Skip to content

Health Control

🛡️ File Information

Property Value
Binary Name health-control
Version 9.0.1
File Size 29.2MB
Author Warith Al Maawali
License Proprietary
Category Security & Authentication
Description Health control system for Kodachi that includes network connectivity checks and system health monito...
JSON Data View Raw JSON

SHA256 Checksum

e91c986c4c59f8e0dd53402fa55a1394960dc85a502f9af3d5124f8143363b6d

🛡️ Key Features

Emergency Response System

Feature Description
Panic Modes Three levels of emergency response (soft, medium, hard)
Kill Switch Instant network termination with armed/disarmed states
Data Destruction Military-grade secure wiping of files and logs
Identity Management MAC address and hostname randomization

Why Health Control is Critical

Benefit Description
Immediate Threat Response React instantly to security breaches
Network Isolation Cut all connections when compromised
Evidence Elimination Secure data wiping prevents recovery
Hardware Anonymization Change device fingerprints on demand
Recovery Options Restore normal operations after threats pass

🛡️ ⚡ TL;DR - Essential Commands

Important: Most commands require sudo as they modify system-level settings.

Network Control & Diagnostics

# Network connectivity testing
health-control net-check                       # Test IP & DNS connectivity
health-control net-check --http                # Include HTTP connectivity test
health-control net-check --ip-only             # Test IP connectivity only (skip DNS)
health-control net-check --domain-only         # Test DNS only (skip IP ping)
health-control net-check --timeout 15          # Custom timeout (seconds)
health-control list-ips                        # Show test IP addresses
health-control list-domains                    # Show test domain names

# Block internet traffic (multiple methods available)
sudo health-control block-internet                       # Auto-detect best method
sudo health-control block-internet --method nftables     # Modern firewall (preferred)
sudo health-control block-internet --method iptables     # Legacy firewall
sudo health-control block-internet --method firewall     # UFW (Uncomplicated Firewall)
sudo health-control block-internet --method interfaces   # Disable network interfaces
sudo health-control block-internet --method all          # Apply ALL methods
sudo health-control block-internet --allow-local         # Block internet but allow LAN

# Restore internet access
sudo health-control unblock-internet                     # Auto-detect
sudo health-control unblock-internet --method all        # Clear ALL blocks

# Check blocking status
health-control internet-status                           # Current blocking status

# Emergency operations
sudo health-control kill-network                               # Kill all network interfaces
sudo health-control kill-network-interface --interface wlan0   # Kill specific interface
sudo health-control recover-internet                           # Auto-diagnose & fix connectivity
sudo health-control recover-internet --check-dns               # Include DNS fixes

Identity Management

# Change all MAC addresses (original MACs are NOT restored on reboot)
sudo health-control mac-change-all

# Set random hostname (original hostname is NOT restored on reboot)
sudo health-control set-random-hostname

# ⚠️ RESTORE WARNING: Document original MAC addresses and hostname before changing!
# Use 'ip link show' to view current MACs and 'hostname' for current hostname

Secure Data Wiping

🚨 DANGER: All wipe operations permanently destroy data. Files cannot be recovered!

# Wipe specific file (PERMANENTLY DESTROYED - UNRECOVERABLE)
sudo health-control wipe-file --file /path/to/sensitive.txt
sudo health-control wipe-file --file /path/to/file --passes 7  # Custom passes

# Wipe entire directory
sudo health-control wipe-directory --path /tmp/sensitive_dir

# Batch wipe multiple files
sudo health-control wipe-batch --paths /tmp/file1,/tmp/file2,/tmp/file3

# Wipe logs
sudo health-control wipe-logs              # All logs
sudo health-control wipe-logs --type system  # System logs only
sudo health-control wipe-logs --type all     # Everything

# Wipe browser data
sudo health-control wipe-browser-data              # All browsers
sudo health-control wipe-browser-data --browser firefox
sudo health-control wipe-browser-data --browser all

# Verify wipe was successful
sudo health-control wipe-verify --path /path/to/wiped/file

Security Assessment

# Check overall security status
sudo health-control security-status

# Get security score (0-100)
sudo health-control security-score         # Shows score, level, and fixes
sudo health-control security-score --json  # Detailed JSON with category breakdowns

# Generate comprehensive report
sudo health-control security-report
sudo health-control security-history --days 30  # View historical data

Memory & Swap Security

# Memory cleaning
sudo health-control memory-clean              # Clean memory caches
sudo health-control memory-force-clean        # Force aggressive cleaning
sudo health-control memory-wipe               # Secure memory wipe

# RAM wipe on shutdown
sudo health-control ram-wipe-enable           # Enable RAM wipe
sudo health-control ram-wipe-disable          # Disable RAM wipe
sudo health-control ram-wipe-status           # Check status

# Swap encryption
sudo health-control swap-encrypt              # Encrypt swap partition
sudo health-control swap-disable              # Disable swap completely
sudo health-control swap-status               # Check swap status

USB Security

# USB Guard protection
sudo health-control usb-guard-enable      # Enable USB protection
sudo health-control usb-guard-disable     # Disable USB protection

# USB device management
sudo health-control usb-monitor           # Monitor USB connections
sudo health-control usb-history --days 7  # View USB history
sudo health-control usb-list              # List current USB devices

# USB policies
sudo health-control usb-policy --action add --device-id 1234:5678 --allow
sudo health-control usb-policy --action list

LUKS Emergency Operations

☢️ EXTREME DANGER: LUKS nuke operations PERMANENTLY DESTROY all encrypted data!

# Emergency encryption destruction (DESTROYS ALL ENCRYPTED DATA FOREVER)
sudo health-control luks-nuke             # DESTROY encryption headers
sudo health-control luks-nuke-advanced    # Advanced nuke options

# Check encryption status
health-control disk-encryption-status
health-control encryption-status

Emergency Operations

# PANIC MODES - Increasing severity
sudo health-control panic-soft      # Kill network + lock screen
sudo health-control panic-medium    # + Kill processes + clear memory
sudo health-control panic-hard      # + RAM wipe + immediate shutdown

# KILL SWITCH - Two-step safety
sudo health-control kill-switch-arm       # Arm the kill switch
sudo health-control kill-switch-activate  # Activate (requires armed state)

🛡️ Understanding Key Security Features

Security Scoring System

Health Control evaluates your system security across 7 critical categories:

Category Weight Check Item Status
System Security 30% Disk encryption Verified
System Security 30% Firewall status Active
System Security 30% System updates Current
System Security 30% Kernel hardening Enabled
Privacy & Anonymity 25% VPN/Proxy status Connected
Privacy & Anonymity 25% Tor configuration Optimized
Privacy & Anonymity 25% DNS encryption Active
Privacy & Anonymity 25% IP masking Enabled
Network Security 20% Kill switch Armed
Network Security 20% DNS leak protection Active
Network Security 20% IPv6 privacy Configured
Network Security 20% Network isolation Enabled
Authentication 10% Kodachi auth status Authenticated
Authentication 10% 2FA configuration Enabled
Authentication 10% Password policies Enforced
Authentication 10% Session security Protected
Device Security 5% USB protection Active
Device Security 5% Hardware RNG Verified
Device Security 5% Secure boot Enabled
Device Security 5% Physical ports Secured
Advanced Privacy 5% Tirdad kernel module Loaded
Advanced Privacy 5% RAM wipe config Configured
Advanced Privacy 5% Cold boot defense Active
Advanced Privacy 5% Anti-forensics Enabled
Data Protection 5% Secure deletion Configured
Data Protection 5% Browser privacy Hardened
Data Protection 5% Clipboard security Protected
Data Protection 5% Temp file handling Secure

Score Interpretation

Score Level Description Action Required
90-100 🟢 Excellent Maximum protection active Maintain current configuration
70-89 🟡 Good Solid security, minor gaps Review and fix recommendations
50-69 🟠 Fair Basic protection only Implement critical fixes
30-49 🔴 Poor Significant vulnerabilities Urgent remediation needed
0-29 ⚫ Critical System exposed Immediate action required

Check your score: sudo health-control security-score --json


Panic Mode Escalation

Three-tier emergency response system with increasing severity:

Level 1: Soft Panic

Use for: Public spaces, shoulder surfing, temporary privacy

Action Result Recovery
Network termination All connections cut Automatic on reboot
Screen lock Immediate lock screen Password unlock
Clipboard wipe Sensitive data cleared No recovery needed
Browser pause Tabs suspended Resume on unlock

Level 2: Medium Panic

Use for: Suspected compromise, active surveillance

Action Result Recovery
Soft panic actions All Level 1 protections
Process termination Kill browsers, terminals, file managers Manual restart
Memory clearing RAM caches wiped Reboot recommended
Volume unmounting Encrypted disks locked Re-mount required
Swap disable Swap partition cleared Manual re-enable

Level 3: Hard Panic

Use for: Imminent seizure, critical breach

Action Result Recovery
Medium panic actions All Level 1+2 protections
RAM overwrite Memory wiped 3x passes Data unrecoverable
Key destruction Encryption keys zeroed Permanent loss
Forced shutdown Immediate power off Full system restart
LUKS header wipe Optional disk encryption destroy Drive unusable

WARNING

Hard panic causes permanent data loss in RAM and potentially on disk.

Recovery Guidance

Post-Emergency Recovery Steps:

  1. After Network Kill:

    sudo health-control recover-internet     # Auto-diagnose and restore
    sudo health-control unblock-internet     # Clear blocking rules
    

  2. After MAC Changes:

    # Restore original MACs (if documented before changes)
    sudo ip link set dev eth0 address 00:11:22:33:44:55
    

  3. After Hostname Changes:

    # Restore original hostname (if documented)
    sudo hostnamectl set-hostname original-hostname
    

  4. After Memory Wipe:

Action Description
System Reboot Reboot system to restore normal memory operation
Session Recovery Reload applications and restore working sessions
  1. After LUKS Nuke:
Status Action Required
Data Status Data is permanently lost and unrecoverable
Recovery Option 1 Restore from backups if available
Recovery Option 2 Reinstall system if no backups exist

Internet Blocking Methods

Multi-layer blocking system with fallback mechanisms:

Method Hierarchy

Priority Method Technology Speed Security Recovery
1 nftables Kernel netfilter (modern) Instant Highest unblock-internet
2 iptables Kernel netfilter (legacy) Instant High unblock-internet
3 firewall UFW frontend Fast Medium ufw --force reset
4 interfaces Physical disconnect Slow Absolute Interface restart

Blocking Strategies

Strategy Command Use Case LAN Access
Auto-detect block-internet General use ❌ Blocked
All methods block-internet --method all Maximum security ❌ Blocked
Allow local block-internet --allow-local Home/office use ✅ Allowed
Specific block-internet --method nftables Known environment Configurable

How Blocking Works

User Command → Method Detection → Rule Application → Verification
     ↓              ↓                    ↓              ↓
block-internet  Check available    Apply firewall   Test connectivity
                 methods           rules/disable     Log results
                                   interfaces

Network Recovery Process

Step Command Description
1 sudo health-control unblock-internet Remove all blocking rules
2 sudo health-control recover-internet Auto-diagnose and fix connectivity
3 sudo health-control recover-internet --check-dns Include DNS resolution fixes
4 sudo health-control recover-internet --force Force complete network reset

🛡️ Advanced Commands

For advanced users who need access to all available commands and options, please refer to the auto-generated command reference which includes:

Feature Description
Memory Management Advanced memory management commands
Process Control Process termination controls
Wipe Algorithms Advanced secure wipe algorithms
Network Management Network interface management
System Checks System integrity verification
Panic Profiles Custom panic mode profiles
CLI Reference All command-line flags and parameters

Health Control integrates with other Kodachi tools for complete security:

Tool Integration
IP Fetch Use after network recovery to verify connectivity
DNS Leak Test for DNS leaks after network changes
Tor Switch Manage Tor connections affected by network blocking
Online Auth Authentication may be affected by emergency operations

🛡️ Security Notes

Important Security Practices:

Practice Description
Test First Test panic modes in safe environment first
Kill Switch Safety Keep kill switch disarmed during normal use
Backup Strategy Backup data before using wipe commands
Document Changes Document MAC addresses before changing
Appropriate Response Use appropriate panic level for threat
Recovery Points Create recovery points before major changes

🛡️ Performance

Metric Value
Panic Response < 1 second activation
Network Block Instant (< 100ms)
MAC Change 2-3 seconds per interface
File Wipe Varies by size and pattern
Memory Usage ~30MB active

🛡️ Support

Resource Link
Website digi77.com
Anonymity Verifier kodachi.cloud
Discord Support discord.gg/KEFErEx
GitHub github.com/WMAL

Back to top