WARNING: THIS IS EXPERIMENTAL SOFTWARE. IT IS LIKELY TO CONTAIN BUGS.
If you have already installed Centry, please run
git pull to update to the latest version. The latest updates make it much more secure against replay attacks.
Centry is a panic button intended to protect users against Cold Boot Attacks, Direct Memory Access Attacks and other live system threats. Centry is most effective when deployed on systems with Full Disk Encryption and without a swap/page file. The panic function can be activated through the GUI or through a network request (through browser, smartphone, etc). Upon recieving the panic instruction, Centry will attempt to remove sensitive keys from memory, securily overwrite the RAM and then force a shutdown.
- User-friendly GUI interface
- When in panic mode, Centry can:
- Lock the screen
- Unmount all Truecrypt disks and clear the password/keyfile cache
- Write zeros to RAM using sdmem (on UNIX-like systems)
- Force an ACPI shutdown (equivilent holding down the power button)
- Propogate the panic signal to all other nodes in the network
- Settings to improve security on ECC-enabled systems
- Extensively customizable
- Compatable with Linux and Mac OS; with significantly more security in Linux.
For significantly improved security install the
secure-delete package. On Ubuntu/Debian:
sudo apt-get install secure-delete
Then download and run Centry as root:
git clone https://github.com/0xPoly/Centry.git sudo python centry.py "password"
Contributors and License
- 0xPoly - twitter
This is a free open-source program distirbuted under the GNU General Public License. Comments, suggestions and pull requests are all heartily encouraged.