You can find the article here: * https://www.buskill.in/qubes-os/
Sorry, I'd omitted the URL as I think the first post was caught in a spam filter. On Thursday, January 6, 2022 at 12:35:36 PM UTC+1 Michael Altfield wrote: > Hello, I had a lot of Qubes users ask me about this, so I thought I'd > share with the community via the mailing list. > > I just published a guide on how to use a kill cable (USB magnetic > breakaway) on QubesOS. The article describes how to setup scripts in dom0 > and sys-usb such that when the cable's connection is severed (eg if an > adversary physically snatches your laptop away from you while you're > working), then a user-configurable script is executed. > > In this guide, I provide scripts (all GPL) for: > > 1. locking the screen, > 2. doing a soft shutdown, > 3. doing a hard reboot, and > 4. executing a "self-destruct" trigger that wipes the LUKS Header, such > that the entire QubesOS root FDE volume is indistinguishable from random > data – protecting its LUKS-encrypted data even from rubber-hose > cryptanalysis (read: giving-up your boot password under torture won't be > able to decrypt the data after this script runs). > > It works with any USB cable, but I think it's helpful to have one with a > magnetic breakaway. > > > Hope this helps, > > Michael Altfield > PGP Fingerprint: 0465 E42F 7120 6785 E972 644C FE1B 8449 4E64 0D41 -- You received this message because you are subscribed to the Google Groups "qubes-users" group. To unsubscribe from this group and stop receiving emails from it, send an email to qubes-users+unsubscr...@googlegroups.com. To view this discussion on the web visit https://groups.google.com/d/msgid/qubes-users/bfaaf34c-2438-4b8e-a9fb-543a2f5b973an%40googlegroups.com.