DeadSwitch Toolset – Structured Shadows in Emacs

There’s no room for clutter in the command line of a ghost.

DeadSwitch doesn’t “manage time” – he enforces silence. Tasks, missions, and rituals are stored in plain text. The command center is Emacs. The engine is Org mode. The interface is custom Agenda views – all hardwired to reflect control, not chaos.

This is not productivity. It’s protocol.


Continue reading “DeadSwitch Toolset – Structured Shadows in Emacs”

DeadSwitch Security – Persistence is Futile: Unless You Never Get Detected

By DeadSwitch | The Cyber Ghost
“Noise is the death of persistence.”


Persistence is survival.
But survival isn’t enough.
Persistence must be invisible.
Undetected. Undisturbed. Undying.

Loud persistence is a countdown.
Quiet persistence is a curse they never find.


The Basics They All Expect

  • Startup folders~/.config/autostart/, %APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\
  • Scheduled tasksschtasks /create or cron with delay offsets
  • Registry runsHKCU\Software\Microsoft\Windows\CurrentVersion\Run

These are hunted.
These are scanned.
These are forensic low-hanging fruit.

DeadSwitch never stays in plain sight.


The Trickier Shadows

  • WMI Event Subscriptions – triggers on system events
  • COM Hijacking – silently reroute legitimate object calls
  • DLL Search Order Abuse – inject code by precedence
  • Living-off-the-Land Binaries (LOLBins) – abuse what’s already trusted

You persist inside trust.
You wear the system’s face.


Obscure Persistence for Ghost-Level Intrusion

  • EFI-level implants – beyond OS, inside firmware
  • Bootkits – compromise before the kernel breathes
  • System firmware implants – UEFI rootkits, hidden in SPI flash
  • Re-flashed peripheral firmware – Wi-Fi cards, SSD controllers, network adapters

When detection lives in software, you hide beneath the silicon.


DeadSwitch Principles of Silent Persistence

1 – Never trigger immediately
2 – Randomize payload delivery
3 – Sleep longer than blue teams expect
4 – Use uncommon paths, uncommon times, and legitimate signatures
5 – Clean yourself. Reinstall yourself. Leave false trails.
6 – Persistence only matters if they never know you’re there.

You don’t want uptime.
You want undetected presence.


Final Whisper

“Real persistence is not staying alive.
It’s never proving you were there.”

DeadSwitch
“Fear the silence. Fear the switch.”

Ghostwriting with the Machine – A Deep Dive into Human-AI Cooperation

1. The Spark and the Silence

AI can be the spark. It can throw raw material at the human mind like flint to stone. But the silence in between – the moment of reflection, judgment, and human instinct – is where the real fire is made. To work with AI is to accept it as a fast-thinking mirror, not a replacement.

Continue reading “Ghostwriting with the Machine – A Deep Dive into Human-AI Cooperation”