
Sign up to save your podcasts
Or
Let's configure BusKill (laptop kill cord) to destroy our encrypted storage (preventing access to sensitive accounts / files) ! This set up will shred our LUKS (Linux encryption) header anytime someone attempts to pull us away from our computer - or our computer away from us. This stops thieves from having any access to our set up, automatically - ensuring any and all sensitive files remain undiscovered.
WARNING: following this can make you more vulnerable to data loss. If the magnetic connector is disconnected, you will lose everything on your encrypted volume after following all steps of this video - but that's the point! Be careful not to accidentally disconnect it.
This tutorial / guide is intended to be easy to follow. To help anyone interested in BusKill on any encrypted Linux setup.
udev (linux device management) allows us to detect when our buskill is disconnected, allowing us to program any action we wish to take upon that disconnect.
Buskill offers the pre-written, ready to use luks encryption header shredder script. On its own detecting the luks device, and immediately shredding the header! - making any luks volume inoperable. All sensitive files undiscovered.
Attach BusKill to belt loop or bracelet. Finally, most people may want to use the more user friendly / graphical application options that come on buskill: opening the app allows us to select whether we want buskill to shutdown the computer, lock the screen - in an easy to use app.
Buskill app comes preincluded for security reasons - within the graphical application you can arm buskill to either lock the screen, or shutdown the computer.
We use udev to configure buskill to shred the luks header, making our encrypted Linux volume, inaccessible.
Buskill is laptop killcord. If ever pulled away from your laptop, or, your laptop is ever pulled away from you, buskill's magnetic connector detects this, automatically taking action to either: wipe the encryption, shutdown the computer, or: locking the screen.
As an open source project, the actions are transparent, and you can explore the project / info on the buskill site:
https://www.buskill.in
Getting buskill: https://www.buskill.in/store
VIDEO LICENSE: CC BY-SA.
@BusKill - Youtube Channel For Buskill
Thanks for your support here!
SUPPORT CHANNEL BY SHARING ON SOCIAL MEDIA:
Bringing you 100% independent content, aiming to introduce the most honest, unfiltered security & privacy content available. Eventually the algorithm must recognize it. Share to help this channel grow!
Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
SHARE YOUR THEORY / THOUGHTS IN COMMENTS
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)
Watch, And Share With Others!
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)
DONATIONS WELCOME (100% Independent Content):
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
🪙 BITCOIN: bc1q44j0fjm2d4rp49l3wk6n6teshvztftl2qxuk44
CASHAPP - https://cash.app/$HumanRightsTech
MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
PUBLIC BLOG: https://bmc.link/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)
Let's configure BusKill (laptop kill cord) to destroy our encrypted storage (preventing access to sensitive accounts / files) ! This set up will shred our LUKS (Linux encryption) header anytime someone attempts to pull us away from our computer - or our computer away from us. This stops thieves from having any access to our set up, automatically - ensuring any and all sensitive files remain undiscovered.
WARNING: following this can make you more vulnerable to data loss. If the magnetic connector is disconnected, you will lose everything on your encrypted volume after following all steps of this video - but that's the point! Be careful not to accidentally disconnect it.
This tutorial / guide is intended to be easy to follow. To help anyone interested in BusKill on any encrypted Linux setup.
udev (linux device management) allows us to detect when our buskill is disconnected, allowing us to program any action we wish to take upon that disconnect.
Buskill offers the pre-written, ready to use luks encryption header shredder script. On its own detecting the luks device, and immediately shredding the header! - making any luks volume inoperable. All sensitive files undiscovered.
Attach BusKill to belt loop or bracelet. Finally, most people may want to use the more user friendly / graphical application options that come on buskill: opening the app allows us to select whether we want buskill to shutdown the computer, lock the screen - in an easy to use app.
Buskill app comes preincluded for security reasons - within the graphical application you can arm buskill to either lock the screen, or shutdown the computer.
We use udev to configure buskill to shred the luks header, making our encrypted Linux volume, inaccessible.
Buskill is laptop killcord. If ever pulled away from your laptop, or, your laptop is ever pulled away from you, buskill's magnetic connector detects this, automatically taking action to either: wipe the encryption, shutdown the computer, or: locking the screen.
As an open source project, the actions are transparent, and you can explore the project / info on the buskill site:
https://www.buskill.in
Getting buskill: https://www.buskill.in/store
VIDEO LICENSE: CC BY-SA.
@BusKill - Youtube Channel For Buskill
Thanks for your support here!
SUPPORT CHANNEL BY SHARING ON SOCIAL MEDIA:
Bringing you 100% independent content, aiming to introduce the most honest, unfiltered security & privacy content available. Eventually the algorithm must recognize it. Share to help this channel grow!
Thanks for sharing this and all videos. It's a HUGE help reposting these videos!
SUPPORT INDEPENDENT CONTENT BY SHARING / OPTIONS BELOW
SHARE YOUR THEORY / THOUGHTS IN COMMENTS
Join me today in this. Leave a comment, share a thought.
EMAIL: righttoprivacy[at]tutanota.com / righttoprivacy[at]i2pmail.org
(VIDEO SHARED EARLY ON PUBLIC BLOG: https://bmc.link/politictech)
Watch, And Share With Others!
I create independent content to keep you informed, share unique tips (many, completely original ideas, many, not found elsewhere), and cover stories to keep you informed on the most pressing personal security / privacy / open source topics.
If you learn something here, consider supporting below (sharing a video on social media is another great way to support this, motivating more time to new content)
💎 THANK YOU FOR CONSIDERING SUPPORTING THIS CHANNEL
💻 LAPTOP (coreboot / Intel ME neutered): https://bmc.link/politictech/commissions (options)
DONATIONS WELCOME (100% Independent Content):
MONERO:48qtspi5En44mJZLeiMoHYFEmuJfQYb5DLQxLDr7d1NXc53XaAvoT8PS3wBrhEc3VY1wxu5Rgw6oKBYgahpSAYnpHntbQNM
🪙 BITCOIN: bc1q44j0fjm2d4rp49l3wk6n6teshvztftl2qxuk44
CASHAPP - https://cash.app/$HumanRightsTech
MEMBERSHIP: https://bmc.link/politictech/membership (early / exclusive / more)
SUPPORT OPTIONS (LIST): https://bmc.link/politictech💻
PUBLIC BLOG: https://bmc.link/politictech/posts
First shared on public blog: https://buymeacoffee.com/politictech/posts (follow blog for free and / or optionally support this work)
📬 CHANNEL EMAIL CONTACT: righttoprivacy[at]tutanota.com
📬 CONTACT RTP (i2pmail): righttoprivacy[at]mail.i2p (I2P internal mail)