Featured Updates

BusKill v0.7.0 released
BusKill available in-store (Leipzig ProxySto.re)
BusKill Demos (Windows, MacOS, Linux, TAILS, QubesOS)
Disarm BusKill in QubesOS
BusKill Now Shipping!
previous arrow
next arrow

Quicker Emergency Shutdown for TAILS

Are you a security researcher, journalist, or intelligence operative that works in TAILS–exploiting TAILS’ brilliant incognito & amnesic design that forces all of your network traffic through the Tor anonymity network? Great! This post is for you.

TAILS Logo
TAILS: The most secure OS available

TAILS is amnesic; it’s designed to leave no trace of the fact that it was used on your laptop. But what if someone literally steals your laptop while you’re working with classified information in TAILS? Not only will they get access to all of the tabs open in your Tor Browser (gaining access to your accounts for any sites you’re currently logged into, gaining the ability to impersonate and send messages as you, etc), but they’d also be able to access the contents of your decrypted persistent drive!

Let’s say you’re a journalist, activist, whistleblower or a human rights worker in an oppressive regime. Or an intelligence operative behind enemy lines doing research or preparing a top-secret document behind a locked door. What do you do to protect your data, sources, or assets when the secret police suddenly batter down your door? How quickly can you actually act to shutdown your laptop and shred your RAM and/or persistent volume?

What if you had a magnetic trip-wire tied from your body to your laptop such that it would trigger the TAILS emergency shutdown if the cable got disconnected by you jumping to your feet or falling off your chair at the sudden bang of your front door being reduced to splinters?


Using a BusKill cable with your TAILS drive can help shave off those precious seconds needed to trigger an emergency shutdown that will help keep you, your data, and your contacts safe.

Continue reading

A Laptop Kill Cord for QubesOS

This post will describe how to use BusKill as a dead man switch to trigger your laptop to self-destruct if it’s physically separated from you. This guide is specific to QubesOS users.

What if someone literally steals your laptop while you’re working with classified information inside a Whonix DispVM? They’d also be able to recover data from previous DispVMs–as Disposable VM’s rootfs virtual files are not securely shredded after your DispVM is destroyed.

QubesOS Logo
QubesOS: A reasonably secure OS

This is part one of a two-part series. For part two, see Disarm BusKill in QubesOS (2/2)

  1. A Laptop Kill Cord for QubesOS (1/2)
  2. Disarm BusKill in QubesOS (2/2)

Are you a security researcher, journalist, or intelligence operative that works in QubesOS–exploiting Qubes’ brilliant security-through-compartimentalization to keep your data safe? Do you make use of Whonix Disposable VMs for your work? Great! This post is for you.

I’m sure your QubesOS laptop has Full Disk Encryption and you’re using a strong passphrase. But what if someone literally steals your laptop while you’re working with classified information inside a Whonix DispVM? Not only will they get access to all of your AppVM’s private data and the currently-running Whonix DispVM’s data, but there’s a high chance they’d be able to recover data from previous DispVMs–as Disposable VM’s rootfs virtual files (volatile.img) are not securely shredded after your DispVM is destroyed by Qubes!

Let’s say you’re a journalist, activist, whistleblower, or a human rights worker in an oppressive regime. Or an intelligence operative behind enemy lines doing research or preparing a top-secret document behind a locked door. What do you do to protect your data, sources, or assets when the secret police suddenly batter down your door? How quickly can you actually act to shutdown your laptop and shred your RAM and/or FDE encryption keys?


BusKill utilizes a magnetic trip-wire that tethers your body to your laptop. If you suddenly jump to your feet or fall off your chair (in response to the battering ram crashing through your door) or your laptop is ripped off your table by a group of armed thugs, the data bus’ magnetic connection will be severed. This event causes a configurable trigger to execute.

The BusKill trigger can be anything from:

  1. locking your screen or
  2. shutting down the computer or
  3. initiating a self-destruct sequence

This post will describe how to setup such a system in QubesOS with BusKill

Continue reading

LUKS Header Shredder (BusKill Self-Destruct Trigger)

This post will describe how to add a trigger that initiates a “self-destruct” sequence when your BusKill laptop kill cord’s connection is severed–rendering your data permanently & irrevocably destroyed in the event that your laptop were physically separated from you (ie: by a snach-and-run thief).

LUKS Header Shredder

Many people were disappointed when the original post introducing BusKill only alluded to a self-destruct trigger, without actually describing how to use it with BusKill. This was done for two reasons:

  1. Most people probably don’t actually want an accidental false-positive to destroy all their data and
     
  2. A self-destruct sequence should be taken seriously. Its implementation should be thoroughly thought-out, tested, and forensically analyzed

This article will provide that thorough analysis and explain to the reader how to implement a self-destruct trigger with BusKill on linux machines that have FDE with LUKS.

Continue reading

BusKill Onion Service

Today, we’re happpy to announce that there’s a new way to browse our website more securely and anonymously. To do it, you’ll need a bit of software called the Tor Browser

After the Tor Browser is installed, copy and paste this URL into the address bar to load this website:

buskillvampfih2iucxhit3qp36i2zzql3u6pmkeafvlxs3tlmot5yad.onion


buskillvamp fih2iucxhit
3qp36i2zzql 3u6pmkeafvl
xs3tlmot5ya     d.onion

Besides the obvious anonymity benefits–allowing our customers to purchase our products anonymously–we chose to make our website accessible at the above .onion address to take advantage of tor’s superior Public Key Infrastructure to the clearnet’s flawed x509 model (read: it’s more secure).

Visit this site now on our tor .onion address

Instead of using the untrustworthy X.509 PKI model, all connections to a v3 .onion address is made to a single pinned certificate that is directly correlated to the domain itself (the domain is just a hash of the public key + some metadata). Moreover, some of the most secure operating systems send all the user’s Internet traffic through the Tor network — for the ultimate data security & privacy of its users.

In short, users are much safer when communicating directly to a website using a .onion domain than its clearnet domain.

We’ve always made sure that our site’s content was fully accessible to Tor Browser on strict mode. Unlike other popular websites, we would never use Google reCAPTCHA or blanket block Tor exit nodes.

We want and encourage our customers to be able to use all of our services over Tor. And by adding our service over an Onion Service, our customers with a healthy distrust for the X.509 PKI can take comfort in knowing that accessing our website through our Onion Service address will give them end-to-end encryption using our Tor-generated certificate.

You can buy a BusKill cable with bitcoin, monero, and other altcoins directly from our BusKill Store’s Onion Site:

You can also buy a BusKill cable with bitcoin, monero, and other altcoins directly from our Clearnet BusKill Store:

BusKill is finally here

We’re very excited to announce that BusKill cables are now available for purchase via CrowdSupply!

BusKill Now Available on Crowd Supply

This week we launched the BusKill crowdfunding campaign on CrowdSupply.

The DIY guide to build a BusKill laptop kill cord was released last year. Designed to protect journalists, activists, travelers, and crypto traders — this USB Dead Man’s Switch can trigger your computer to lock if someone physically snatches your computer away from you while you’re using it.


You can buy a BusKill cable today from CrowdSupply:

You can also buy a BusKill cable with bitcoin, monero, and other altcoins directly from our BusKill Store:

Bitcoin Accepted Here

Monero Accepted Here

Introducing BusKill: A Kill Cord for your Laptop

This post will introduce a simple udev rule and ~$20 in USB hardware that effectively implements a kill cord Dead Man Switch to trigger your machine to self-destruct in the event that you’re kicked out of the helm position.

BusKill: A USB Kill Cord for you Laptop

ⓘ Note: This is an old article that is out-of-date.

To learn how to install BusKill, see our BusKill GUI App Documentation.

Photo of a Rubber Ducky USB drive
Rubber Ducky I <3 you; you make hack time lots of fun!

Let’s consider a scenario: You’re at a public location (let’s say a cafe) while necessarily authenticated into some super important service (let’s say online banking). But what if–after you’ve carefully authenticated–someone snatch-and-runs with your laptop?

Maybe you can call your bank to freeze your accounts before they’ve done significant financial harm. Maybe you can’t.

Or maybe your laptop was connected to your work VPN. In less than 60 seconds and with the help of a rubber ducky, the thief could literally cause millions of dollars in damages to your organization.

Surely there must be some solution to trigger your computer to lock, shutdown, or self-destruct when it’s physically separated from you! There is: I call it BusKill.

Continue reading

Scroll to top