How it works

  1. Tripwire

    A USB device is removed or inserted, Bluetooth goes out of range, or AC power is lost. The wards are breached.

  2. Conjure

    A composite threat score materializes in under 5 ms. The spell is already cast before the attacker knows.

  3. Vanish

    Graduated hex: screen lock, vault sealed, or keys destroyed and power cut. The secrets were never there.

The grimoire

DeadWitch doesn't erase pages. It burns the only key that can read them.

LUKS volume

Your grimoire is a LUKS-encrypted volume. Data stays on disk, sealed — unreadable without the encryption key held in kernel memory.

luksSuspend

The key vanishes from kernel memory via memzero_explicit(). A kernel-level incantation — no userspace spell can replicate.

luksErase

Obliterates LUKS keyslots using AF-stripes (4000x inflation). The key is not hidden — it ceases to exist. Recovery is mathematically impossible.

Host survives

The machine lives on after KILL. Only the grimoire burns — the OS and host data are untouched. A clean disappearing act.

File shredding is slow and unreliable on SSDs due to wear leveling. Key destruction is instant, silent, and mathematically final.

Response levels

Lock Low threat

Screen lock. Session preserved. A warning ward — nothing lost.

Seal Medium threat

Grimoire sealed. luksSuspend makes the keys vanish from kernel memory.

Kill High threat

Grimoire destroyed. RAM wiped. Power cut. The keys never existed.

Familiars

Physical sentinels that watch for disturbances.

  • USB familiar

    Removal or insertion of any device breaks the circle. Under 5 ms to detect.

  • Bluetooth familiar

    Your phone moves out of range. The bond is severed, the spell triggers.

  • AC Power

    Power loss breaks the ritual. Unplug the machine, the witch acts.

Features

deadwitch init

The summoning ritual. Guided setup with human-readable prompts. Armed in minutes.

Duress Password

A decoy grimoire opens. Behind the curtain, the real LUKS header is silently destroyed.

Scrying Mode

24-hour divination. The witch studies your hardware before binding the wards.

Travel Mode

Reduced grace periods. Heightened sensitivity. The witch's finger rests on the trigger.

5-Level Failsafe

Five nested wards: daemon → watchdog → OnFailure → udev → raw syscall. Kill the process, the spell still fires.

Host Preservation

The machine survives the ritual. Only the grimoire is sacrificed.

Quick Spells

I. The Summoning
sudo deadwitch init
II. Read the Omens
deadwitchctl status
III. Raise the Wards
deadwitchctl profile alert
IV. Suspend the Ritual
deadwitchctl pause 5m
V. Diagnose the Circle
deadwitchctl doctor

Architecture

Privilege separation. Four binaries, two trust zones.

root
deadwitchd Daemon. Events, crypto, LUKS ops
user
deadwitchctl CLI. Status, profiles, whitelist
deadwitch-gui System tray. PIN, status, emergency
deadwitch Setup wizard. Guided init

Who is this for

Journalists, lawyers, activists, researchers, and developers who work with sensitive data in physically exposed environments — at border crossings, in conflict zones, or in public spaces where device theft or seizure is a realistic threat.

Ethics

We apply the doctrine of double effect: the intent is protection, the positive effect doesn't require a negative one, and the proportionality is clear.