Create a Dead Man's Switch in Python to Encrypt a File When You Don't Check In [Tutorial]

preview_player
Показать описание

How to Create a Dead Man's Switch in Python 3

Cyber Weapons Lab, Episode 196

If you've ever watched a classic mob movie, then you've seen a Dead Man's Switch in action. It involves some sort of information getting published if a certain person goes missing. But there are many different types of dead man switches, ones more useful for hackers. In this episode of Cyber Weapons Lab, we'll make a Python program that can encrypt and delete a file if you don't check in over Twitter during a set amount of time.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

I am just starting to learn python at the tender age of 59. It’s an interesting experience

iamthatiam
Автор

Cool extra feature you might add would be an extra code you can tweet which doesn't check you in, but encrypts the files immediately. A reverse uno card for the outrageous situation where you are being forced to "check in" at gunpoint lol.

rentacowisgoogle
Автор

No one:
absolutely no one:
Elliot Alderson every few episodes:

GabrielXzavier
Автор

This seems particularly useful in my current circumstances. How timely. Thank you sir.

mikesmith
Автор

Admit it, you just come for the blinks.

UNcommonSenseAUS
Автор

If you really wanted to make it tweet and you don't have a developer account you could maybe use selenium

millionblunts
Автор

just like on mr. robot or other tv shows, sending an email and/or sending a video file upon one’s death would also be interesting - like a video will / goodbye or spooky message to send to your friends after a certain amount of days, similar to a twilight zone episode with a telephone call from a dead person which ended up being the telephone line ran to a grave.

iblackfeathers
Автор

I’m at school right now supposed to be writing script for my stupid mock trial but Instead of learning laws imma watch my favourite teacher😄

Yorak
Автор

It has been a while Kody, thanks for this

pacman
Автор

Very cool! I can think of a lot of practical examples for this. Something cool might be to trigger an email to go to someone with the encrypted file attached as well or actually just decrypt a secret file and email it out in the event something happened to you. I guess if something happens to you, you may as well just delete the file haha cause no one else will know how to decrypt it anyway.. Thanks for sharing!

CorEsan
Автор

been a long time since this was recommended to me, missed the videos ngl

fini
Автор

It is a good idea to adjust your IDE fonts a bit, not all screens make 1080p that easily readable. I would also not encrypt a file, but use an encrypted Filesystem and forget it’s unlock key. That also fits well into network bound encryption. And you never need to know the encryption key

berndeckenfels
Автор

finally my parents will never find my foot folder if I die, I can go peacefully

bjollnirbjordsen
Автор

love the framed shodan pic in the background

whyeddy
Автор

Nice concept, but what about connecting a raspberry pi to a drill pointed to your hard disk?
just to be sure that the data are destroyed ^^

deepserket
Автор

1 thing worth bearing in mind is how it handles device connectivity going down.

Side-question, are we taking bets on how long until there's a comment here saying something like "HELP, laptop encrypted and can't remember password. How do i decrypt?"

marklonergan
Автор

The encryption has absolutely 0 point unless you use non symmetric keys and only store the key to encrypt on the target system or make the script self destruct after encrypting so the password can't be just read back by someone else in plain text.

nezu_cc
Автор

Thank god you lowered the volume of the intro music.

youtubegaveawaymychannelname
Автор

Thank you so much for all. What is the procedure to do penetration tests of an API secured by OAuth the latest version in the security side. (Laravel, Spring boot, Nodejs...).

swerytv
Автор

Hi! there is a question about an antenna with three connectors for transmitting three spatial streams (outdoor). You can connect 3 adapters to it. Is it possible in this case to launch the attack of the evil double? Or do you need 2 separate antennas?

Ragnarek