Return Styles: Pseud0ch, Terminal, Valhalla, NES, Geocities, Blue Moon. Entire thread

software kill switch

Name: Anonymous 2009-03-05 12:32

I've encrypted my disk, but I need a way to prevent somebody from stealing the computer while the encryption key is in RAM.

Basically I need to write a program that writes zeroes to the memory and then cuts power to all devices. The problem is, I don't know exactly how to accomplish this.

Advice preferred in C++ or assembly, but anything would be helpful.

Name: Anonymous 2009-03-07 5:56

You can make your own thermite from powdered aluminum, iron oxide (rust), and some putty to hold it together. The tricky part is making the ignition system, you need a thin strip of magnesium and some way to fire that up.

Name: Anonymous 2009-03-08 12:03

heh 2's soulution would work
just run some endless loop that stores the values it outputs in a single variable you will need to make it real damn complex to fill the ENTIRE memory in a timely fashion.

alternatively you could find the memory address of the key and directly take it out

as for cutting power i dont have a clue

Name: Anonymous 2009-03-08 13:27

OH GOD HOW DOES I SMEM

Name: Anonymous 2009-03-08 13:32

I don't know enough about RAM to give an exact solution, but generally, what >>2 said. Either make a program that'd fill up your RAM or make a program that'd find the address and delete. If you're doing this to get away from FBI or something, it'll still leave traces of the program. If you want to be perfect, I suppose making it run from a bootable disk would be a pro, since the OS wouldn't interfere, but that makes things significantly harder. The main worry being virtual memory, but again, I'm not completely sure how that works.

Name: Anonymous 2009-03-08 14:44

Name: Anonymous 2009-03-10 9:08

protip: ram memory is lost seconds after power is cut
the only kill switch you need is your power button

Name: Anonymous 2009-03-10 14:08

>>7
http://citp.princeton.edu/pub/coldboot.pdf

Abstract Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisition of usable full-system memory images. We show that this phenomenon limits the ability of an operating system to protect cryptographic key material from an attacker with physical access. We use cold reboots to mount attacks on popular disk encryption systems — BitLocker, FileVault, dm-crypt, and TrueCrypt — using no special devices or materials. We experimentally characterize the extent and predictability of memory remanence and report that remanence times can be increased dramatically with simple techniques. We offer new algorithms for finding cryptographic keys in memory images and for correcting errors caused by bit decay. Though we discuss several strategies for partially mitigating these risks, we know of no simple remedy that would eliminate them.

Name: Anonymous 2009-03-14 1:03

Crazy idea: wouldn't memtest86 overwrite everything in ram more than a few times?

Name: Anonymous 2009-03-14 11:31

>>9
Yes, but it's faster to just turn the power off if you have more than 640K RAM. It comes down to a matter of have many seconds you have from the time the intruder is detected until they get physical access to the computer.

Name: Anonymous 2009-03-15 5:39

>>10

but 640k should be enough for anybody!

Name: pengo !8ZbUTJR0DE 2009-04-12 19:01

>>11
why oh yes.
my first board had exactly that amount of ram.
it had a ridiculous large hdd of 20 MB!
i even doublespaced the drive to the amazing amount of 36MB!
off course, then my favourite (and best) attack flight simulator  fitted on a 720KB disk. it was awesome, as you can imagine.

Name: Anonymous 2009-04-13 2:46

How much ram do you have? They only tested this on a stick of 512 MB ram, if you're running 2+GB its not really an issue. Takes a long fucking time to dump that much data.

Name: Anonymous 2009-04-13 7:08

>>13
err, no.

Name: Anonymous 2009-04-13 14:18

>>14
Err, no to which part? That they only used at the max 512mb sticks or it doesn't take a long time to dump 2gb of ram, given the time constraints you're under so you can get all the data without it being lost?

Name: Anonymous 2009-04-16 10:52

>>1
Pro-tip: If the feds come busting down your door, and find your computer wiped or destroyed, that will only add to your guilt later in court.

Besides, the feds will already have a good idea what you've been downloading before they come to your door, you pedo scum.

Name: replica Rolex GMT 2010-01-04 9:50

Name: Anonymous 2010-01-04 20:30

There really is no point to deleting the key. If you are worried about anyone with the skill or resources to take your ram out of your computer and recover data from it while it's still there, you should just set up something like 2 said.

Name: Anon 2010-01-05 1:55

LMAO @ user 15:L made me crack up:D

Name: Anon 2010-01-05 1:55

User 16*

Name: Anon 2010-01-05 1:56

LMAO @ user 15:L made me crack up:D

Name: replica Patek Philippe 2010-01-07 21:33

<A href="http://www.iwcwatches.us/">replica watch</A><BR><A href="http://www.iwcwatches.us">watches for sale</A><BR><A href="http://www.iwcwatches.us/Franck-Muller/">replica Franck Muller</A><BR><A href="http://www.iwcwatches.us/">replica watches</A><BR><A href="http://www.iwcwatches.us/Concord/">Concord watch for sale</A><BR><A href="http://www.iwcwatches.us/Rolex/Explorer/">Rolex Explorer watch for sale</A><BR><A href="http://www.iwcwatches.us/Maurice-Lacroix/">Maurice Lacroix replica</A><BR><A href="http://www.iwcwatches.us/Hublot/">Hublot replica</A><BR><A href="http://www.iwcwatches.us/Breitling/">Breitling watches</A><BR>

Name: Rado replica 2010-01-11 15:25

<A href="http://www.iwcwatches.us/Franck-Muller/">replica Franck Muller</A><BR><A href="http://www.iwcwatches.us/">cheap replica watches</A><BR><A href="http://www.iwcwatches.us">cheap fake watches</A><BR><A href="http://www.iwcwatches.us/Concord/">Concord watch for sale</A><BR><A href="http://www.iwcwatches.us/Rolex/Air%20King/">Rolex Air-King replica</A><BR><A href="http://www.iwcwatches.us/Montblanc/">Montblanc replica</A><BR><A href="http://www.iwcwatches.us/Glashutte/">Glashutte replica</A><BR><A href="http://www.iwcwatches.us/DeWitt/">DeWitt watches</A><BR><A href="http://www.iwcwatches.us/Rado/">replica Rado</A><BR><A href="http://www.iwcwatches.us/Vacheron-Constantin/">replica Vacheron Constantin</A><BR><A href="http://www.iwcwatches.us/Jaquet-droz/">Jaquet droz watches</A><BR><A href="http://www.iwcwatches.us/Ebel/">ebel watches</A><BR>

Name: watches replica 2010-01-12 9:12

<A href="http://www.dearwatches.com/">replica watch</A><BR><A href="http://www.dearwatches.com/">cheap replica watches</A><BR><A href="http://www.dearwatches.com/patek-philippe-c-54.html">Patek Philippe watches</A><BR><A href="http://www.dearwatches.com/cartier-c-22.html">replica Cartier watches</A><BR><A href="http://www.dearwatches.com/vacheron-constantin-c-67.html">Vacheron Constantin replica</A><BR><A href="http://www.dearwatches.com/bvlgari-c-21.html">replica Bvlgari watches</A><BR><A href="http://www.dearwatches.com/tiffany-jewelry-tiffany-rings-c-77_81.html">replica Tiffany Rings watches</A><BR><A href="http://replicawatcheshome.org">watches replicas</A><BR>

Newer Posts
Don't change these.
Name: Email:
Entire Thread Thread List