Menu
Home
Forums
Visual works
New media
New comments
Search media
Downloads
Info & rules
Site rules
Server list
Sanctuary Discord
Sanctuary FAQ
Sanctuary's origins
Staffing policies
Sanctuary YouTube
Members
Registered members
Current visitors
Banned members
User verification codes
Log in
Register
What's new
Search
Search
Search titles only
By:
Menu
Log in
Register
Welcome to the edge of the civilized internet! All our official content can be found
here.
If you have any questions, try our FAQ
here
or see our video on
why this site exists at all!
Home
Forums
Main Sub-Forums
Technophiliacs & Technophiles
Bus Kill
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
Reply to thread
Message
<p>[QUOTE="JamesTaiclet, post: 14077, member: 278"]</p><p>Hello,</p><p></p><p>I am not sure how windows exposes the battery status in winapi but the former idea sounds doable, and uses hardware that would not be suspicious in any manner. No need for plausibly deniable hardware. I am also unsure of how to access winapi calls through python, generally c++ is more up to the task. Might require a full re-write of the code base at that stage, although this is not a particularly sophisticated application by any means.</p><p></p><p>The ladder idea could be absolutely excellent, they actually have an exposed set of triggers for you to create custom actions. You could even host your own server without exposing the end point for remote wiping via Tor. Tor hidden services can easily be run behind realistically any network, so the server location could be obscured and even be run out of a small home network (possibly not even yours). I could especially see this being used to great advantage in toughbooks that have integrated sim card modems, applications can still reach the internet even when the computer is sleeping (excluding hibernation). Triggering the panic condition could start the web interface to regularly query the computer for location information, access to the camera, listening into the microphone, ect to track, identify & monitor the actor.</p><p></p><p>Smart actors (state actors in particular) will probably open the device up in an airgap. To prevent data recovery it might be best to pair it with a veracrypt hidden partition system. Thus, the computer could be unlocked to a plausibly deniable device, with the real operating system being obscured entirely. Pair this with a secondary encryption system for files to increase the entropy (state actors have access to powerful FPGA driven hardware for encrypted volume cracking), and you would be golden.</p><p></p><p>Yours,</p><p>James Taiclet</p><p>[/QUOTE]</p>
[QUOTE="JamesTaiclet, post: 14077, member: 278"] Hello, I am not sure how windows exposes the battery status in winapi but the former idea sounds doable, and uses hardware that would not be suspicious in any manner. No need for plausibly deniable hardware. I am also unsure of how to access winapi calls through python, generally c++ is more up to the task. Might require a full re-write of the code base at that stage, although this is not a particularly sophisticated application by any means. The ladder idea could be absolutely excellent, they actually have an exposed set of triggers for you to create custom actions. You could even host your own server without exposing the end point for remote wiping via Tor. Tor hidden services can easily be run behind realistically any network, so the server location could be obscured and even be run out of a small home network (possibly not even yours). I could especially see this being used to great advantage in toughbooks that have integrated sim card modems, applications can still reach the internet even when the computer is sleeping (excluding hibernation). Triggering the panic condition could start the web interface to regularly query the computer for location information, access to the camera, listening into the microphone, ect to track, identify & monitor the actor. Smart actors (state actors in particular) will probably open the device up in an airgap. To prevent data recovery it might be best to pair it with a veracrypt hidden partition system. Thus, the computer could be unlocked to a plausibly deniable device, with the real operating system being obscured entirely. Pair this with a secondary encryption system for files to increase the entropy (state actors have access to powerful FPGA driven hardware for encrypted volume cracking), and you would be golden. Yours, James Taiclet [/QUOTE]
Insert quotes…
Preview
Name
Verification
What is the first letter of the site name?
Post reply
Home
Forums
Main Sub-Forums
Technophiliacs & Technophiles
Bus Kill
Top