Skip to content

Latest commit

 

History

History
37 lines (29 loc) · 1.96 KB

README.md

File metadata and controls

37 lines (29 loc) · 1.96 KB

Centry

WARNING: THIS IS EXPERIMENTAL SOFTWARE. IT IS LIKELY TO CONTAIN BUGS.

Updates

If you have already installed Centry, please run git pull to update to the latest version. The latest updates make it much more secure against replay attacks.

Introduction

Centry is a panic button intended to protect users against Cold Boot Attacks, Direct Memory Access Attacks and other live system threats. Centry is most effective when deployed on systems with Full Disk Encryption and without a swap/page file. The panic function can be activated through the GUI or through a network request (through browser, smartphone, etc). Upon recieving the panic instruction, Centry will attempt to remove sensitive keys from memory, securily overwrite the RAM and then force a shutdown.

screenshot

Features

  • User-friendly GUI interface
  • When in panic mode, Centry can:
    • Lock the screen
    • Unmount all Truecrypt disks and clear the password/keyfile cache
    • Write zeros to RAM using sdmem (on UNIX-like systems)
    • Force an ACPI shutdown (equivilent holding down the power button)
    • Propogate the panic signal to all other nodes in the network
  • Settings to improve security on ECC-enabled systems
  • Extensively customizable
  • Compatable with Linux and Mac OS; with significantly more security in Linux.

Installation

####Linux#### For significantly improved security install the secure-delete package. On Ubuntu/Debian:

 sudo apt-get install secure-delete

Then download and run Centry as root:

 git clone https://github.com/0xPoly/Centry.git
 sudo python centry.py "password"

Contributors and License

This is a free open-source program distirbuted under the GNU General Public License. Comments, suggestions and pull requests are all heartily encouraged.