Reminds me of Jacob Applebaum's udev rules for mouse jigglers: <a href="https://github.com/ioerror/udev_antiforensics" rel="nofollow">https://github.com/ioerror/udev_antiforensics</a>
I built a program that automatically locks my OSX machine when I get far enough away from it. It uses iBeacon ranging and I have the beacon in my pocket. Debated on sharing with others but I never managed to clean it up enough to be proud of sharing it.
Tails, a "Live CD" operating system which relies on Tor for all communication, does something like this at the OS level: If the media you are running Tails from is removed, the OS immediately writes over itself in RAM and shuts the system down.<p>Still capable of being worked around, but looking into that may help identify how to best implement a dead man's switch.
To me a simple 'device proximity' check described in the article would not work if an adversary forced you to remain near the computer.<p>A 'vigilance control' device would work as intended in these cases - a message is issued to the user (possibly via covert means), and failure to respond locks the device:<p><a href="http://en.wikipedia.org/wiki/Dead_man%27s_switch#Vigilance_control" rel="nofollow">http://en.wikipedia.org/wiki/Dead_man%27s_switch#Vigilance_c...</a>
Dual Core (nerdcore rapper) wrote a bunch of anti-forensics scripts a couple of years ago, some quite kooky, which he presented at DerbyCon. Talk is worth watching [1], and the code [2].<p>[1] <a href="https://www.youtube.com/watch?v=i3nLrJrkYOc" rel="nofollow">https://www.youtube.com/watch?v=i3nLrJrkYOc</a><p>[2] <a href="https://github.com/int0x80/anti-forensics" rel="nofollow">https://github.com/int0x80/anti-forensics</a>
A bit different but I've considered releasing all of the stuff i own, certain accounts etc. into the public (or into the hands of some trustee) after i die + some specific period of time. I would need to automate everything i have and that task is daunting for something I wouldn't even get to enjoy.
It's kind of pointless. If the police have already identified you as a target, there are too many other tactics they can use. For example, they could just set up a hidden camera that records you when you are using your PC.
It turns out that this has already been made before.<p><a href="https://github.com/defuse/swatd" rel="nofollow">https://github.com/defuse/swatd</a>
I was thinking of a voice-activated command that locks the UI while it nukes everything. But while this is happening, it keeps a safe image of the desktop up with basic mouse functionality, so the user doesn't know it is doing anything for a little while.<p>Of course, I have no use for such a thing, so I would never waste my time implementing it...
I thought about this too when I read about how the FBI seized Ulbricht's laptop. I decided that a simple string isn't sufficient. You want the loop to be either a conductor or fiber optic, so that the system can detect when the cord is cut (not just when a USB device is pulled out).
I like the idea of having a separate decryption device. OS reads encrypted data from hard disk, sends it over an encrypted link to your cell phone, which partially decrypts the data block (using one pass phrase), and sends it back over the encrypted link to the laptop. OS driver then finishes decrypting that block using a second key before passing it to your program. Writing back data just requires a public key, so write operations don't have to go to your cell phone. The idea is that your drive would never be fully unlocked, and the computer wouldn't ever have the full decryption key on it (neither would your phone).<p>Add in the always-on voice recognition that some Android phones have, and have the key wipe itself as soon as it hears "Freeze... FBI".
What you want is an RFID keyfob/detector. There used to be a writeup on a homebrew version of this at <a href="http://hackaday.com/2013/09/07/hidden-rfid-reader-locks-workstation-unless-keys-are-present/" rel="nofollow">http://hackaday.com/2013/09/07/hidden-rfid-reader-locks-work...</a> -- but the link that article references is rotten now. A sufficiently motivated person should be able to dig up instructions somewhere.<p>A few years ago there were companies that did this for most operating systems, and fairly inexpensively too, but I'm having trouble finding them now.
This might work once, for somebody. Then law enforcement would understand what it is for, what it does, and cut the lanyard/string instead of removing the usb stick before apprehending the device.
Independent of, and in addition to, other locking schemes, how about an active process that monitors for either high acceleration (the laptop being moved) or noise above a certain threshhold?
While a dead man failsafe is a good idea - facial recognition would be my preference for situations like that described in court, the bigger issue is compartmentalization. Whole disk encryption sounds good, but the flip side is whole disk decryption and that doesn't sound so good and didn't work out well when it mattered.<p>Based on the testimony everything was encoded from the same one time pad so to speak. That kinda' misses the point of one time pads.<p>Anyway enough thinking like a criminal or a spy for one day.
> If the the computer loses connection to the device, it auto-locks.<p>If there are any Apple product developers listening, I'll <i>definitely</i> buy the next iPhone if part of its feature set is that as long as the phone is on and in my pocket, I never have to type in a password to unlock my computer(s). It would be even better if that feature was extended to developers so any developer could use the fact that my phone is in close proximity to my computer as grounds for successful authentication.
I remember reading about that if HDD can be put in a magnetic field, it will be destroyed. If my door/passage can be set to generate magnetic field enough to destroy HDD, then as soon as authorities take out the computer out of your home, the HDD will be destroyed.<p>But I have no idea how practical is this.
I believe there was a post just yesterday for a piece of software that would lock and unlock your machine based on proximity to your phone through bluetooth.<p>Found it: <a href="https://news.ycombinator.com/item?id=8917992" rel="nofollow">https://news.ycombinator.com/item?id=8917992</a>
I don't know if I'm missing something here...
but what's wrong with running your laptop directly off the mains without a battery and unplugging the cord if necessary so the computer shuts down?
Everyone has their own unique heartbeat signature. What we need is a way to hear that heartbeat, and if its not the right signature: erase/destroy/etc.