TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A dead man's switch for your computer?

129 pointsby mvipover 10 years ago

22 comments

ryan-cover 10 years ago
Reminds me of Jacob Applebaum&#x27;s udev rules for mouse jigglers: <a href="https://github.com/ioerror/udev_antiforensics" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ioerror&#x2F;udev_antiforensics</a>
评论 #8934227 未加载
katorover 10 years ago
I built a program that automatically locks my OSX machine when I get far enough away from it. It uses iBeacon ranging and I have the beacon in my pocket. Debated on sharing with others but I never managed to clean it up enough to be proud of sharing it.
评论 #8932930 未加载
评论 #8933103 未加载
评论 #8933997 未加载
评论 #8933613 未加载
评论 #8934499 未加载
falcolasover 10 years ago
Tails, a &quot;Live CD&quot; operating system which relies on Tor for all communication, does something like this at the OS level: If the media you are running Tails from is removed, the OS immediately writes over itself in RAM and shuts the system down.<p>Still capable of being worked around, but looking into that may help identify how to best implement a dead man&#x27;s switch.
wongmover 10 years ago
To me a simple &#x27;device proximity&#x27; check described in the article would not work if an adversary forced you to remain near the computer.<p>A &#x27;vigilance control&#x27; device would work as intended in these cases - a message is issued to the user (possibly via covert means), and failure to respond locks the device:<p><a href="http://en.wikipedia.org/wiki/Dead_man%27s_switch#Vigilance_control" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;Dead_man%27s_switch#Vigilance_c...</a>
vezzy-fnordover 10 years ago
Dual Core (nerdcore rapper) wrote a bunch of anti-forensics scripts a couple of years ago, some quite kooky, which he presented at DerbyCon. Talk is worth watching [1], and the code [2].<p>[1] <a href="https://www.youtube.com/watch?v=i3nLrJrkYOc" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=i3nLrJrkYOc</a><p>[2] <a href="https://github.com/int0x80/anti-forensics" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;int0x80&#x2F;anti-forensics</a>
robotkillaover 10 years ago
A bit different but I&#x27;ve considered releasing all of the stuff i own, certain accounts etc. into the public (or into the hands of some trustee) after i die + some specific period of time. I would need to automate everything i have and that task is daunting for something I wouldn&#x27;t even get to enjoy.
fskover 10 years ago
It&#x27;s kind of pointless. If the police have already identified you as a target, there are too many other tactics they can use. For example, they could just set up a hidden camera that records you when you are using your PC.
评论 #8933970 未加载
sarciszewskiover 10 years ago
It turns out that this has already been made before.<p><a href="https://github.com/defuse/swatd" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;defuse&#x2F;swatd</a>
评论 #8933567 未加载
Retraover 10 years ago
I was thinking of a voice-activated command that locks the UI while it nukes everything. But while this is happening, it keeps a safe image of the desktop up with basic mouse functionality, so the user doesn&#x27;t know it is doing anything for a little while.<p>Of course, I have no use for such a thing, so I would never waste my time implementing it...
mayoffover 10 years ago
I thought about this too when I read about how the FBI seized Ulbricht&#x27;s laptop. I decided that a simple string isn&#x27;t sufficient. You want the loop to be either a conductor or fiber optic, so that the system can detect when the cord is cut (not just when a USB device is pulled out).
评论 #8933042 未加载
derekp7over 10 years ago
I like the idea of having a separate decryption device. OS reads encrypted data from hard disk, sends it over an encrypted link to your cell phone, which partially decrypts the data block (using one pass phrase), and sends it back over the encrypted link to the laptop. OS driver then finishes decrypting that block using a second key before passing it to your program. Writing back data just requires a public key, so write operations don&#x27;t have to go to your cell phone. The idea is that your drive would never be fully unlocked, and the computer wouldn&#x27;t ever have the full decryption key on it (neither would your phone).<p>Add in the always-on voice recognition that some Android phones have, and have the key wipe itself as soon as it hears &quot;Freeze... FBI&quot;.
评论 #8934455 未加载
thaumaturgyover 10 years ago
What you want is an RFID keyfob&#x2F;detector. There used to be a writeup on a homebrew version of this at <a href="http://hackaday.com/2013/09/07/hidden-rfid-reader-locks-workstation-unless-keys-are-present/" rel="nofollow">http:&#x2F;&#x2F;hackaday.com&#x2F;2013&#x2F;09&#x2F;07&#x2F;hidden-rfid-reader-locks-work...</a> -- but the link that article references is rotten now. A sufficiently motivated person should be able to dig up instructions somewhere.<p>A few years ago there were companies that did this for most operating systems, and fairly inexpensively too, but I&#x27;m having trouble finding them now.
评论 #8944349 未加载
评论 #8934005 未加载
mixologicover 10 years ago
This might work once, for somebody. Then law enforcement would understand what it is for, what it does, and cut the lanyard&#x2F;string instead of removing the usb stick before apprehending the device.
评论 #8933423 未加载
ipsinover 10 years ago
Independent of, and in addition to, other locking schemes, how about an active process that monitors for either high acceleration (the laptop being moved) or noise above a certain threshhold?
评论 #8933796 未加载
评论 #8933305 未加载
brudgersover 10 years ago
While a dead man failsafe is a good idea - facial recognition would be my preference for situations like that described in court, the bigger issue is compartmentalization. Whole disk encryption sounds good, but the flip side is whole disk decryption and that doesn&#x27;t sound so good and didn&#x27;t work out well when it mattered.<p>Based on the testimony everything was encoded from the same one time pad so to speak. That kinda&#x27; misses the point of one time pads.<p>Anyway enough thinking like a criminal or a spy for one day.
tomphooleryover 10 years ago
&gt; If the the computer loses connection to the device, it auto-locks.<p>If there are any Apple product developers listening, I&#x27;ll <i>definitely</i> buy the next iPhone if part of its feature set is that as long as the phone is on and in my pocket, I never have to type in a password to unlock my computer(s). It would be even better if that feature was extended to developers so any developer could use the fact that my phone is in close proximity to my computer as grounds for successful authentication.
评论 #8933533 未加载
avinasshover 10 years ago
I remember reading about that if HDD can be put in a magnetic field, it will be destroyed. If my door&#x2F;passage can be set to generate magnetic field enough to destroy HDD, then as soon as authorities take out the computer out of your home, the HDD will be destroyed.<p>But I have no idea how practical is this.
评论 #8934176 未加载
评论 #8934382 未加载
评论 #8935037 未加载
评论 #8934167 未加载
评论 #8934146 未加载
评论 #8934823 未加载
评论 #8937374 未加载
rndmizeover 10 years ago
I believe there was a post just yesterday for a piece of software that would lock and unlock your machine based on proximity to your phone through bluetooth.<p>Found it: <a href="https://news.ycombinator.com/item?id=8917992" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=8917992</a>
评论 #8932817 未加载
Jekyllover 10 years ago
I don&#x27;t know if I&#x27;m missing something here... but what&#x27;s wrong with running your laptop directly off the mains without a battery and unplugging the cord if necessary so the computer shuts down?
评论 #8936904 未加载
评论 #8935946 未加载
fit2ruleover 10 years ago
Everyone has their own unique heartbeat signature. What we need is a way to hear that heartbeat, and if its not the right signature: erase&#x2F;destroy&#x2F;etc.
评论 #8935081 未加载
jamies888888over 10 years ago
This would be a better concept if it just used your mobile phone proximity over Bluetooth.
lurkinggrueover 10 years ago
Get into the habit of locking your computer the moment you move away from it?