Author of tutorials and lecturer on techniques to simplify the practical use of various tools related to Bitcoin self-care, both software and hardware. Anyone can meet the challenge this technology offers, with commitment and the right help. I started from scratch, slowly carrying out some PoW each time. Nostr-maxi. EST 720730, LN at [email protected]
The Solution
Requirements
- Cost: about 15.00 at the time of writing this tutorial (August 2025).
- Continuity of production: Raspberry guarantees production until January 2030.
dtoverlay=disable-wifi dtoverlay=disable-bt
- Cost: 19.99 euros.
Extra Budget
no data cable, costing 3.70 euros.Installation of the Operating System
s PI Imager` tool.raspios directory useful for working with it.wget.sha256sum command and compare the Hash with the one provided by Raspberry in its Github.Get-FileHash -Path <yourpath>\imager-1.9.6.exe
First Step
Second Step
PI OS 32-bit, the only one that works with PI Zero.Third Step
First Configuration
ssh, but decline this step as well, since it is a Zero airgap IP.A New Computer Airgap
First Steps for PI Zero W or 2W
config.txt file that you can edit to your liking. The config is located in the boot partition, in the firmware directory, and you can edit and save it with root privileges.root.(1)root password during the previous steps, I recommend that you do so now, with the passwd command. Having the root user move independently of your personal user can prove very convenient in recovery situations.config.txt file and be prepared to edit it with the nano editor.config, after the words [All]. It is at this point that you will add the dtoverlay commands shown at the beginning of the tutorial.What to Expect from this Device?
uname -a
lscpu
proc/mem/info.lsb_release -a
fdisk -l
df
top
Use
- First you can go to the main menus and get inspired by the Add/Remove software panel, where you will find a number of utilities to program and practice. Remember that you can also do this from the terminal, but always with
rootprivileges.
- You can "adopt" this offline device to store a variety of confidential documents, which will remain accessible when needed, without ever being exposed to the Internet.
- You can use this configuration to generate your GPG keys securely.
- You could even use this new "little toy" as an airgap signing device, by following the advice of Arman The Parman.
Conclusions
embedded operations offline, without neglecting attention to an airgapped machine to turn on and check from time to time.Author
This tutorial has been written by f205sats
You can say thanks by tipping the professor.
Credits
This tutorial has not been proofread yet
The original content has been translated by AI, but human review is necessary to ensure its accuracy.
2 961 sats1 481 sats741 satsEvery content on the platform is the result of a collaborative effort: each lesson, translation, and revision is made possible by the work of contributors. For this reason, we are always looking for proofreaders who can review our content in many languages. If you want to participate in the proofreading process, please reach out in our Telegram group and read our tutorial. We remind you that this content is open-source - licensed under CC BY-SA - so it can be freely shared and used, as long as the original source is credited.

