Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv

Emergency PC destruction

RedX

TRUSTED VENDOR
Staff member
Joined
Nov 26, 2020
Messages
716
According to scientific canons, all devices must be disconnected from the power supply, sealed and examined by specialists in the laboratory. Although this is an ambiguous recommendation, since the same electromagnetic disk destruction systems are able to automatically activate and destroy data when the position of the system unit changes from vertical to horizontal.
But all these recommendations are ignored, since the temptation to obtain confessions and access to devices while the suspect has not yet recovered from the shock, has not received the advice of a lawyer or inmates is too great.

And this is bearing fruit: most cybercriminals caught by surprise give out access to devices and point to evidence, doing so in the framework of cooperation, for which they are promised the laxest possible sentence (they, however, are not told that the verdict is passed by the court, and not by the police or investigator).

Usually a person from the outside who is not interested in investigating hacker crimes may have a logical question: "After all, there is encryption of the operating system and crypto-containers, why do cybercriminals not use it?"

They do, but a

cybercriminal can just hold his finger in the door and get a password, because encryption is an excellent solution in theory, but in practice it is better to give out a password simply is not necessary.

Sometimes a detainee is threatened with a threat to be sent to a pre-trial detention center in case of refusal to give out the data and are offered a recognizance not to leave or house arrest if they agree to cooperate.

A USB killer can solve the hacker's problem: if such a device disguised as a USB flash drive is inserted into a USB port, it will irreversibly damage the motherboard and the computer will "die". But most importantly, on the spot it will be almost impossible to establish the cause of the "death" of the computer, and the hacker will always be able to breathe and say: "Eh, he was breathing badly for a long time."

The USB killer will not destroy the hard drive, and the laboratory will remove it, but by that time the hacker will already have a lawyer and the case will be at the stage of investigation, no one will stick a finger in the door or change the measure of restraint.

USB killers can be found in online stores and on AliExpress. A similar flash drive is placed near the computer, an inscription is applied to it, for example, "data" or "materials for work" (the purpose of this inscription is to attract attention). A hacker can voluntarily give out a flash drive or wait for curious ill-wishers to insert it into the device themselves.

Of course, there is a small chance that they will insert it into their device, and then problems cannot be avoided. But the detained hacker already has big problems, and the task of the trap is to disable the computer with the data at the moment when the detainee himself can no longer do it.

If you have a recent MacBook that has isolated USB ports from the motherboard, this will not work.
When using a USB killer, the data on your computer's hard drive will most likely not be damaged.

Good luck and good luck, friend!
 
Top Bottom