Fact-checked by Grok 2 weeks ago

BusKill

BusKill is an and software project developed as a kill cord, serving as a that triggers user-configurable security actions—such as locking the screen, shutting down the system, or wiping encrypted data—when a connected with a magnetic breakaway is physically disconnected from the user. The device consists of a custom featuring strong N52 magnets for the breakaway mechanism, paired with a companion application that detects the disconnection and executes the predefined trigger. Created by Alt Shift, a company based in , , BusKill was launched via a successful campaign on Crowd Supply, raising over $18,000 and becoming available for purchase in late 2021. It supports major operating systems including , , and macOS, with advanced features on such as shredding LUKS headers for data self-destruction. Designed primarily for high-risk users like journalists, traders, and travelers, the project emphasizes simplicity by avoiding wireless connections like , relying instead on a direct USB link for reliable detection. All and are released under open licenses—GPLv3 for software and CC-BY-SA for content—fostering contributions via . Since its debut, BusKill has garnered media attention for enhancing in an era of rising device thefts, with ongoing updates expanding trigger options like system shutdowns.

History

Origins and Invention

BusKill was invented by Michael Altfield in 2017 as a device to mitigate the risks of , particularly for devices handling sensitive in high-risk environments. The concept emerged from Altfield's personal experiences in and open-source communities, where maintaining during physical interactions—such as attending conferences or working in public spaces—was a pressing concern. This motivation addressed scenarios where a user might authenticate to secure services like VPNs or encrypted drives, only to face if momentarily distracted, potentially compromising confidential . The first prototype, developed that same year, relied on basic USB disconnection detection to trigger protective actions on the , such as locking the screen or initiating a shutdown, without any initial commercial intent. Constructed using off-the-shelf components like a USB drive attached to a retractable with a magnetic breakaway connector, the device simulated a USB removal event when physically separated from the user, leveraging simple system rules to detect and respond to the disconnection. This early iteration focused on proof-of-concept functionality rather than polished hardware, emphasizing accessibility for users in open-source ecosystems. The project embraced open-source principles starting from its public release in 2020 through dual licensing: the hardware designs under the Creative Commons Attribution-ShareAlike (CC BY-SA) license to encourage community modifications and sharing, and the accompanying software under the GNU General Public License version 3 (GPLv3) to ensure free redistribution and collaborative development. This licensing approach aligned with Altfield's background in open-source advocacy, fostering transparency and preventing proprietary lock-in while laying the groundwork for future expansions.

Development Milestones

The term "BusKill" was coined in January 2020 by software engineer Michael Altfield, who published a detailed guide describing the concept of a USB-based for laptops, accompanied by the initial release of a application using rules to detect cable disconnection and trigger a screen lock. A Windows port followed in early 2020, adapting the detection mechanism to use (WMI) event monitoring for USB removal events. In May 2020, Steven Johnson contributed the first macOS version, implementing cable disconnection detection via IOKit and system notifications to enable cross-operating system compatibility. The project advanced with the release of cross-platform application version 0.1.0 in August 2020, a Kivy-based rewrite that unified the (GUI) and (CLI) across , Windows, and macOS, while hardware prototyping efforts paralleled these software developments to test real-world USB event triggering. Version 0.6.0 arrived in October 2022, introducing a "soft-shutdown" option that allows users to configure graceful system shutdowns instead of immediate locks upon , alongside various fixes for improved stability. On June 17, 2023, version 0.7.0 was released, featuring enhancements such as a dedicated settings screen, support for soft-shutdown in the graphical interface, and multiple fixes including resolutions for lockscreen triggers on specific distributions like . Throughout 2024, the project saw updates focused on dependency optimizations to reduce bundle sizes, image enhancements for better visual consistency, and integration into the Jammy repository as an official package, broadening accessibility for Debian-based users. The BusKill team announced participation in 32 on July 16, 2024, with a presentation on open hardware design for the BusKill cord held on August 10, 2024, during the conference (August 8–11). In 2025, the project was awarded a $1,031 microgrant from FUTO in October to fund enhancements like volunteer-driven improvements to and . In September 2025, the team released unboxing and demonstration videos showcasing the BusKill Kit. A planned 0.8.0, aimed at further polishing the application with minor refinements and expanded trigger configurations, was announced in January 2025. The team maintains transparency through ongoing publications, with the latest, number 10, issued in June 2025, cryptographically signed to affirm no undisclosed legal pressures or system compromises.

Hardware

Design and Components

The BusKill hardware is designed as a physical device resembling a modified , intended to secure a to the user via a clip attached to clothing or a belt loop. The core assembly consists of a standard USB extension interrupted by a magnetic breakaway coupler, with one end connecting to a that plugs into the laptop's USB port. This setup allows the device to function as a : when the user moves beyond the cable's length, the magnetic connection separates, interrupting the USB link. Key components include a low-profile (typically USB-A, such as the SanDisk Ultra Fit, for reliable detection), a 1-meter USB extension cable (USB-A male-to-female), and a magnetic breakaway . The breakaway coupler employs magnets (often N42 or N52 cube magnets) to hold two halves together, with spring-loaded pins ensuring electrical continuity for USB data and power lines (D+, D-, , GND) until separation. In open hardware variants, these elements are housed in 3D-printable enclosures designed using tools like or , enabling custom fabrication. The disconnection mechanism relies on the physical force overcoming the magnets' attraction (typically 1-2 kg pull force in prototypes), which separates the pins and simulates a USB removal detectable by the host operating . No additional active are required in the basic design, as the remains passive until triggered, preserving standard USB 2.0 compatibility across laptops with USB-A or USB-C ports (via adapters for the latter). USB-C variants substitute compatible cables and drives while maintaining the breakaway principle. The device draws minimal power, with the idle USB flash drive consuming under 100 mA from the host port, ensuring negligible impact on battery life during normal use. It operates with standard USB ports on , Windows, and macOS systems without requiring specialized hardware drivers. Open-source schematics and CAD files for the magnetic breakaway and enclosures have been available on since 2020, facilitating DIY construction and community modifications.

Variants and Accessories

The commercial BusKill Kit, launched via in late 2021 and with shipping beginning in October 2022 through the official BusKill website and resellers like Crowd Supply and , provides a pre-assembled solution consisting of a magnetic-breakaway , a clip for , and a preloaded with the BusKill software installer and documentation. For users preferring a DIY approach, the standalone BusKill Cable—also introduced in 2022—offers a USB Type-A extension with an integrated magnetic breakaway mechanism, allowing integration with personal USB storage devices and tethers without the full kit. A 3D-printable variant has been in development since early 2023, featuring printable enclosures for the magnetic breakaway components and assemblies to enable custom USB kill cords; proof-of-concept designs, including files and STL models, were released on by August 2023, with demonstrations of functionality shown in May 2024. As of 2025, ongoing hardware development, including open hardware designs, is supported by a FUTO microgrant awarded in February 2025. Connector adaptations support USB-C devices through compatible components in the bill of materials, such as extension cables and breakaways, or hybrid setups using USB-A cables paired with to USB-A hubs for non-standard ports. Accessories include the included for physical , with replacement options available via general suppliers, and the magnetic breakaway itself serving as a core coupler; custom magnetic releases can be 3D-printed using the released prototypes. For advanced setups, BusKill integrates with external USB hubs to extend connectivity and is compatible with single-board computers like , where the device can be connected via USB for trigger testing in embedded environments.

Software

Architecture and Features

The BusKill software is implemented as a Python-based application that provides both (CLI) and (GUI) options, with the GUI built using the framework for cross-platform compatibility. This architecture enables users to interact with the system through terminal commands for scripting and automation or via an intuitive graphical interface for manual configuration. The core logic revolves around continuous monitoring of USB device connections, leveraging platform-specific to detect events related to the BusKill hardware cable. At its heart, the software operates in and modes, allowing users to activate or deactivate the kill cord functionality as needed. When armed, it supports customizable triggers that respond to cable disconnection, such as locking the screen, initiating a shutdown, or wiping headers (e.g., for LUKS on systems). These triggers are configurable to suit different security needs, emphasizing rapid response to physical separation of the device from the user. The detection mechanism polls for the unique BusKill device ID at regular intervals and initiates the selected trigger upon disconnection, with a user-defined delay ranging from 0 to 30 seconds to prevent accidental activations. For USB event monitoring, the application employs udev rules on to handle device insertion and removal notifications, IOKit on macOS for kernel-level USB interactions, and WMI () on Windows to query and respond to hardware changes. This modular approach ensures reliable detection across operating systems without relying on a single method. Security is enhanced through password protection for application settings, preventing unauthorized modifications, and seamless integration with full-disk encryption tools like LUKS to enable destructive actions such as header erasure in high-risk scenarios, with planned support for similar actions on other platforms like in future updates. Event logging is a key component, capturing details of arming/disarming actions, trigger activations, and disconnections in local files without any network transmission to maintain and avoid external dependencies. Logs are stored in a structured format for review, aiding in and auditing without compromising system performance. This logging mechanism underscores the software's focus on offline operation and user control.

Platform Compatibility

BusKill's software application is designed for cross-platform use, primarily supporting desktop operating systems to enable its USB-based functionality on laptops and similar devices. provides full support for BusKill since its initial release in early 2020, leveraging system services for reliable USB device monitoring and response triggering. The application integrates with for service management and udisks for handling USB events, ensuring seamless operation on distributions like . An official package became available starting with 24.04 LTS in 2024, simplifying installation via the . On macOS, support has been available since 2020, utilizing to monitor USB connections and execute configured actions upon disconnection. The application runs on both Intel-based and Macs, with compatibility on the latter achieved through 2 for x86 emulation where native builds are not yet fully implemented. Windows compatibility was established early in 2020, with the BusKill app using the Windows Event Log to detect USB device changes and initiate triggers. Installation and operation typically require administrator privileges to access necessary system-level USB monitoring and execution capabilities. While BusKill excels on major desktop platforms, it lacks native support for mobile operating systems such as or , limiting its use to tethered laptop scenarios. Users may encounter challenges in environments or with USB passthrough configurations, where host-guest USB handling can interfere with reliable detection and response. Cross-platform enhancements include version 0.7.0 released in July 2023, which introduced unified build processes to streamline development and deployment across Linux, macOS, and Windows. Future updates, such as version 0.8.0 planned for 2025, aim to enhance Windows stability and introduce broader ARM architecture support.

Usage

Installation and Setup

The installation and setup of BusKill involves both hardware attachment and software deployment to enable the device's kill cord functionality. The process is designed to be straightforward, supporting Windows, macOS, and Linux operating systems, with the hardware consisting of a USB cable featuring a magnetic breakaway connector and a carabiner clip.

Hardware Setup

To begin, assemble the BusKill cable if not pre-assembled by connecting the to the USB drive and then plugging the USB drive into the cable's USB-A connector. Attach the end of the cable to a secure point on the user, such as a loop, to ensure it tethers the laptop to the body. Next, insert the magnetic breakaway end of the cable into an available USB port on the ; the device appears as a standard USB storage drive and requires no additional drivers for basic recognition. To test the disconnection, gently pull the magnetic breakaway apart while the software is armed (detailed below), which should trigger the configured , such as screen locking, confirming proper physical setup.

Software Download and Installation

The BusKill app is a portable, self-contained application distributed via GitHub releases or an included USB drive with the hardware purchase. For downloads, visit the official GitHub repository at https://github.com/BusKill/buskill-app, navigate to the latest release, and select the archive matching your OS and architecture (e.g., buskill-windows-x86_64.zip for Windows). Download the accompanying SHA256SUM and SHA256SUM.asc files to verify integrity: compute the SHA256 checksum of the archive and compare it against the provided sums, then use GnuPG to check the PGP signature with the command gpg --verify SHA256SUM.asc SHA256SUM after importing the BusKill public key. This verification ensures the files have not been tampered with. If using the included USB drive, the app files are pre-loaded and similarly verifiable. Installation varies by platform but requires no traditional setup wizard or system-wide installer:
  • Windows: Extract the ZIP archive to a folder (e.g., Desktop), then double-click buskill.exe to launch; antivirus software may prompt for allowance, which should be granted for USB monitoring.
  • macOS: Extract the tarball or DMG file, drag the app to the Applications folder if desired, and launch it; due to lack of Apple notarization, approve execution in System Settings > Privacy & Security by clicking "Open Anyway" after the initial block warning.
  • Linux: Extract the tarball, make the AppImage executable with chmod +x buskill*.AppImage, then double-click or run ./buskill*.AppImage; grant USB access permissions via udev rules if needed for event detection (e.g., add a rule in /etc/udev/rules.d/ to monitor the specific BusKill vendor/product ID for non-root access).

Initial Configuration and Testing

Upon first launch, the app opens in a disarmed , displaying a simple with an "Arm" button; no or admin password is required, as the device is detected automatically via USB insertion. Click "Arm" to enable monitoring, selecting a basic trigger like screen lock from the default options. The app pairs the device implicitly by recognizing the USB connection—no manual steps are needed. To complete setup, test by disconnecting the cable while armed, verifying the trigger activates (e.g., screen locks immediately). For security, ensure the laptop's USB ports function normally by checking (Windows) or System Information (macOS/) for recognition.

Troubleshooting Basics

Common issues include USB port non-recognition, often resolved by trying a different port or restarting the computer; on , verify udev rules are correctly set using the VID:PID of your specific BusKill USB (obtainable via lsusb on while connected) to avoid permission errors during USB event polling—for DIY variants using Adafruit Neo Trinkey, the VID:PID is 239a:80f0. If the app fails to launch, confirm execution permissions and ; for macOS blocks, follow the approval prompt. Driver needs are minimal, as BusKill emulates a standard HID or , but update USB controllers via OS updates if detection fails. Consult the official for OS-specific logs if disconnection events do not register.

Configuration and Triggers

BusKill's configuration allows users to customize the response to a trigger event, which occurs immediately upon detection of the USB cable's disconnection via the magnetic breakaway mechanism. The primary trigger options include non-destructive actions such as screen locking or soft shutdown, as well as more aggressive measures like or initiating an encryption wipe through custom scripts. For instance, shredding the LUKS header can render full inaccessible, effectively wiping access to data without physical destruction. The configuration interface is accessible through the BusKill graphical user interface (GUI), where users navigate to the app menu under Settings > Trigger to select the desired action. While delay timers and action priorities are not natively configurable in the standard GUI, users can implement exclusions by specifying the BusKill device's unique identifier (e.g., via udev rules on Linux) to ignore other USB devices and prevent false positives. The GUI also supports arming and disarming the device with simple button clicks, ensuring quick toggling for security scenarios. For advanced setups, BusKill integrates with user-defined scripts to execute custom commands upon triggering, such as unmounting encrypted volumes or running a sequence. An example is the buskill-selfdestruct.sh script, which shreds the LUKS header and initiates shutdown in approximately 5 seconds when invoked by a rule on USB removal. In environments, users can configure keyboard shortcuts, such as Ctrl+Shift+D, to temporarily the trigger for 30 seconds, swapping to a safer action like screen locking during brief interruptions. A testing mode enables of without full execution to verify configurations safely. On Windows, this involves creating a 10 virtual hard drive (VHD) that mimics USB hotplug events—attaching initializes it, and ejecting simulates disconnection to test the trigger response. On macOS, the --run-trigger command-line argument directly invokes the configured action for verification. Linux testing relies on manual Docker-based environments across distributions. Best practices emphasize caution with destructive actions: users should maintain regular backups of critical data before enabling features like LUKS header , as these are irreversible and carry risks of . Additionally, secure the physical setup with a sturdy and avoid laptop movement after arming to minimize unintended triggers, starting with non-destructive options like screen locking for initial verification.

Reception and Developments

Crowdfunding and Commercialization

The BusKill project launched its crowdfunding campaign on Crowd Supply in December 2021, successfully raising $18,507 from 99 backers by January 2022, which funded the initial production of hardware kits. Following the campaign, BusKill products became commercially available through the official website buskill.in starting in 2022, with global shipping options. The full BusKill Kit, including a custom magnetic-breakaway cable, carabiner, and preloaded USB drive, is priced at $99 plus VAT, while individual BusKill cables are offered for $59 plus VAT; these sales generate revenue to sustain the open-source project. In terms of partnerships, BusKill integrated with NovaCustom laptops through a 2024 collaboration that made the cables available in their European stores, enhancing accessibility for privacy-oriented hardware users. Additionally, in February 2025 (announced October 2025), the project received a $1,031 microgrant from FUTO to fund documentation for building 3D-printable cables, including expenses for materials like and magnets, aiming for volunteer-driven completion by late 2025. Market reception has been positive, particularly within privacy-focused communities, as evidenced by 2025 YouTube unboxings and reviews highlighting its ease of use and effectiveness as a tool. Sales have been driven by these audiences, with promotions like discounts appealing to users prioritizing . Legally, BusKill's software is released under the GPLv3 and hardware designs under CC BY-SA, allowing open-source replication, while commercial sales provide funding for ongoing project maintenance without restricting community builds.

Community and Ongoing Updates

The BusKill project is hosted on under the official organization, which has been active since 2020 and includes repositories for the core application, , and designs such as the buskill-app for CLI/GUI functionality and usb-a-magnetic-breakaway for connector specifications. Contributions are managed by a of volunteers, with the main app repository featuring at least five documented contributors who have addressed issues like configuration paths and packaging signatures through pull requests and issue resolutions. Community engagement extends beyond code contributions to public demonstrations and transparency measures, including a presentation on open hardware design at 32 in August 2024. The project maintains a subreddit at r/BusKill with discussions on usage and updates, and it publishes cryptographically signed warrant canaries biannually to affirm system integrity, with the most recent edition covering June 2025 to July 2026. User feedback emphasizes the device's straightforward implementation for , as highlighted in Techlore's March 2025 video review, which commended its magnetic breakaway mechanism and ease of integration without complex setup. This positive reception continued with a 2025 Techlore discussing BusKill's role in preventing device theft. Common criticisms have focused on early software bugs, such as duplicate configuration directories on , which were resolved in updates like the v0.7.0 release in July 2023 that introduced GUI soft-shutdown triggers and improved documentation. Ongoing developments prioritize open hardware accessibility, with a 3D-printable BusKill demonstrated in May 2024 featuring a custom case for the magnetic connector and pogo pins. Recent community resources include an August 2025 Qubes OS guide on USB setup for screen locking and shutdown, alongside video tutorials such as a April 2025 demonstration of self-destruct triggers using LUKS header shredding.

References

  1. [1]
    BusKill - Crowd Supply
    BusKill is the world's first laptop kill cord, a hardware "dead man's switch" that executes a user-configurable trigger when your machine is physically ...
  2. [2]
    BusKill: Frontpage
    BusKill is a Dead Man Switch triggered when a magnetic breakaway is tripped, severing a USB connection. Checkout this video demonstration: https://www.buskill. ...Techlore Review · What is BusKill? · BusKill Kit · BusKill Cable
  3. [3]
    This USB 'kill cord' can instantly wipe your laptop if snatched or stolen
    Dec 16, 2021 · A project called BusKill launched a custom USB magnetic breakaway cable that acts as a “dead man's switch,” locking a computer if someone physically snatches ...
  4. [4]
    BusKill Now Shipping!
    Oct 9, 2022 · The first BusKill prototype was born in 2017. It gained international popularity in 2020 when Michael Altfield described how to build your own ...
  5. [5]
    Introducing BusKill: A Kill Cord for your Laptop
    Jan 2, 2020 · Invented by Michael Altfield, a sysadmin at the Open Source Ecology project, the BusKill cord acts as a sort of kill switch against thieves ...
  6. [6]
    Changelog — BusKill version documentation
    ... MacOS (#71) * fix lockscreen trigger on Linux Mint Cinnamon (#64) ... Steven Johnson, and Jacob Neplokh. Previous Next. © Copyright 2023, Michael ...
  7. [7]
    Welcome to BusKill's documentation! — BusKill version documentation
    v0.1.0. Contents: Introduction · Hardware User Guide · Software User Guide · Hardware Developer Guide · Software Developer Guide · Security · Support ...Missing: cross- August 2020
  8. [8]
    BusKill v0.6.0 released
    Oct 26, 2022 · We're happy to announce the release of BusKill App v0.6.0. This release includes bug fixes and introduces a new "soft-shutdown" trigger.Changes · Soft-Shutdown Trigger · Testers Needed!Missing: history | Show results with:history
  9. [9]
    New Warrant Canary and Other Developments from the BusKill Team
    Jan 15, 2025 · ... BusKill cables, including a Prototype Demo Video. Melanie Allen also presented the 3D-printed BusKill cable at DEF CON 32. BusKill Available ...<|separator|>
  10. [10]
    BusKill goes to DEF CON 32
    Jul 16, 2024 · We're happy to announce that BusKill is presenting at DEF CON 32. What: Open Hardware Design for BusKill Cord When: 2024-08-10 12:00 – 13:45
  11. [11]
    FUTO Microgrant Recipient (Feb 2025) - BusKill
    Oct 21, 2025 · We're thrilled to announce that BusKill was the recipient of a $1,031 microgrant from FUTO! Can't see video above?
  12. [12]
    BusKill Canary #10
    Jun 16, 2025 · This post contains the cryptographically-signed BusKill warrant canary #010 for June 2025 to July 2026.
  13. [13]
    Assembly of components - BusKill's documentation!
    Assembly of components ; Step 1: Attach carabiner to USB drive . First, connect the carabiner (clip) to the USB drive. ; Step 2: Plug USB drive into cable . Next ...Missing: tether design
  14. [14]
    Bill of Materials — BusKill version documentation
    This page will provide the bill of materials listing the materials and components necessary to build the BusKill cable. Standard USB-A Cable . The standard ...
  15. [15]
    BusKill/usb-a-magnetic-breakaway - GitHub
    This repo is for documenting and providing the design requirements for an open-source USB-A magnetic breakaway connector used in the BusKill laptop kill cord.Buskill/usb-A-Magnetic-Break... · Usb-A-Magnetic-Breakaway · What's In This Repo?Missing: schematics | Show results with:schematics
  16. [16]
    BusKill USB Cable Now Available: A PC Kill Switch for Data Protection
    Dec 15, 2021 · The BusKill USB kill cord for a laptop is a relatively simple device with a USB connector on one side, a USB drive on another and a carabiner to attach it to a ...
  17. [17]
    BusKill Kit
    In stock Rating 5.0 (3) This full BusKill Kit includes a custom magnetic-breakaway cable, a carabiner, and a USB Type-A drive preloaded with the BusKill software.Missing: pogo pins resistor
  18. [18]
    BusKill Cable
    In stockA USB Type-A extension cable (male on one end, female on the other) with a magnetic breakaway in-between. Perfect for building your own hardware kill-cable ...Missing: tether components
  19. [19]
    3D Printable BusKill Proof-of-Concept
    Aug 6, 2023 · The “Breakaway” consists of areas for two disc magnets and an indention to house pogo receptors. The “Release” consists of areas for two disk ...Missing: resistor | Show results with:resistor
  20. [20]
    3D-Printable BusKill Prototype Demo
    May 7, 2024 · Today we're ecstatic to publish our first demo showing a homemade BusKill Cable (in the prototype 3D-printed case) triggering a lockscreen.Introduction · Gold · Silver
  21. [21]
    Bill of Materials — BusKill version documentation
    If your device has USB type C ports and no USB type A ports, you can make a BusKill cable from the following USB-C components. Index. Item. Cost *. Qty. Total.
  22. [22]
    BusKill's main CLI/GUI app for arming/disarming ... - GitHub
    Jun 17, 2023 · BusKill is simple. When armed, a USB removal will trigger the screen to lock (by default). BusKill runs in Linux, Windows, and MacOS.
  23. [23]
  24. [24]
    BusKill USB kill cord protects data on Linux, Windows, Mac OS ...
    Dec 15, 2021 · You just need to detect that a USB device was unplugged, and possibly apply a probation period before deciding to lock/turn off/wipe the PC.
  25. [25]
    Introducing BusKill: A Kill Cord for your Laptop
    Jan 2, 2020 · And a $13 1-meter USB-C extension cable. i Note: If you'd prefer to buy a BusKill cable than make your own, you can buy one fully assembled here ...
  26. [26]
    BusKill v0.7.0 released
    Jul 11, 2023 · This release allows you to arm the BusKill GUI app such that it shuts-down your computer when the BusKill cable's connection to the computer is severed.What Is Buskill? · Changes · Soft-Shutdown TriggerMissing: development history
  27. [27]
    Hardware User Guide - BusKill's documentation!
    Hardware User Guide . This section will describe how to setup the hardware BusKill cable prior to using the software to arm and disarm BusKill.
  28. [28]
    Thank you for your purchase! - BusKill
    Install the BusKill software. Click below on your Operating System to see the installation instructions for your platform. Windows ...Getting Started · Step 4: Disconnect The Cable · Useful LinksMissing: 2020 | Show results with:2020
  29. [29]
    Quickstart — BusKill version documentation
    ### Quickstart Steps for BusKill Setup
  30. [30]
    Downloading The BusKill App
    To download the latest version of the BusKill app, click the Latest button under Releases on our repository's home page: https://github.com/BusKill/buskill-app.
  31. [31]
    Opening The BusKill App — BusKill version documentation
    ### Steps to Open and Run the BusKill App
  32. [32]
    A Laptop Kill Cord for QubesOS - BusKill
    Jan 4, 2022 · BusKill in Linux uses udev to detect when the USB's cable is severed. The exact udev rule that you use in the files below will depend on the ...<|control11|><|separator|>
  33. [33]
    Frequently Asked Questions — BusKill version documentation
    BusKill is the world's first laptop kill cord. It's a hardware Dead Man's Switch that can trigger your laptop to lock, shutdown, or self-destruct.
  34. [34]
    BusKill App: Graphical User Interface
    You can change what action the BusKill app takes when the BusKill cable is disconnected by changing the trigger setting. To change the trigger setting, open the ...
  35. [35]
    LUKS Header Shredder (BusKill Self-Destruct Trigger)
    Dec 28, 2021 · ... https://buskill.in/luks-self-destruct. # Authors: Michael Altfield <michael@buskill.in>. # Created: 2020-06-07. # License: GNU GPLv3.Missing: invented | Show results with:invented
  36. [36]
    Disarm BusKill in QubesOS
    Oct 2, 2023 · This post will describe how to setup keyboard shortcuts in QubesOS so that you can temporarily disarm (pause) the BusKill laptop kill cord.Missing: 1.0 | Show results with:1.0
  37. [37]
    Testing buskill-app — BusKill version documentation
    If you eject the “New Volume” (right click it and select “Eject”, then the BusKill app will execute the configured trigger. You can re-attach the VHD by opening ...
  38. [38]
    Updates from BusKill | Crowd Supply
    BusKill v0.7.0 Released with New Features and Support. We're happy to announce the release of BusKill v0.7.0, with new features, support, and ...Missing: 1.0 | Show results with:1.0
  39. [39]
    BusKill is finally here
    Dec 14, 2021 · FUTO Microgrants February 2025 [BusKill]. FUTO Microgrant Recipient (Feb 2025). October 21, 2025. BusKill Unboxing Video 2024. Unboxing Video ...<|separator|>
  40. [40]
    Store - BusKill
    Welcome to the BusKill store! Here you can purchase our products with fiat or anonymously using cryptocurrencies.Missing: variants accessories
  41. [41]
    BusKill available in-store (The Netherlands NovaCustom)
    Nov 26, 2024 · If you operate a shop selling security hardware and you'd like to sell BusKill cables, please contact us about our wholesale pricing. Buy ...
  42. [42]
    Techlore Review - BusKill
    May 17, 2025 · What is BusKill? BusKill is a laptop kill-cord. It's a USB cable with a magnetic breakaway that you attach to your body and connect to your ...
  43. [43]
    BusKill Review: The Deadman Switch For Laptops - YouTube
    Jan 21, 2025 · Bus kill is a dead man's switch for your laptop. It consists of two parts a USB cable with a trigger mechanism and a companion app.
  44. [44]
    Bitcoin Black Friday (10% discount on BusKill)
    Nov 22, 2024 · In celebration of Bitcoin Black Friday 2024, we're offering a 10% discount on all BusKill cables sold between Nov 23 to Dec 07.
  45. [45]
    License — BusKill version documentation
    Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that ...Missing: open | Show results with:open
  46. [46]
    BusKill - GitHub
    This is the official GitHub org for the BusKill laptop kill cord - BusKill.
  47. [47]
  48. [48]
    Two different config directory in my homedir on Linux #39 - GitHub
    Oct 15, 2022 · Describe the bug. I see two different directories being used for the buskill app on my machine using two different names:.<|separator|>
  49. [49]
    USB Kill Switch for Qubes OS - Physical Security Enhancement
    Aug 15, 2025 · This guide explains how to set up a USB-based kill switch for Qubes OS that locks your screen immediately and shuts down your system shortly ...
  50. [50]
    BusKill: Self Destructing Laptop Storage - YouTube
    Apr 10, 2025 · Let's configure BusKill (laptop kill cord) to destroy our encrypted storage (preventing access to sensitive accounts / files) !Missing: 2025 | Show results with:2025