
Techlore's Video review of the BusKill Laptop Kill Cord -- a Dead Man Switch to protect the privacy of your data from thieves

This is the netsec Community, a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise - to provide value to security practitioners, students, researchers, and hackers everywhere.
Content Guidelines:
Discussion Guidelines:
Prohibited Content:
Why OAuth MUST share access token with 3rd party?!?
Why does Stripe require OAuth tokens to pass through a third party server?
Can someone who understands OAuth better than me explain to me why Stripe REQUIRES that their OAuth Access Keys get shared with a third party?
I've tried RTFM, but my biggest hangup is that the OAuth docs appear describe a very different situation than mine. They usually describe a user agent (web browser) as the client. And they talk about "your users" as if I have a bunch of users that I'm going to be fetching access keys for.
Nah, this is server <--> server. I have a server. Stripe has a server. I am one user. All I need is ONE API key for ONE account. But I'm forced to use OAuth. It doesn't seem appropriate, and it's especially concerning that the "flow" requires the (non-expiring!) Access Token to be shared with a third party server. Why?!?
I recently learned that Stripe has been pushing OAuth (branded as "Stripe Connect") to its integration apps as the "more secure" solution, compared to Restricted API
Techlore video review of BusKill (Open-Source Dead Man Switch) 🔒
Techlore's Video review of the BusKill Laptop Kill Cord -- a Dead Man Switch to protect the privacy of your data from thieves
We're very happy to share Techlore's video review of the BusKill Kill Cord.
![]() |
---|
Can't see video above? Watch it on PeerTube at neat.tube or on YouTube at youtu.be/Zns0xObbOPM |
Disclaimer: We gave Techlore a free BusKill Kit for review; we did not pay them nor restrict their impartiality and freedom to publish an independent review. For more information, please see Techlore's Review Unit Protocols policy. We did require them to make the video open-source as a condition of receiving this free review unit. The above video is licensed CC BY-SA; you are free to
BusKill (Dead Man Switch) Warrant Canary for 2025 H1
This post contains the cryptographically-signed BusKill warrant canary #007 for January 2025 to June 2025.
This post contains a canary message that's cryptographically signed by the official BusKill PGP release key
![]() |
---|
The BusKill project just published their Warrant Canary #009 |
For more information about BusKill canaries, see:
undefined
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Status: All good Release: 2025-01-14 Period: 2025-01-01 to 2025-06-01 Expiry: 2025-06-30 Statements ========== The BusKill Team who have digitally signed this file [1] state the following: 1. The date of issue of this canary is January 14, 2025. 2. The current BusKill Signing Key (2020.07) is E0AF FF57 DC00 FBE0 5635 8761 4AE2 1E19 36CE 786A 3.
Birth of the Unhackable Quantum Internet
Click to view this content.
BusKill (Open-Source Hardware Dead Man Switch) Announces Bitcoin Black Friday Deal
Bitcoin Black Friday Sale: 10% off all BusKill Hardware Dead Man Switches paid with cryptocurrencies. Expires Dec 03!
In celebration of Bitcoin Black Friday 2023, we're offering a 10% discount on all BusKill cables sold between Nov 18 to Dec 03.
![]() |
---|
BusKill Bitcoin Black Friday Sale - Our Dead Man Switch Magnetic USB Breakaway cables are 10% off all orders paid with cryptocurrency |
BusKill is a laptop kill-cord. It's a USB cable with a magnetic breakaway that you attach to your body and connect to your computer.
| [
Disarm Shortcut for BusKill Hardware Dead Man Switch
Keyboard shortcuts in QubesOS to arm & disarm (pause) the BusKill laptop kill cord -- so you can go to the bathroom without your laptop self-destruct triggering
This article describes how to setup keyboard shortcuts in QubesOS so that you can temporarily disarm (pause) the BusKill laptop kill cord.
This allows the user to, for example, go to the bathroom without causing their computer to shutdown or self-destruct.
This is a guide that builds on part one: A Laptop Kill Cord for QubesOS (1/2). Before reading this, you should already be familiar with how to setup udev rules for BusKill on QubesOS.
ⓘ Note: This post is adapted from its original article on Tom Hockers blog.
What if someone literally steals your laptop while youre working with classified information insi
Malicious NPM packages attributed to North Korean state actors
In June 2023, Phylum was the first to unearth a series of suspicious npm publications belonging to what appeared to be a highly targeted attack. The identified packages, published in pairs, required installation in a specific sequence, subsequently retrieving a token that facilitated the download of...
PSA: Upgrade your LUKS PBKDF to Argon2id !!
TIL the French government may have broken encryption on a LUKS-encrypted laptop with a "greater than 20 character" password in April 2023.
When upgrading TAILS today, I saw their announcement changing LUKS from PBKDF2 to Argon2id.
The release announcement above has some interesting back-of-the-envelope calculations for the wall-time required to crack a master key from a LUKS keyslot with PBKDF2 vs Argon2id.
And they also link to Matthew Garrett's article, which describes how to manually upgrade your (non-TAILS) LUKS header to Argon2id.
Exploiting CVE-2023-33476 for remote code execution
second part in a two-part series going over heap overflow in MiniDLNA (CVE-2023-33476). this post provides a walkthrough of steps taken to write an exploit for this vulnerability in order to achieve remote code execution and pop a shell.
FortiNAC is a zero-trust access solution that oversees and protects all digital assets connected to the enterprise network, covering devices from IT, IoT, OT/ICS to IoMT. – https://www.fortinet.com/products/network-access-control
Stripe API Key: $70k Stolen from CCs via merchant to debit card "Instant Payments"
Hear how my Stripe account was hacked, how Stripe responded, what I did in the aftermath and what to do if this happens to you.
From the moment I began my freelance web design business back in 2014, I was collecting payments via Stripe and happily paying their processing fees for the ability to grow my business from just a desire for more freedom to running a company that employs women and supports them to create their own freedom and financial independence.
It never occurred to me that using Stripe to process payments would become one of the biggest risks to my small business.
My Stripe account was hacked due to Stripe’s lax security, over $70,000 of fraudulent charges were processed by the hacker through a fake connected account, paid out instantly to that person via Stripe’s Instant Payments to the hacker’s pre-paid debit card, and Stripe started pulling the money out of my business bank account to pay back the victims of the theft.
And Stripe says it’s my fault that my account was hacked and that I’m liable to pay back the victims of the fraud.
Listen to the full podcast episode or read on to find out e
Screwdriver 🪛 is enough to get over Lenovo's Bios password (older model)
Once into the BIOS via this screwdriver hack, it is a cinch to reset or disable the password requirement.
Well as always... physical access to a device is a security nightmare.