TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

BusKill: A kill cord for your laptop

331 pointsby maltfieldover 5 years ago

39 comments

Reventlovover 5 years ago
Archive link because the website is down: <a href="http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20200102140351&#x2F;https:&#x2F;&#x2F;tech.michaelaltfield.net&#x2F;2020&#x2F;01&#x2F;02&#x2F;buskill-laptop-kill-cord-dead-man-switch&#x2F;" rel="nofollow">http:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20200102140351&#x2F;https:&#x2F;&#x2F;tech.micha...</a><p>I was expecting a &quot;kill switch&quot; destroying the computer, but that&#x27;s just a thing that switch off your laptop when unplugged. I guess you could also do this with bluetooth, for example.
评论 #21935735 未加载
评论 #21935664 未加载
评论 #21935646 未加载
评论 #21935718 未加载
评论 #21941732 未加载
评论 #21935820 未加载
im_down_w_otpover 5 years ago
I used to have my laptop setup to require my specific Yubikey to be inserted to allow waking from sleep and booting, and when you pulled it out it locked the machine, logged you out, suspended, or shutdown depending on which modifier key you were holding down when you removed it.<p>Worked pretty well as a &quot;kill switch&quot; when getting up from my desk.<p>I probably have the udev scripts laying around somewhere.
评论 #21944939 未加载
评论 #21943354 未加载
milesover 5 years ago
Windows users may want to try the built-in Bluetooth proximity locking feature:<p>Lock your Windows 10 PC automatically when you step away from it <a href="https:&#x2F;&#x2F;support.microsoft.com&#x2F;en-us&#x2F;help&#x2F;4028111&#x2F;windows-lock-your-windows-10-pc-automatically-when-you-step-away-from" rel="nofollow">https:&#x2F;&#x2F;support.microsoft.com&#x2F;en-us&#x2F;help&#x2F;4028111&#x2F;windows-loc...</a><p>While macOS doesn&#x27;t include such a feature out of the box, apps like Near Lock <a href="https:&#x2F;&#x2F;nearlock.me" rel="nofollow">https:&#x2F;&#x2F;nearlock.me</a> exist.<p>EDIT: Just found Rohos Logon Key for Windows and macOS:<p><a href="https:&#x2F;&#x2F;www.rohos.com&#x2F;products&#x2F;rohos-logon-key-for-mac&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.rohos.com&#x2F;products&#x2F;rohos-logon-key-for-mac&#x2F;</a><p>It &quot;converts any USB drive into a security token for your computer&quot; and can &quot;automatically lock your Mac screen when the key is unplugged&quot;.
fnord77over 5 years ago
Ross Ulbricht had his laptop snatched by an undercover FBI agent while he was using it.<p>This kill cord might have saved him some grief.
评论 #21941731 未加载
评论 #21939879 未加载
ropiwqefjnpoaover 5 years ago
The article keeps saying &quot;self-destruct&quot; but that&#x27;s not what happens.<p>But if your hard drive is encrypted, this is a pretty good solution for most people.<p>Maybe if you can get BusKill to activate a mini thermite explosive under your hard drive.
评论 #21936672 未加载
评论 #21936678 未加载
jccalhounover 5 years ago
I will sometimes go to the university library to do some work and I&#x27;m always amazed at people who will go to the restroom or something and leave their laptop sitting there without a lock or even logged out.<p>I always use a kensington lock and lock my screen whenever I have to leave my laptop. If I had a macbook I would be taking it with me. I know the locks won&#x27;t stop someone who really wants to steal it but with so many unattended laptops sitting around it makes it less likely they will go for mine.
评论 #21941982 未加载
tyingqover 5 years ago
It appears breakaway mag USB-A connectors are pretty cheap: <a href="https:&#x2F;&#x2F;www.amazon.com&#x2F;Griffin-Breaksafe-Magnetic-Breakaway-Disconnects&#x2F;dp&#x2F;B0759FKCK8" rel="nofollow">https:&#x2F;&#x2F;www.amazon.com&#x2F;Griffin-Breaksafe-Magnetic-Breakaway-...</a><p>From tidbits in this thread, it sounds like a Veracrypt hidden volume with a distress passphrase, plus a fairly simple dead-man script wouldn&#x27;t be hard to set up. Something like: kill sensitive processes, drop caches, wipe memory, then panic the kernel.
评论 #21941756 未加载
chacha2over 5 years ago
If all the killcord does is turn off the machine, just use a laptop with no battery.
评论 #21939229 未加载
dotBenover 5 years ago
A man just died in Oakland today trying to recover his laptop that was snatched from him in a Starbucks.<p><a href="http:&#x2F;&#x2F;nypost.com&#x2F;2020&#x2F;01&#x2F;02&#x2F;man-dies-after-trying-to-stop-thief-who-stole-his-laptop-at-starbucks&#x2F;" rel="nofollow">http:&#x2F;&#x2F;nypost.com&#x2F;2020&#x2F;01&#x2F;02&#x2F;man-dies-after-trying-to-stop-t...</a><p>Definitely don&#x27;t go running after your stolen laptop, let it go.
评论 #21938592 未加载
Taniwhaover 5 years ago
A gentle warning: different Linux distros handle UDEV &quot;remove&quot; differently, and incompatibly, so few people actually use this message it&#x27;s not well tested (try shipping code for a device that DOES need it!).<p>Debian was a particular problem until they switched to SystemD (which I think is possibly the only udevdaemon that gets it right) - even so some distros (Ubuntu I&#x27;m looking at you) screwed up starting the udevdaemon before they mounted root writable meaning that scripts run from it couldn&#x27;t really do anything useful<p>Fortunately most distros are switching to SystemD so this will likely work in most places
评论 #21943604 未加载
jotmover 5 years ago
I guess I&#x27;ll share in this thread.<p>---1---<p>I have a OnePlus 6T with the stock ROM exclusively for my British phone number. On the 25th of December, someone from Canada logged into the GMail account used on that phone, from a OnePlus 3T.<p>The password was one randomly generated in KeePass (all of them are except for useless websites). They managed to change the password to the account, but seemingly nothing else, so that&#x27;s just weird.<p>I received the notification on my other email, and recovered the account, reset the password, replaced with a new one.<p>---2---<p>Last week, I opened up a laptop I use for storage (3 drives fit inside, perfect for backups) and noticed a network drive with a Chinese name. It disappeared when I clicked on it. The laptop is always on connected to my router and to a VPN server.<p>Now I need to completely wipe the phone, root and use a custom ROM, as well as wipe the laptop (and two other computers?), upgrade OpenWRT on the router and change all of the passwords I guess. Yes, I still haven&#x27;t done it heh.<p>---<p>-----------&gt;<i>I am curious about your comments on this.</i>&lt;-----------<p>---<p>Never had anything really suspicious like this actually happen to me.<p>I don&#x27;t even have anything good&#x2F;useful on my devices, except a Keepass database with passwords to all bank accounts&#x2F;emails&#x2F;etc. If that&#x27;s been opened, I&#x27;m a bit fucked, but I&#x27;d be receiving notifications on my phone and other emails.
评论 #21936613 未加载
评论 #21941821 未加载
评论 #21937230 未加载
tylermenezesover 5 years ago
FYI, you could also do this with your charger. (It sends udev events.) It&#x27;s a lot less likely to get weird looks.
评论 #21943495 未加载
savingGraceover 5 years ago
Another solution would be to just remove the battery and plug the laptop in. While this removes the portability, it is still an alternative solution.
评论 #21936821 未加载
评论 #21936381 未加载
dbtxover 5 years ago
<p><pre><code> echo o &gt; &#x2F;proc&#x2F;sysrq-trigger </code></pre> (read linux&#x2F;Documentation&#x2F;admin-guide&#x2F;sysrq.rst before you try this)
评论 #21937547 未加载
vgaldikasover 5 years ago
SilkRoad guy would of loved this :D
评论 #21935557 未加载
评论 #21935866 未加载
评论 #21935578 未加载
RandomBaconover 5 years ago
What if someone plugs in a rubber ducky or some other kind of sophisticated USB while you turn your head for just a second?<p>There are USB devices that are so small, you can barely even see them in the port when plugged in.<p>Perhaps a hard-to-remove USB plug? (like child-proof plugs you might see in an electrical outlet)
评论 #21936199 未加载
0klover 5 years ago
&gt; You could just have a usb thumb drive on a retractable lanyard (think RFID badges or DoD Common Access Cards), but what if that thin retractable cord just snaps–leaving the USB drive snugly in-place in the laptop?<p>You could also just use a thicker cord.<p>The project, no offense to the author, could be renamed: long USB cable with a magnetic usb attachment.<p>&gt; As of yesterday, that’s [stolen laptop] a hard attack to defend against.<p>Which is just wrong; the author did not invent anything here - anyone I’ve known that’s ever been worried about this scenario has implemented it already with &lt;yubikey&#x2F;access card&#x2F;arbitrary usb&gt;.<p>* extra PSA: if you’re worried about this but somehow haven’t already required 2FA for all your accounts and admin access on your laptop, then you should re-evaluate your threat scenarios.
评论 #21936161 未加载
krillyover 5 years ago
Er, why not just attach the laptop itself to your body? Low tech &gt; high tech
TedDoesntTalkover 5 years ago
&gt; We do what we can to increase our OpSec when using our laptops in public. But even then, there’s always a risk that someone could just steal your laptop...&quot;<p>Don&#x27;t leave the house if you want to be safe.
linuxhanslover 5 years ago
Couldn&#x27;t you just pair your computer with your phone (or something that you keep on you) via blue tooth, detect the loss of signal, and then trigger whatever action you&#x27;d like to trigger?
评论 #21940621 未加载
评论 #21941323 未加载
londons_exploreover 5 years ago
I&#x27;d like to see a more practical solution for removing disk encryption keys from RAM.<p>For example, wipe the disk encryption key from RAM, but then pause all disk IO and present some kind of UI to re-enter the encryption key to continue using the system.<p>Encrypting all of system RAM can also quickly be done - perhaps a kernel module which in the case of a panic encrypts all of system ram with a key derived from your disk encryption key would be handy. Then when the key is available again, ram can be decrypted and processes resumed.
评论 #21945812 未加载
brianbreslinover 5 years ago
Can someone explain to me in laymen&#x27;s terms what this does? It renders the motherboard inoperable? Kills the display? How do you recover from this if you ACCIDENTALLY unplug it?
评论 #21935678 未加载
评论 #21935669 未加载
评论 #21935716 未加载
评论 #21935687 未加载
评论 #21935675 未加载
评论 #21935673 未加载
评论 #21935656 未加载
Zenstover 5 years ago
Saw a demo 20 years ago at Infosec(UK) of a company selling a dongle which with corresponding pass, acted as a proximity authentication and locking when you walked away.<p>Today, most laptops have cameras which can offer the same level of proximity detection if you away from the laptop. That would make this type of solution doable via software that way, albeit a bit more of a software load overhead.<p>But for some killcord, I&#x27;d also have an alarm.
评论 #21938996 未加载
dangusover 5 years ago
This is a really neat project but it’s also not really a solution to anything.<p>First, it doesn’t solve for the scenario of person pointing a gun at you and telling you to access your top secret files for them. That will defeat most forms of security and so if physical access is a concern you probably shouldn’t be logging in at your local coffee shop.<p>Second, a thief who wants your computer for its monetary value isn’t interested in its contents. Your normal drive encryption and screen timeout restrictions have you covered there. They’re gonna wipe your computer, sell it, and move on.<p>Institutionally purchased hardware is often equipped with zero-touch provisioning (such as Apple Device Enrollment). These products can be bricked at the hardware level they moment they touch the Internet. They’ll need a new logic board, i.e. new soldered on storage, i.e. they’re not even necessarily worth stealing.<p>Third, the idea of a magnetic connector’s removal locking or bricking your computer seems awfully inconvenient. That’s gonna be constant false positives without a gain in security.<p>If you’ve got someone who is after you to obtain your secret company info and knows enough to cause mayhem, you’ve got much bigger problems than whether or not your screen is going to lock. They’re also probably going to use social engineering, targeted malware and spyware, not brute force physical access.
评论 #21935811 未加载
评论 #21936657 未加载
评论 #21937265 未加载
评论 #21937342 未加载
评论 #21936446 未加载
crankylinuxuserover 5 years ago
It reminds me of USBkill <a href="https:&#x2F;&#x2F;github.com&#x2F;hephaest0s&#x2F;usbkill" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;hephaest0s&#x2F;usbkill</a><p>Its primary use is to thwart machine fuzzing and debugging using USB devices. The moment there&#x27;s a change in USB state, down the machine goes.
pacomerhover 5 years ago
If you&#x27;re using a macbook, isn&#x27;t &quot;Find my mac&quot; enough to erase remotely?, I understand this is a faster disabling mechanism but also a bit inconvenient. I wish there was something even easier, like a tiny usb drive with a remote control
评论 #21939675 未加载
henvicover 5 years ago
&gt; In less than 60 seconds and with the help of a rubber ducky, the thief could literally cause millions of dollars in damages to your organization.<p>Kudos for the imagination, but in real life for most developers not vendorizing and auditing their dependencies (+ downloading them all from production) is most likely to cause such havoc (regardless if dozen thousands or millions of damage)...<p>I imagine this might likely happen in places like security and programming language conferences, especially when you leave your belongings around unattended for a minute or two.<p>The ideal scenario IMHO would be to have to authorize&#x2F;reject devices from connecting to your machine (and limiting the scope). I don&#x27;t know much about USB-C and know it is hard, but I see Apple coming up with something like this in the future (maybe along with Apple Watch detection for quick logout - you can already use it for logging in).
fortran77over 5 years ago
Would this have stopped the FBI getting the Silk Road laptop? I wonder if they&#x27;re looking out for these things. I know when they take computers that are running, they keep them running and powered on with a portable power supply
hkaiover 5 years ago
Wow, a solution for a problem we never have to worry about in Asia. Why can&#x27;t your government just crack down on theft so that people can be allowed to use their laptop wherever they want without fear?
MonkZover 5 years ago
On systemd enabled systems, try &quot;loginctl lock-sessions&quot; as udev cmd. It should work on common desktop environments. If you have something custom try xss-lock to react on the lock-sessions signal.
wffurrover 5 years ago
I was expecting something more like the Etherkiller: <a href="http:&#x2F;&#x2F;www.fiftythree.org&#x2F;etherkiller&#x2F;" rel="nofollow">http:&#x2F;&#x2F;www.fiftythree.org&#x2F;etherkiller&#x2F;</a>
评论 #21939457 未加载
sysbinover 5 years ago
Maybe a smartwatch reading the heart rate of the owner and noticing stimulation could trigger the same functionality as well.
评论 #21935713 未加载
评论 #21937578 未加载
评论 #21935730 未加载
bayesian_horseover 5 years ago
I think it should be possible to program an MCU to bruteforce the USB ids. Or buy the same usb drive.
simonebrunozziover 5 years ago
Smart. Author should productize and sell this. Small market, but almost no competition so far.
评论 #21950136 未加载
sytelusover 5 years ago
ummm... ever heard of bit locker?
zellyover 5 years ago
Ross Ulbricht needed this.
techaddict009over 5 years ago
@OP sorry for lame question:<p>Does the dis connection of USB formats the laptop or just shuts it down?
tingletechover 5 years ago
reminds me of a tragic death the other day where someone in a Starbucks was killed getting flung off a car while he was trying to save his laptop from robbers who grabbed his computer.
评论 #21951978 未加载
评论 #21950313 未加载
jonnycomputerover 5 years ago
There was a story not long ago about an old man who rigged up his front door to trigger a gun of some sort on unexpected entry, and ended up getting killed by it.<p>This really just sounds like a way to inadvertently brick your computer 999 times out of 1000. Seems like something to secure it to your person would be mostly adequate.
评论 #21937094 未加载