This is a companion discussion topic for the original entry at https://techlore.tv/w/jdhjaSgNZX5rfL2Tf5aWzm
Great work ![]()
Since Google shadow bans my YouTube comments, I’m just going to follow Henry’s advice and reply to them here on the forums
I’m sure he was an interesting interview but I can’t spend an hour to learn about a usb kill switch. Be nice to start with a 2 minute overview and demo. Never mind, overlooked the review in related videos. Thanks.
Here’s a link to the much shorter review video
(And corresponding thread on these forums)
“I’m going to carefully extract his password. Michael, hand me the wrench.”
This is likely a reference to the excellent xkcd #538
I love this one so much, I included it in the What is BusKill? section of our documentation
Indeed, because BusKill supports wiping your FDE encryption keys in <6 seconds on Linux, it’s one of few tools that can protect against rubber hose attacks
In Linux you can have a script change a workspace. A workspace can be loaded at boot to look like anything, which might answer your question of fake environment.
I’m curious if anyone has a link to this project, so I can research it further.
Without purchasing the device, could BUSKILL be configured to work using stuff I already own, like a NFC YubiKey attached to a lighter leash…? I’m sure it could, but I guess I’m asking if anyone has already done the work on something like that or not…?
Yep! The software is free to download, and you can build your own BusKill cable. We describe how to do this in our documentation
Someone left a comment saying that my worst enemy is a pair of scissors ![]()
I just want to reiterate that BusKill uses a data cable that runs all-the-way to your body for a reason: if the cable is severed in any way, then it will trigger – that includes if someone physically cuts the cord.
