════════════════╝ 

How to setup a Bitcoin Air-Gap Computer?
DON'T.

You will almost certainly screw
yourself out of your Bitcoin.
Use a hardware wallet instead.

Computers (incl. Raspberry Pi and other single board linux computers) were not designed to hold secrets, here is just a short list of attacks:

  1. SeedSigner Rasperry Pi Evil Maid Persistant Seed Storage
  2. Rasperry Pi Data Extraction LoRA, With No Radio
  3. Cold Boot Attacks
  4. The Chilling Reality of Cold Boot Attacks
  5. Lenovo X1 Carbon Bitlocker Key Sniffing any% Speedrun (42.9 seconds)
  6. Critical vulnerability affecting most Linux distros allows for bootkits
  7. Academics turn RAM into Wi-Fi cards to steal data from air-gapped systems
  8. Sniffing Keystrokes With Lasers/Voltmeters
  9. Generating Covert Wi-Fi Signals from Air-Gapped Computers
  10. Flaws in self-encrypting SSDs let attackers bypass disk encryption
  11. NSA TEMPEST Attack can remotely view your computer and cell phone screen using radio waves!
  12. LED-it-Go - exfiltrate data from air-gapped systems via an HDD's activity LED
  13. USBee - force a USB connector's data bus give out electromagnetic emissions that can be used to exfiltrate data
  14. AirHopper - use the local GPU card to emit electromagnetic signals to a nearby mobile phone, also used to steal data
  15. Fansmitter - steal data from air-gapped PCs using sounds emanated by a computer's GPU fan
  16. DiskFiltration - use controlled read/write HDD operations to steal data via sound waves
  17. BitWhisper - exfiltrate data from non-networked computers using heat emanations
  18. Unnamed attack - uses flatbed scanners to relay commands to malware infested PCs or to exfiltrate data from compromised systems
  19. GSMem - steal data from air-gapped systems using GSM cellular frequencies
  20. xLED - use router or switch LEDs to exfiltrate data
  21. aIR-Jumper - use a security camera's infrared capabilities to steal data from air-gapped networks
  22. HVACKer - use HVAC systems to control malware on air-gapped systems
  23. MAGNETO & ODINI - steal data from Faraday cage-protected systems
  24. MOSQUITO - steal data from PCs using attached speakers and headphones
  25. PowerHammer - steal data from air-gapped systems using power lines
  26. CTRL-ALT-LED - steal data from air-gapped systems using keyboard LEDs
  27. BRIGHTNESS - steal data from air-gapped systems using screen brightness variations
  28. AiR-ViBeR - steal data using a computer's fan vibrations
  29. POWER-SUPPLaY - steal data by turning the power supply into a speaker
  30. Acoustic attack - steals data from keystrokes with 95% accuracy
  31. list wip, i'm lazy.
How to setup a Bitcoin Air-Gap Computer