Featured Updates

BusKill is finally here
LUKS Header Shredder (BusKill Self-Destruct Trigger)
BusKill Demos (Windows, MacOS, Linux, TAILS, QubesOS)
previous arrow
next arrow

BusKill Demos (Windows, MacOS, Linux, TAILS, QubesOS)

BusKill Demo #2

Transparency is important. As we launch our crowdfunding campaign (making the BusKill cable available for purchase for the first time), we wanted to provide a clear video demo showing the cable in-use in all tested platforms:

Full Video Demo

Watch the below video to see a demonstration of BusKill running on all of the above-listed systems.

Windows

BusKill was tested to work in Windows 10.


Visit docs.buskill.in for instructions on how you can build your own BusKill cable and download the BusKill app for Windows.

Or you can buy a BusKill kit with the BusKill Windows app pre-installed on the the included USB drive.

MacOS

BusKill was tested to work in MacOS 10.15 (Catalina).


Visit docs.buskill.in for instructions on how you can build your own BusKill cable and download the MacOS .dmg release.

Or you can buy a BusKill kit with the BusKill MacOS app pre-installed on the the included USB drive.

Linux

BusKill was tested to work in Ubuntu Linux.


Visit docs.buskill.in for instructions on how you can build your own BusKill cable and download the Linux .AppImage release.

Or you can buy a BusKill kit with the BusKill Linux app pre-installed on the the included USB drive.

TAILS

BusKill was tested to work with TAILS (The Amnesic Incognito Live System).


While you could use the BusKill Linux .AppImage release with a second USB drive while using TAILS, the recommended solution for security-critical users is to just use the BusKill cable in-line with the TAILS live USB drive. This takes advantage of

  1. The BusKill cable's magnetic breakaway along with
  2. The TAILS built-in emergency shutdown

Visit docs.buskill.in for instructions on how you can build your own BusKill cable to use with TAILS.

Or you can buy a BusKill cable to support the BusKill project.

QubesOS

BusKill was also tested to work with QubesOS.


Due to the design of QubesOS (dom0, sys-usb, etc), the BusKill GUI app does not support QubesOS. Instead, QubesOS support is implemented using the qubes-rpc and a set of scripts stored in sys-usb and dom0.

For more information on how to use BusKill in QubesOS, see our BusKill guide for QubesOS.

Visit docs.buskill.in for instructions on how you can build your own BusKill cable to use with QubesOS.

Or you can buy a BusKill cable to support the BusKill project.

Quicker Emergency Shutdown for TAILS

Are you a security researcher, journalist, or intelligence operative that works in TAILS--exploiting TAILS' brilliant incognito & amnesic design that forces all of your network traffic through the Tor anonymity network? Great! This post is for you.

TAILS Logo
TAILS: The most secure OS available

TAILS is amnesic; it's designed to leave no trace of the fact that it was used on your laptop. But what if someone literally steals your laptop while you're working with classified information in TAILS? Not only will they get access to all of the tabs open in your Tor Browser (gaining access to your accounts for any sites you're currently logged into, gaining the ability to impersonate and send messages as you, etc), but they'd also be able to access the contents of your decrypted persistent drive!

Let's say you're a journalist, activist, whistleblower or a human rights worker in an oppressive regime. Or an intelligence operative behind enemy lines doing research or preparing a top-secret document behind a locked door. What do you do to protect your data, sources, or assets when the secret police suddenly batter down your door? How quickly can you actually act to shutdown your laptop and shred your RAM and/or persistent volume?

What if you had a magnetic trip-wire tied from your body to your laptop such that it would trigger the TAILS emergency shutdown if the cable got disconnected by you jumping to your feet or falling off your chair at the sudden bang of your front door being reduced to splinters?


Using a BusKill cable with your TAILS drive can help shave off those precious seconds needed to trigger an emergency shutdown that will help keep you, your data, and your contacts safe.

Continue reading

BusKill Onion Service

Today, we're happpy to announce that there’s a new way to browse our website more securely and anonymously. To do it, you’ll need a bit of software called the Tor Browser

After the Tor Browser is installed, copy and paste this URL into the address bar to load this website:

buskillvampfih2iucxhit3qp36i2zzql3u6pmkeafvlxs3tlmot5yad.onion


buskillvamp fih2iucxhit
3qp36i2zzql 3u6pmkeafvl
xs3tlmot5ya     d.onion

Besides the obvious anonymity benefits--allowing our customers to purchase our products anonymously--we chose to make our website accessible at the above .onion address to take advantage of tor's superior Public Key Infrastructure to the clearnet's flawed x509 model (read: it's more secure).

Visit this site now on our tor .onion address

Instead of using the untrustworthy X.509 PKI model, all connections to a v3 .onion address is made to a single pinned certificate that is directly correlated to the domain itself (the domain is just a hash of the public key + some metadata). Moreover, some of the most secure operating systems send all the user's Internet traffic through the Tor network -- for the ultimate data security & privacy of its users.

In short, users are much safer when communicating directly to a website using a .onion domain than its clearnet domain.

We've always made sure that our site's content was fully accessible to Tor Browser on strict mode. Unlike other popular websites, we would never use Google reCAPTCHA or blanket block Tor exit nodes.

We want and encourage our customers to be able to use all of our services over Tor. And by adding our service over an Onion Service, our customers with a healthy distrust for the X.509 PKI can take comfort in knowing that accessing our website through our Onion Service address will give them end-to-end encryption using our Tor-generated certificate.

You can buy a BusKill cable with bitcoin, monero, and other altcoins directly from our BusKill Store's Onion Site:

You can also buy a BusKill cable with bitcoin, monero, and other altcoins directly from our Clearnet BusKill Store:

Scroll to top