[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Creating a Dead Mans Switch

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 142
Thread images: 30

File: dead-mans-switch01_k0nsl.jpg (59KB, 531x375px) Image search: [Google]
dead-mans-switch01_k0nsl.jpg
59KB, 531x375px
If the FBI busted into your house right now and you were stopped before you could shut off your computer do you have a back up plan?

How would you make a dead mans switch that would save your ass in a situation like that?

My best idea would be something stupid like just having a password prompt popup and lock the screen every like 30 minutes or less and if you don't pass it in time the computer shuts off
>>
>>58862972
1) Encrypt Hard drive
2) Have switch on power strip easily accessible

Or Don't have anything illegal on your computer you pedo.

Problem solved
>>
If the computer is set to destroy itself on invalid password entry and some moron decides to just try a password who's in trouble?

I'm presuming it's the person who owns the data but maybe not?
>>
>>58862996
>Have switch on power strip easily accessible
I said that they already have you detained or neutralized so there is no moving around at all
>>
>>58863022
This actually happened in a real case
The police technically destroyed the data so the guy actually got off without charges
>>
File: photorec_files.png (34KB, 667x479px) Image search: [Google]
photorec_files.png
34KB, 667x479px
I thought about this a lot back when I had something to hide.

Basically if they're there for the computer the first thing they'll do is pull the plug if not kill the power from outside the house so the solution is going to require auxiliary power. I think the "correct" solution is a combination of full disk encryption, a UPS installed INSIDE a locked case and the serial UPS monitor hooked up to the motherboard on the serial port.

Basically if the power suddenly goes out you set the response to that event to basically just "shred /dev/sdx"

With fulldisk encryption you really don't have to damage a whole lot to theoretically make the volumes useless but I was paranoid.

It would make sense to have a UPS outside the case inline with the UPS inside so a normal power outage doesn't shutdown your PC.

Basically in this configuration
>SWAT hits house
>runs in an yanks power or kills power during breach
>secondary power keeps PC running and insta-shred starts that doesn't even need to finish
>they must react to locked case and disks deleting themselves inside
>you go to jail for just as long for obstruction and your IP logs charge you for the illegal stuff anyway

also the first think and forensic tech is going to do is make write-protected copies of the disk and operate on those so I couldn't find any other way to deal things
>>
>>58863156
Why would you need to delete anything if you use FDE?
>>
File: 1486536720775.jpg (65KB, 626x626px) Image search: [Google]
1486536720775.jpg
65KB, 626x626px
>>58863156
>Basically if they're there for the computer the first thing they'll do is pull the plug if not kill the power from outside the house
Are you retarded?
They're main goal is to get to the computer while its still on and unlocked so the disk encryption can't just lock them out
Pulling the plug might as well be destroying the hard disk to them if the encryption is strong enough
And plus they probably expect you to have a UPS in some way so cutting the power would just alert you that they're there and give you time to wipe your shit
>>
File: 1480729607956.png (656KB, 569x629px) Image search: [Google]
1480729607956.png
656KB, 569x629px
>>58863059
This isn't much to go on.
It's simple: If it this reached this point, you are fucked.
>>
>>58863228
That's the whole point of the DMS is so even after you get taken out not all hope will be lost
>>
File: 1485913621916.jpg (41KB, 600x656px) Image search: [Google]
1485913621916.jpg
41KB, 600x656px
>having illegal shit on your hard drive
>doing illegal shit in the first place
Man, it feels good not being a fucking nigger.
>>
File: 1485379730850.jpg (197KB, 1242x1223px) Image search: [Google]
1485379730850.jpg
197KB, 1242x1223px
>>58863299
this, desu
>>
File: anniversary-edition-restart[1].png (33KB, 505x239px) Image search: [Google]
anniversary-edition-restart[1].png
33KB, 505x239px
>>58862972
Windows 10 has my back
>>
File: proxy.png (132KB, 427x640px) Image search: [Google]
proxy.png
132KB, 427x640px
>>58863156
What were you hiding anon?
>>
File: 1486260744839.jpg (15KB, 324x291px) Image search: [Google]
1486260744839.jpg
15KB, 324x291px
>>58863377
>Windows update is actually a dead mans switch
>>
File: 1486175671666.jpg (119KB, 678x1032px) Image search: [Google]
1486175671666.jpg
119KB, 678x1032px
>>58862972
Why do you need to hide anything, anon?
>>
>>58863156
If they're going after your computer they don't kill the power because they know encryption is out there. They have setups to keep your computer powered while they bring it back to the forensics lab. Or they just chill your RAM I guess
>>
>>58863485
Some government agencies have started using liquid nitrogen to freeze the RAM
>>
>>58863485
>>58863501
Tails wipes the RAM before it shuts down

or more accurately, Tails calls the kexec() function to reload the kernel with a special parameter that wipes the RAM

Subgraph OS probably does the same

So if you had a dead man's switch that shuts down Tails, your RAM is clear
>>
File: brxCcs3.jpg (289KB, 640x1440px) Image search: [Google]
brxCcs3.jpg
289KB, 640x1440px
>>58862972
>Put switch on door that goes off if door is opened
>If switch is activated while computer is unlocked it shuts off the PC
>>
File: 1486499523860.jpg (8KB, 241x228px) Image search: [Google]
1486499523860.jpg
8KB, 241x228px
>>58863611
>They come though the window instead
>>
File: 1486536755341.png (662KB, 862x1000px) Image search: [Google]
1486536755341.png
662KB, 862x1000px
>>58863750
No windows in the basement
>>
File: big brain feels guy.jpg (8KB, 215x250px) Image search: [Google]
big brain feels guy.jpg
8KB, 215x250px
>>58863781
>>
>>58863022
Not how it works. They clone your drives and work on the copies. Working on the original is idiotic.

>>58863156
They don't kill the power. That's stupid. Among other things, they'd risk corrupting the drives on a forced shutdown. They bust in and order you to step away from the computer so their techs can get access.

Your best bet is early warning system so you have time to shutdown everything that's already been encrypted. And possibly vaporize your keyfile.

>Basically if the power suddenly goes out you set the response to that event to basically just "shred /dev/sdx"
>Storm causes power outage
>PCs nuke themselves
>because of rain

t. been raided by the FBI
>>
>>58862972
My computer is off...
>>
>>58863975
But is it encrypted?
>>
>>58863982
Only what needs to be
>>
File: snowden-privacy-speech.jpg (19KB, 474x266px) Image search: [Google]
snowden-privacy-speech.jpg
19KB, 474x266px
>>58863215
>>58863912

Perhaps now that this is known. Back in '06 when I was interested in the topic I seriously doubt it would have been standard operating procedure.

on a related note, I wonder how TLA cool kids bypass cleanup on case intrusion. hard to cold attack RAM while stuff is running with the case intact but hard to cut into it without risking a switch opening and triggering something. I wonder if case intrusion tripwires strung around a case are a thing - would work well if wired to main PSU shutoff (allowing internal UPS to take over)


>>58863387
>I don't remember, probably bad teen poetry

>>58863299
>>58863321
>>58863473
>pic related government shills
>>
>>58863781
>yfw they breach through the floorboards above you
>>
None of this is even the topic at hand. The tittle of the thread is Creating a Dead Man's Switch, not What Would Happen if the FBI Raided You
>>
>>58864053
But the OP does mention that the whole point of the switch is for an FBI raid
>>
>>58864051
>come on - are they raiding a nerd in a basement or an ISIS cell?
>no more R6:S for you /v/
>>
>>58864053
Okay fine fuck.

Button under chair leg.
They push you to the ground chair and all.
Button no longer depressed.
4oz of plastic explosive goes off inside your pc.
>>
>>58864069
>watch south park
>wake up
>???
>profit!
>>
>>58864043
my case has a case intrusion mechanism that's hardwired into the bios.
Useless if power is cut, but if they're trying to freeze the ram, they'd have to act quick, which might leave time with an internal UPS to fuck everything up.
>>
Or Better yet, just rig your PC case like a bomb so It either explodes or fries everything by overpowering the MOBO/HDD's with an internal battery set to go off if the case is opened
>>
File: imagesPWCQ6M9D.jpg (8KB, 259x194px) Image search: [Google]
imagesPWCQ6M9D.jpg
8KB, 259x194px
>>58864051
>yfw you realize your house is made of concrete+brick and mortar.

You really need to get some better houses
>>
>>58864043
>Perhaps now that this is known. Back in '06 when I was interested in the topic I seriously doubt it would have been standard operating procedure.

This was how federal operated back then too. It's usually local agencies that don't have the budget for actual computer forensics techs, so they have to wing it as best they can.
>>
>>58864080
and the laws about possession of explosives? Isn't this the same problem as thermite?

Switch idea isn't terrible but I like something a little more resistant to accidental activation and blowing my own face off.

>metal box full of volatile chemicals
>mechanically not so different from grenade
>>
File: 420.jpg (148KB, 500x281px) Image search: [Google]
420.jpg
148KB, 500x281px
>>58862972
>not in USA
>FBI
>>
>>58862972
I just use anti-matter circuitry.

Anti-electrons can still be used to make a circuit, you just need to change the polarity and keep it isolated from anything made of matter.

The instant anything goes even slightly wrong you get a complex nuclear explosion proportional to the anti-atomic mass that is used.

I'd love to see anyone reconstruct anything after the whole system is literally vaporized with even some parts of it transmuted into high energy radiation scattering out at the speed of light.
>>
File: HotPlug[1].jpg (651KB, 1900x1860px) Image search: [Google]
HotPlug[1].jpg
651KB, 1900x1860px
Hotplug...
>>
>>58863912
What were you raided for anon and how did it go?
>>
>>58864168
Bah, simple.
They plug in mouse juggler, OS detects it, proceed wipe
>>
>>58864138
Explosives are highly regulated and will get you in a lot of trouble fast.

However thermite has some interesting legal exemptions (do your homework, but often you can own small amounts without much trouble) as it doesn't really explode, it more just burns so hot everything near it melts.

And needless to say melting a computer makes it very hard to use.

Just don't' get tannerite and thermite mixed up, as people don't seem to know the difference between easy to make pressure explosives and easy to make metal fires. Honestly they have a lot in common, but those differences are important, more so when dealing with laws.
>>
File: 33-181-534-01.jpg (11KB, 640x480px) Image search: [Google]
33-181-534-01.jpg
11KB, 640x480px
>>58864168
good concern - only comeback I could think of would be something like pic related with one end in the case wired to 120V in the PSU prior to internal UPS and stepdown.

Other end on a secondary server someplace else. Basically "signing" the power supply

>>58864208
and you predict every PCI dev ID? you would pretty much have to only greenlight your own known IDs.
>>
thermite over HDD.
Break a capsule of glycerin over some PP to start the reaction.
5 seconds in and the HDD are becoming a slob of molten metal.
>>
>>58864227
Depending on the data, jail for illegal explosives and endangering law enforcement can be better then the death of thousands.
>>
>>58864190
Company I worked for. DMCA type stuff courtesy of the movie industry. You know, REAL crime, not like that child pornography baby shit. Nothing came of it because it was bullshit. Even some of the agents thought it was lame. "We're raiding a company because their DVD players can play *any* DVD? Holy shit, where can I get one?" After a year or 2, they returned all the equipment they confiscated and said, "Do whatever you want with them, just don't sell them."
>>
I heard some guy made a software that makes the HDDs spin so fast they destroy themselves or something like that. Would love to see it
>>
Why not pour salt water over it? Wouldn't that produce short circuits?
>>
>>58864309
Oh cool, thanks for sharing
>>
>>58864270
Actually given how dangerous metal fires are they could likely get you on "endangering law enforcement" or something.

I supposes if whatever that data is, is so critical that building bombs in your house is the least of your problems then something bigger is at play.

Although I do wonder what kind of data could warrant such dramatic measures to risk life and limb.
>>
>>58864365
The only thing I could think of would be terrorist shit because those things are much better than ol' g-bay
>>
>>58864317
Not sure if you're stupid or just joking. A forensic tech can easily remove the platter from the HDD and recover the data as long as the platter itself has not been wiped or destroyed. The HDD as a whole being nonfunctional does nothing to stop them.
>>
>>58864431
Sounds logical.

Then use hydrochloric acid.
>>
>OS runs off write-protected media
>RAM is encrypted using my own encryption key
>Hard drive is fully encrypted with my own encryption key
>Inside the data drive there's a 1MB randomly generated keyfile and the container with the actual data that said keyfile opens

>Party van pulls up
>Hit Ctrl-Shift-Del
>Container unmounted (instant)
>Keyfile gets zeroed out then overwritten with random data five times (since it's 1MB this only takes about a second)
>Encrypted drive unmounted (instant)
>Personal key in RAM gets overwritten with random data (again, instant), meaning the rest of the RAM contents are also gone
>System crashes because ''where RAM go'' and powers off

You can either add a UPS to make sure that the computer is on and you can hit the right keys to start the sequence, or you can not have one and rely wholly on your personal encryption key being uncrackable. So you can either trust your reflexes or your encryption key with this setup.

I use a "correct horse battery staple" type password in a foreign language with a random 12 digit sequence (split into unevenly sized chinks between the words), along with a couple of Unicode characters I have thrown in at random places which I input through alt codes I already knew. Took me all of 5 minutes to memorize. Still, I use a UPS because hitting Crtl-Shift-Del is something I think I'll always be able to do.

You take some performance hits unless you using hardware-accelerated crypto, bit it lets you """""wipe""""" a drive near instantaneously by destroying a large random keyfile in a split second. Should be as good as completely unrecoverable.

Worst part is that I don't even have anything illegal, I just like to live a cyberpunk fantasy and this is a part of it.
>>
>>58864317
>>58864431
I once had a HDD smoke up on me. Circuits fried. I had another drive lying around of the exact same model, so I swapped the circuit board on the fried HDD and it worked just fine. Pulled off all the data and retired it.
>>
>>58864133
> yfw the dig up from underneath you like dig-dug
>>
>>58864480
Hard fucking core
>>
>>58864583
>>58864480
>>58864480
>>OS runs off write-protected media
Friendly reminder that this simply means booting a live DVD.
>>
>>58864396
Pirated porn, because if given the choice to die from fines and embarrassment or die from fiery explosion.

It hardly a choice, death be fiery explosion is the best way to go.
>>
>>58864480
>I use a "correct horse battery staple" type password in a foreign language with a random 12 digit sequence (split into unevenly sized chinks between the words), along with a couple of Unicode characters I have thrown in at random places which I input through alt codes I already knew

this is what people actually believe cybersecurity is on /g/

wew
>>
I keep my hard drives bare and have a container of drain cleaner hovering over them attached to a bluetooth trigger. If I don't purposefully deactivate it, a dongle attached to my car keys, if moved far enough away, will cause the trigger to activate, corroding the cobalt layer on the drives.
>>
>>58862996
>Or Don't have anything illegal on your computer you pedo.
pretty much this. if the feds got hold on my computer they're going to find dank memes and some pirated tv shows and legally produced and distributed porn.
>>
>>58864696
but he's right you moron, using a long combination of random words plus numbers and special chars is just as secure as a randomized password of similar length and is easier to remember.

>>58864706
>encased drives
>thinks they cant just clean off the shit before it's too late
>>
>>58864480
I was trying to play "gun in face no chance to press anything desktop unlocked" mode with >>58863156 and >>58864043

The system you describe does sound pretty secure but doesn't seem to address the deadman switch Part of the topic

The more I think about it the more I like foreign usb kill switch
>>
>>58864480
>I use a "correct horse battery staple" type password in a foreign language with a random 12 digit sequence (split into unevenly sized chinks between the words), along with a couple of Unicode characters I have thrown in at random places which I input through alt codes I already knew.

That pretty much defeats the point in using a correct horse battery staple password in the first place. You might as well not use words at all if you have to throw in unicode chars to strengthen your password.
>>
>>58864796
how the fuck are they going to get that close to you without you noticing?

if they just take your shit with them, you could have encrypted your drives and have the key on some timer that gets whiped after X hours goes by without you checking in on it.

if they have a forensic tool with them, you're fucked.
>>
>>58864725
The cobalt layer is only 5 nm thick. The corrosive foaming agent of your average pipe cleaner is more than enough to destroy it immediately.
>>
>>58864836
but it wont be immediate because it has to get into the drive first
>>
>>58862996
Pretty much this
>feds break in
>decrypt my hard drive after a few years because my key is a 45 words sentence
>they only find legal memes, registred by the international meme traders association
>have to let me go
>>
>memorize key to encrypted drive
>tell the court that my drive was overwritten with random data because of my deadman's switch, so i can't decrypt it

why should i make a deadman's switch again?
>>
>>58864863
>get charged with destroying evidence
>>
>>58864722
Aren't you afraid that you might be forced to pay for all pirated TV shows, movies, music, porn, games etc.
I heard a story some time ago that there was a guy who was in this kind of situation. And fine to pay for all pirated stuff were more than $100k or something
>>
>>58864820
This is the fun part of "dead man switch" vs "one last heroic key press man switch" for me. Its engineering a solution that addresses being taken by complete surprise at the worst moment
>>
>>58862972
why would they do such a thing
>>
>>58864870
>why should i make a deadman's switch again?
>>
>>58864892
I wasn't served a warrant and information was not requested of me. It's to safeguard my data against theft.

>Leo reduced to using the correct process
>>
>>58864858
>have to let me go
>after a few years

That's called prison time, anon. Congratulations for self-imposing prison time on yourself over legal memes.
>>
File: 1485586835303.jpg (68KB, 625x405px) Image search: [Google]
1485586835303.jpg
68KB, 625x405px
To all
>I don't have anything to hide
retards:

Do you use torrents to share copyrighted data?
Are you comfortable when someone goes through your pictures, files, checks if there is something illegal?
If you don't have anything to hide, then share your e-mail logins here. That would be fun.
>>
>>58862972
Protip
>don't be a pedo
>don't live in the United States

I won't just troll you also, 12 hour timer relay that had to be reset every 12 hours otherwise it runs S.M.A.R.T erase commands on the drives.

Would require power for the drives and be concealed/small enough for an experienced forensics tech not to notice it.
>>
>>58864934
>If you don't have anything to hide, then share your e-mail logins here. That would be fun.

No, you might email my mother with rude messages
>>
Secondary question: would selling a deadman switch kit as an anti theft device be legal ? Us? Eu?
>>
File: 1484280163151.jpg (1MB, 3213x3600px) Image search: [Google]
1484280163151.jpg
1MB, 3213x3600px
>Use trusty thinkpad x200
>weld in the ram to prevent a cold boot attack
>encrypt drive and encrypt files inside the os
>have some sort of dead man switch on the main battery supply to the laptop


>fbi snatch laptop from you when you were in the library
>the armband connected to the laptop breaks killing the battery
>the fbi bust out the liquid nitrogen to try and do a cold boot attack
>they open the bottom of the laptop and see the RAM welded into the slots
>there is nothing they can do
>walkthedinosaur.sh
>>
File: missing_steps_plan.jpg (18KB, 350x263px) Image search: [Google]
missing_steps_plan.jpg
18KB, 350x263px
>>58864309
>how do you stall a competitor:
>write claim that they break the law
>they got everything confiscated
>they can't work and have to buy things anew
>>
>>58867102
>"some sort of deadman switch"
>whole topic
>fem watchdog protagonist
>>
>>58864819
Speaking of it, are there methods to fasten password breaking if it's some memetic phrase, even if long? For example, part of a song lyrics.
>>
>>58863156
Thats problematic and unnecessary if there is an unrelated power loss.
>>
Why not just wrap your computer in metal wires connected an electricity supply? If the feds come in, switch the electricity on, magnetise everything and destroy it.
>>
>>58864051
BIG FUCKING HOLE COMING RIGHT UP
>>
>>58862972
How about not being a fucking pedophile?
They wouldn't go confiscating your PC unless you're some kind of cyber criminal, in which case you're either a pedo or a hacker. But if you were a hacker, you wouldn't be asking stupid shit like that on /g/.
>>
>use templeOS as main driver
>nobody is autistic enough to handle it
>if they touch the PC scream they are violating your temple
>call your lawyer tell him they violate your religios rights
>?????
>profit
>>
>>58862972
How about not doing stupid shit on the internet which you know is against the law and then being paranoid your whole life about being a fucko?

This is the definition of a self fulfilling prophecy.
>>
>>58863156
They're expecting you to try that and they have plenty of tools that allows them to confiscate your PC without turning it off.
>>
>>58864043
>that pic
Worrying about privacy is different than worrying about some pedos getting van'd.
>>
>>58862972
>My best idea would be something stupid like just having a password prompt popup and lock the screen every like 30 minutes or less and if you don't pass it in time the computer shuts off
HAHAHAHAHAHAHAHAHA
>>
File: 1485535318236.jpg (40KB, 720x602px) Image search: [Google]
1485535318236.jpg
40KB, 720x602px
>>58864934
I do have something to hide, but that argument is retarded: "share your email logins".

Even if I had nothing to hide at all, I still wouldn't share it because that wouldn't only give you the right to peek into my correspondences. It would also give you the right to impersonate me.

I think we should come up with a way to break the mentality of "nothing to hide", but I don't think "well, then give me your passwords!" is the way to go. It's not a very good analogy.
>>
>>58867102
The fact that you had those would be practically you admitting that you had some kind of incriminating proof in there. They wouldn't give up on you after that and sooner or later you would be in jail.
>>
>>58867726
We got a winner here, this is the whole problem of "nothing to hide", it's as extreme as "give me your passwords". It's kind of a sliding scale of open vs closed.
http://tehlug.org/files/solove.pdf
>>
>>58862972
a) Unlock your computer with a keyfile from a remote server. https://github.com/fetzerms/cryptboot-ssh Set a script that will wipe a key on remote server after a few days of inactivity.
b) Use bluetooth or wifi proximity lock. It's not ideal but better than nothing.
>>58864168
https://github.com/dkopecek/usbguard
>>
>>58862972
I live in the UK so dead mans switch is illegal see mandatory key disclosure
>>
Just bomb the place and leave the country. Lots of Semtex.

If the FBI is here and you know you are fucked,
escalating the situation won't make any much of a difference. You are fucked either way so you might as well go all out and latch onto that small window chance of escape.
>>
>>58864934
>Do you use torrents to share copyrighted data?
No.
>If you don't have anything to hide, then share your e-mail logins here.
Not the same thing, although I don't have anything to hide, I wouldn't want any fucker to delete my e-mail or my account. Or send messages in my name. Your argument is retarded.
>>
File: 1483750042433.jpg (97KB, 720x980px) Image search: [Google]
1483750042433.jpg
97KB, 720x980px
>>58867726
>>58864996
OK, that's not really where I was going with "share your logins".
More like: make archive of all your emails and make them public.
Post every email you get on facebook or twitter.
And be honest.

And biggest issue is that more idiots with
>I have nothing to hide
mentallity are, more cormfortable government is to take actions on spying you.
Thus giving more power to government.
Thus leading to censorship.

Do we really want to live in a world where government controls internet?

For me it's a matter of principle.
My privacy is my freedom.
>>
>>58864863
>tell the court that my drive was overwritten with random data
I have a bunch of decommissioned drives in my drawer that I actually did overwrite with random data in case I might want to sell them or give them to somebody. Suppose I get raided and those get confiscated: am I fucked because the disks look like they're be encrypted and I won't provide the keys?
>>
>>58864480
what I've they raid you while you're not at home? asleep? on the shitter?
>>
I don't look at CP or plot terrorism in the first place, and they're unlikely to be bothered about my torrented copies of Friendship is Magic as that's a civil matter
>>
>>58862972
save my ass from what?
>>
>The number 14
The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

>>58868975
>b-but i'm not bad
>empty nothing to hide arguements

>>58868981
i'm interested too but i consider this a completely seperate topic than the OPs question which is more mechanical than motivational
>>
>>58862972
if they bust into your house they already have enough proofs to lock you up
>>
>>58869196
they have probable cause, that's a long way from guilt.
>>
>>58868065
and self censorship / chilling effect where the line is deliberately blurry so people won't go near it
>>
So Police or federal agencies can literally bust down your door without warning. What if you pull out a gun and shoot at them? Anybody could think it was a robber or something.
>>
>>58868917
poweroff
>>
>>58862972
>buy server and place it in a cheap appartment, just needs constant internet connection and power
>Store data remotely on server, use encryption before storage
>Write client/server pingpong routine that needs to run every X amount of time
>If the client stops responding, begin a countdown
>If the countdown is over, send signal to C4 charge within the server case
>Boom
>>
>>58863156
Literally just use full disk encryption and turn your pc off and hope they don't have the tools on them to pull the key out of memory.
>>
>>58863200
just in case....i prefer to write random data on random locations
>>
>>58868132
There is no way to tell if a drive is actually random data or if it is encrypted. That's a characteristic of good encryption.
>>
>>58867833
Hahahaha
Why is britbongstan so fucking bad?
>>
>>58862972

Usb deadmans switch:

https://github.com/hephaest0s/usbkill
>>
seek help OP if u are a pedo
>>
File: 1486253652172.jpg (24KB, 540x506px) Image search: [Google]
1486253652172.jpg
24KB, 540x506px
>>58871698
Not a pedo
Its just scary times we live in and I don't want to be a victim of my own governments corruption
>>
>>58871666
literally only person in the entire thread with a sensible solution.
>>
https://github.com/defuse/swatd

/thread
>>
>>58872937

thats a pretty good system for the software side and it seems a lot more reliable for day to day use.

still not convinced it's /thread for the hardware side, directions flat out say that compromise can occur triggering zero sensors.
>>
>>58872676
You know what would help? Not committing any crimes.
>>
File: 345683467455.gif (92KB, 640x571px) Image search: [Google]
345683467455.gif
92KB, 640x571px
>>58862972
Kill myself can't prosecute if i'm not alive.
>>
>>58873224
Fine, install a DNA scanner, into your keyboard, once they raid you they will separate you from your keyboard. Thus your computer knows it's not you and wipes the LUKS header.
>>
>>58873250
>You know what would help? Not committing any thought crimes
Thank you for reminding me, comrade
>>
File: cl.jpg (91KB, 407x405px) Image search: [Google]
cl.jpg
91KB, 407x405px
>>58873250
i literally can't tell who is trolling and who doesn't know the constitution and who is too stupid to understand the ramifications of their suggestions

>this thread
>>
Personaly i got busted while being outside of my home, so there was nothing i could do to switch off the power.
>>
File: bolbi.jpg (81KB, 1024x768px) Image search: [Google]
bolbi.jpg
81KB, 1024x768px
>>58867628
kek
>>
File: nice.jpg (72KB, 750x725px) Image search: [Google]
nice.jpg
72KB, 750x725px
>>58873291
>>
>>58873747
What'd ya do?
>>
what prevents a cop from planting hard-drives on my property
>>
>>58873557
Is it really that difficult to stop being a criminal? Is your life nothing but "I want to do nothing but commit crimes today"?
>>
File: tendies.gif (1MB, 326x256px) Image search: [Google]
tendies.gif
1MB, 326x256px
>>58874057
alleged crimes for which there is insufficient evidence

>this thread
>>
>>58863275
You would have to do something crazy like somehow wire your house such that if a Windows or door is broken or opened the power to that outlet is shut off. If encrypted properly without the keys stored o. The machine, this should be sufficient.
>>
>>58864133

>My house costs 15x more to repair damages, I am so superior
>>
>>58862972
Usb device that must be inserted.
If removed, locks your pc and remove all containers currently mounted
>>
>>58875251
You'd still have to remove it. I don't think it'd take less time than mashing the hibernate\shutdown button.

IMO better choice would be having a wireless (Bluetooth / ZigBee / ANT+) dongle and some kinda beacon that you can attach to your keys or whataver. Dongle pings beacon, if beacon goes out of range, some time buffer for bringing it back, if it doesn't return then shutdown.
Thread posts: 142
Thread images: 30


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.