cryptsetup
usbkill
cryptsetup | usbkill | |
---|---|---|
55 | 11 | |
- | 4,347 | |
- | - | |
- | 0.0 | |
- | 2 months ago | |
Python | ||
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
cryptsetup
-
The Linux Process Journey — “dmcrypt_write”
Overall, “dm-crypt” is a device-mapper target (https://elixir.bootlin.com/linux/v6.5-rc3/source/drivers/md/dm-crypt.c#L3689) supported from kernel version 2.6.4 (https://elixir.bootlin.com/linux/v2.6.4/source/drivers/md/dm-crypt.c). It is responsible for transparent (aka real-time/on-the-fly encryption) block device encryption while using the kernel crypto API (https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt) .
-
Most secure and private (trace resistant) messaging app in market?
For more information check section 5.21 Why is there no "Nuke-Option"? of LUKS FAQ.
-
Is it possible to make my linux system automatically wipe everything if someone enters a wrong password twice
Please read the section 5.21 Why is there no "Nuke-Option"? of the LUKS FAQ for more information (eg. when a "wipe" option could actually harm you).
-
Federal Judge Makes History in Holding That Border Searches of Cell Phones Require a Warrant
Check out the section 5.2 and 5.18 of the LUKS FAQ for more information.
-
Custom Encryption
See section 5.2 of LUKS FAQ and Key disclosure law all over the world.
- Encryption of boot issue in the process: failed at update-grub
- Cannot create dm-integrity block device
- LuKs cryptsetup and sha256
-
Can I only partially clone a LUKS encrypted drive?
References: - Frequently Asked Questions Cryptsetup/LUKS - Question 2.15: "neither dm-crypt nor LUKS1 stores partition size and LUKS2 uses a generic "whole device" size as default." - Stackexchange: What does cryptsetup resize do if LUKS doesn't store partition size?
-
Is it possible to create a directory that is automatically encrypted at rest?
LUKS is probably what you want
usbkill
-
Keyboard shortcut to unlink device & delete all data
You're right. Maybe usbkill or buskill make more sense if you are at that position.
-
That is why utilizing Tails OS (and Whonix OS) in a combination with automated data self-destruction is always worthwhile…
This tool or similar one, should be the trigger of self destruction of data… • github.com/hephaest0s/usbkill
- KillUSB
- USBKill, an anti-forensic kill-switch for *nix systems
- Forensic Analysis of USB tripwire that shreds your LUKS Header
- BusKill: A USB dead-man-switch triggered if someone physically yanks your laptop away
- BusKill Laptop Kill Cord: Useful OpSec for OTC crypto trades
-
BusKill – USB dead-man-switch triggered if someone yanks your laptop away
https://github.com/hephaest0s/usbkill
This does the same thing, but you can use any USB hardware as the entry/remove trigger. And you can script it to whatever you want.
But... that doesn't sell unneeded hardware.
- Usbkill – an anti-forensic kill-switch
What are some alternatives?
sedutil - DTA sedutil Self encrypting drive software
Crypto-OpSec-SelfGuard-RoadMap - Here we collect and discuss the best DeFi, Blockchain and crypto-related OpSec researches and data terminals - contributions are welcome.
LUKS2-docs
buskill-app - BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord
luks.go - Pure Golang library to manage LUKS partitions
logic-bomb - Linux kernel module which powers off the computer on certain text from keyboard
go-cryptsetup - Go bindings for libcryptsetup.
checkmk - Checkmk - Best-in-class infrastructure & application monitoring
edgewalker - A DIY VPN setup script based on OpenBSD, OpenIKEd, Wireguard and Let's Encrypt
deadman - A usb-based dead man's switch
sbctl - :computer: :lock: :key: Secure Boot key manager
toolbox-images - deprecated