# Emergency Reference Card **Audience**: All SooSeF users. Print, laminate, and carry in your wallet. --- ## EMERGENCY DATA DESTRUCTION ### Option 1: Pull the USB (Tier 1 -- fastest) Remove the USB stick from the laptop. The laptop retains zero data. ### Option 2: Software killswitch In the browser: **Fieldkit** > **Emergency Purge** > type `CONFIRM-PURGE` > click **Purge** From a terminal: ``` soosef fieldkit purge --confirm CONFIRM-PURGE ``` ### Option 3: Hardware button (Raspberry Pi only) Hold the physical button for 5 seconds. --- ## DESTRUCTION ORDER The killswitch destroys data in this order (most critical first): 1. Ed25519 identity keys 2. AES-256 channel key 3. Session secrets 4. User database 5. Attestation log and chain 6. Temp files and audit log 7. Configuration 8. System logs 9. All forensic traces (bytecache, pip cache, shell history) 10. Self-uninstall On USB: the LUKS encryption header is destroyed instead (faster, more reliable on flash). --- ## DEAD MAN'S SWITCH If enabled, you must check in before the deadline or all data will be destroyed. **Check in**: Browser > **Fieldkit** > **Check In** Or: `soosef fieldkit checkin` If you cannot check in, contact your editor. They may be able to disarm it remotely. --- ## KEY CONTACTS | Role | Name | Contact | |---|---|---| | Admin | _________________ | _________________ | | Editor | _________________ | _________________ | | Legal | _________________ | _________________ | | Technical support | _________________ | _________________ | Fill in before deploying. Keep this card current. --- ## REMEMBER - Pull the USB = zero trace on the laptop - Keys are destroyed first = remaining data is useless without them - The killswitch cannot be undone - Back up your keys regularly -- if the USB is lost, the keys are gone - Never share your passphrase, PIN, or LUKS password over unencrypted channels