Centry is a panic button intended to protect users against Cold Boot Attacks, Direct Memory Access Attacks and other live system threats. Centry is most effective when deployed on systems with Full Disk Encryption and without a swap/page file. The panic function can be activated through the GUI or through a network request (through browser, smartphone, etc). Upon recieving the panic instruction, Centry will attempt to remove sensitive keys from memory, securily overwrite the RAM and then force a shutdown.
- User-friendly GUI interface
- When in panic mode, Centry can:
- Lock the screen
- Unmount all Truecrypt disks and clear the password/keyfile cache
- Write zeros to RAM using sdmem (on UNIX-like systems)
- Force an ACPI shutdown (equivilent holding down the power button)
- Propogate the panic signal to all other nodes in the network
- Settings to improve security on ECC-enabled systems
- Extensively customizable
- Compatable with Windows, Linux and Mac OS; with significantly more security in Linux.
####Windows####
- Install
python 3.4
from the here - Download the Windows-optimized version
- Unzip the archive
- Run
python Centry.py "password"
####Linux####
For significantly improved security install the secure-delete
package. On Ubuntu/Debian:
sudo apt-get install secure-delete
Then download and run Centry as root:
git clone https://github.com/0xPoly/Centry.git
sudo python centry.py "password"
- 0xPoly - twitter
This is a free open-source program distirbuted under the GNU General Public License. Comments, suggestions and pull requests are all heartily encouraged.