Please read here for what an actual, modern, deadman switch is supposed to be:
https://www.makeuseof.com/what-is-dead-mans-switch-how-to-set-up/
The software requires you to encrypt data and create a set of triggers that automatically activate if there's no timely human intervention. For instance, if you fail to log into the software for a specific number of days or if you don't respond to an automated email, it may trigger a series of events.
A person cannot be a deadman switch unless it is the old school method (such as throttles) which is not the type of deadman switch we are talking about. If you want old school spy stuff to where a person will release information to the public if you don't shine a laser at a stop sign every day at 2:30, that's fine - still not a "deadman switch" like I'm talking about. Quite clearly, I'm talking about modern deadman switches.
And if you think a properly setup deadman switch can be DDoS'd into oblivion by the government who does not want something to be released, you're far too naïve. The government does not have near the control over everything that you think it does. That's an illusion they want you to believe. They can barely see much better in the dark than we can because of the tools and resources they have but it is not that much better.
I could setup a deadman switch that will automatically decrypt and notify a shitload of people if I do not enter in my password, say, once a week. And there's NOTHING the entire governments with all of their super computers (every computer on the planet) could do to stop it without at least 50+ trillion years.
say, once a week. And there's NOTHING the entire governments with all of their super computers
I have a credible source familiar with the NSA I'm totally just guessing, but the NSA runs a hierarchical system of hardware backdoors, so if they want to trace a machine engaged in a DDOS, or a drop through proxies, and shut it down, they send a signal to the first IP that appears, and this unlocks the machine, and dump its network traffic to the utah facility. This data is then parsed, sent back, and the next set of IPs in the list, in a descending and expanding tree of machines, is accessed, until they have all machines at some level N.
From there all the machines at the bottom of the trace tree simply have their modems, wifi cards, and/or network interfaces, stop working 'for no apparent reason'.
"And there's NOTHING the entire governments with all of their super computers (every computer on the planet)"
Supposedly it takes one year to decrypt a modern key at a cost of about two million dollars. This was in 2018 though, so it has likely come down significantly.
"The government does not have near the control over everything that you think it does"
At the mid level (congress, senate) thats true. At the top level, the DOD alone has 60,000 employees whose entire job is to manufacture new identifies, acquire equipment, and engage in spying.
60,000 black budget spies domestically.
For one agency.
The mid level has less control then they want us to believe, and the top level has far and beyond more control than you understand.
I'm totally just guessing, but the NSA runs a hierarchical system of hardware backdoors, so if they want to trace a machine engaged in a DDOS
This is also stuff that TLAs (three letter agencies) make up to scare people. They really don't. They have a set of 0 Days that they choose not to tell people about but their set is much smaller than some organized hacking groups such as nation state threat actors that routinely target the US. Don't believe their propoganda. Additionally, there's still 1,001 ways around anything you think the NSA/CIA/FBI could possibly have to stop someone from using a modern dead man switch.
This data is then parsed
I think at this point, you're just adding in jargon to make your point to seem more legit but it makes no sense to parse anything at this point if the systems involved are already compromised - it's already be decrypted in your scenario. There's no point to parse anything at this point in your theoretical set of steps. Your entire plan revolves around a nonexistent backdoor, as well. If what you said was correct, then how is it that the TLAs get fooled all the time but rather stupid but tech savy street thugs involved in international crimes? You know how those folks get caught? Poor secops. Not the technology they use. They just make sloppy mistakes instead of following their processes.
I think at this point, you're just adding in jargon
Not at all. "parse" here, simply means to "extract" something. In this case, an ip address. Nothing fancy.
" it's already be decrypted in your scenario.'
I want you to consider what a DDOS or even a deadman switch might entail:
The controlling machine is not the one directly sending traffic, or data, to the target.
You have a series of hopes, and proxies, that redirect traffick flow, in order to obfuscate origin.
So if the final location to send a drop, or even a DDOS is location A, it might look like the following (assuming formatting doesn't mangle my message):
A
/ \
B C
/ \ / \ D E F G \ H
Where H is the machine that issues the command, and D, E, F, G, are the proxies, and B, and C are the bot machines that receive commands from the proxies.
What the NSA might do is send a command, a bit of code, to a backdoor on A, that reveals the IPs of B and C. And this, almost like a worm, raids the network interface controller for a history of packets received, getting the addresses of D, E, F, G, and so on, down the layers of proxies and bots, until they all have a single machine or subnet in common.
If this exists, it likely exists as a common protocol in ring 0 (or even lower rings) on modern chipsets across multiple manufacturers, not simply zero days. And for the purpose of plausible deniability, at each step of retrieving the next layer of IPs, it would defer to a subset of major nodes on many common carriers, where the parsing would be done, instead of saying embedding an IP address that points directly back to the DOD, lol. All it would look like, if you could even capture the network traffic, would be anomalous diagnostic data being sent to your carrier, with a single hop, maybe disguised as a SYN packet or an errant SYN-ACK with no preceding SYN packet, but other implementations could be possible too.
(post is archived)