Then that's not a deadman switch.
How do you think the information gets dropped or posted dadudemon?
I sincerely want to hear what you believe constitutes a dead man switch.
Please read here for what an actual, modern, deadman switch is supposed to be:
https://www.makeuseof.com/what-is-dead-mans-switch-how-to-set-up/
The software requires you to encrypt data and create a set of triggers that automatically activate if there's no timely human intervention. For instance, if you fail to log into the software for a specific number of days or if you don't respond to an automated email, it may trigger a series of events.
A person cannot be a deadman switch unless it is the old school method (such as throttles) which is not the type of deadman switch we are talking about. If you want old school spy stuff to where a person will release information to the public if you don't shine a laser at a stop sign every day at 2:30, that's fine - still not a "deadman switch" like I'm talking about. Quite clearly, I'm talking about modern deadman switches.
And if you think a properly setup deadman switch can be DDoS'd into oblivion by the government who does not want something to be released, you're far too naïve. The government does not have near the control over everything that you think it does. That's an illusion they want you to believe. They can barely see much better in the dark than we can because of the tools and resources they have but it is not that much better.
I could setup a deadman switch that will automatically decrypt and notify a shitload of people if I do not enter in my password, say, once a week. And there's NOTHING the entire governments with all of their super computers (every computer on the planet) could do to stop it without at least 50+ trillion years.
say, once a week. And there's NOTHING the entire governments with all of their super computers
I have a credible source familiar with the NSA I'm totally just guessing, but the NSA runs a hierarchical system of hardware backdoors, so if they want to trace a machine engaged in a DDOS, or a drop through proxies, and shut it down, they send a signal to the first IP that appears, and this unlocks the machine, and dump its network traffic to the utah facility. This data is then parsed, sent back, and the next set of IPs in the list, in a descending and expanding tree of machines, is accessed, until they have all machines at some level N.
From there all the machines at the bottom of the trace tree simply have their modems, wifi cards, and/or network interfaces, stop working 'for no apparent reason'.
"And there's NOTHING the entire governments with all of their super computers (every computer on the planet)"
Supposedly it takes one year to decrypt a modern key at a cost of about two million dollars. This was in 2018 though, so it has likely come down significantly.
"The government does not have near the control over everything that you think it does"
At the mid level (congress, senate) thats true. At the top level, the DOD alone has 60,000 employees whose entire job is to manufacture new identifies, acquire equipment, and engage in spying.
60,000 black budget spies domestically.
For one agency.
The mid level has less control then they want us to believe, and the top level has far and beyond more control than you understand.
I'm totally just guessing, but the NSA runs a hierarchical system of hardware backdoors, so if they want to trace a machine engaged in a DDOS
This is also stuff that TLAs (three letter agencies) make up to scare people. They really don't. They have a set of 0 Days that they choose not to tell people about but their set is much smaller than some organized hacking groups such as nation state threat actors that routinely target the US. Don't believe their propoganda. Additionally, there's still 1,001 ways around anything you think the NSA/CIA/FBI could possibly have to stop someone from using a modern dead man switch.
This data is then parsed
I think at this point, you're just adding in jargon to make your point to seem more legit but it makes no sense to parse anything at this point if the systems involved are already compromised - it's already be decrypted in your scenario. There's no point to parse anything at this point in your theoretical set of steps. Your entire plan revolves around a nonexistent backdoor, as well. If what you said was correct, then how is it that the TLAs get fooled all the time but rather stupid but tech savy street thugs involved in international crimes? You know how those folks get caught? Poor secops. Not the technology they use. They just make sloppy mistakes instead of following their processes.
(post is archived)