BusKill is an open-source hardware and software project that designs computer kill cords to protect the confidentiality of the system's data from physical theft. The hardware designs are licensed CC BY-SA and the software is licensed GPLv3. BusKill cables are available commercially from the official website or through authorized distributors.
The name BusKill is an amalgamation of "Bus" from USB and "Kill" from kill cord.[4]
The first computer kill cord was built by Michael Altfield in 2017.[5][6]
The term "BusKill" was coined by Altfield in January 2020 when publishing the first BusKill build and udev usage instructions (Linux-only),[1][7][8] and it was ported by cyberkryption from Linux to Windows a couple weeks later.[9][10] The project's official website launched the following month.[11]
The first OS X version of the BusKill app was released in May 2020[12] by Steven Johnson.
A cross-platform rewrite of the software based on Kivy was released in August 2020 with support for Linux, OS X, and Windows.[13]
In December 2021, Alt Shift International OÜ ran a crowdfunding campaign to manufacture BusKill cables on Crowd Supply.[14][15][16] The campaign raised $18,507 by January 2022.[17]
Hardware
The BusKill cable is a kill cord that physically tethers a user to their computer with a USB cable.[18][19]
One end of the cable plugs into a computer. The other end of the cable is a carabiner that attaches to the user.[20]
In the middle of the cable is a magnetic breakaway coupler, to allow the cable to be safely separated at any angle without physically damaging the computer or the user.[21][22]
The BusKill project maintains a cross-platform GUI app that can either lock the screen or shutdown the computer when the cable's connection to the computer is severed and the app is in the "armed" state.[18][25][26]
Use
If the computer is separated from the user, then a magnetic breakaway in the cable causes a USB hotplug removal event to execute a trigger in the app.[27]
The trigger executed by the BusKill cable's removal can lock the screen, shutdown, or securely erase the LUKS header and master encryption keys within a few seconds of the cable's separation.[28][29][30]
↑Helen Leigh (Jan 14, 2022). Teardown Session 17: OpSec and Privacy with Michael Altfield (Video Interview). Berlin, Germany: Crowd Supply. Event occurs at 12 minutes, 35 seconds. Retrieved 2022-07-02. I decided to build this for myself actually in 2017, and then I published the article in 2020.