Home Linux Buskill: Ultimately Linux's maximum security lies in a simple USB cable.


Buskill: Ultimately Linux's maximum security lies in a simple USB cable.

by ace
Buskill USB Linux segurança física

Although security is a growing theme, many only look at the effects of internet security. There are many other areas where it has to be applied, especially in the physical safety of equipment.

This truth is universal, but few see it as necessary, at least until they are robbed. It was to avoid these situations that Buskill emerged. This USB cable handles all physical security on Linux without major complications.

Buskill, Maximum Security on Linux

This is a novelty that has now been introduced and is the result of the genius of a simple software engineer. We usually invest a lot to be protected when we are out of our environment. We talk about VPNS, secure networks and even 2-factor authentication processes.

Of course none of this will do if someone passes by and simply steals the laptop and runs away. In such cases all these secure doors are harmful as they simply let any attacker enter and steal the data.

Everything is in one simple USB cable

Then comes Buskill, a magnetic device that is plugged into any USB port. If this is interrupted then security enters the field and can act in many ways. Its creator provides 3 scripts to enable screensaver, format the machine or simply delete important folders.

While indicating that you do not want to sell Buskill, its creator gives everyone the possibility to create yours. For only $ 20 or $ 45, you can create these devices. Just one USB stick, one USB cable, one carabiner and a USB magnetic switch.

Buskill USB Linux Physical Security

The physical part is the most important

With all these elements and instructions, it will be simple to easily create a Buskill for added protection. The part of the scripts must also be done by the users, so that they focus on the folders or elements they want to delete.

This is a simple and very interesting way to ensure physical security. They overlap with all the elements we used to see that we think are essential to being protected. This is the security we know we need and that we don't always remember to enable.


Related Articles

Leave a Comment

twenty − five =

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More