Unauthorized file access
Technicians can browse, copy, or exfiltrate personal documents, photos, and sensitive files without leaving obvious traces.
Black Box is a forensic flight recorder for your computer. It quietly logs every USB connection, file access, and login while your device is out of your hands — and signs each entry into a chain that proves nothing has been altered.
SESSION
A3F2-9C1A-4F0B
EVENTS
1,284
INTEGRITY
100%
ENCRYPT.
AES-256
WATCHDOG
ACTIVE
PROTECTION FOR
Every year, thousands of people hand their devices to strangers — repair shops, IT departments, service centres. What happens next is invisible to you. The most damaging breaches leave no fingerprints; the technician returns a “fixed” machine that now reports to someone else.
Technicians can browse, copy, or exfiltrate personal documents, photos, and sensitive files without leaving obvious traces.
A plugged-in USB drive can silently copy gigabytes of data in minutes. Standard antivirus software does not detect this.
Saved passwords, browser sessions, and authentication tokens are accessible to anyone with physical access to a logged-in machine.
Remote access tools can be installed in under 60 seconds. You return with a repaired device that now reports to someone else.
Install once. Activate before any handoff. The recorder runs as a quiet Windows service that survives reboots, signs every event into a hash chain, and produces a tamper-evident report on demand.
Download the 2.9 MB installer. Create your account. Takes under two minutes.
One click starts a protected session. Black Box begins recording silently as a Windows service.
Every USB connection, file access, login, and system event is recorded with full timestamps.
Generate a cryptographically verified forensic report. Every event is tamper-evident and legally admissible.
Eight independent mechanisms. Each one makes tampering visible, costly, and accountable — from the kernel’s ETW stream up to the cryptographic hash chain on disk.
Every log entry is chained to the previous via SHA-256. A single altered character is mathematically detectable.
An encrypted backup of your session survives even deliberate log deletion. Unreadable without your PIN and machine.
Catches bulk file copies at the kernel level — robocopy, xcopy, and fast USB dumps that standard monitoring misses.
Every USB connection is logged with VID, PID, and serial number. Insertion and removal times are recorded.
Login attempts, account creation, and remote session events are captured and risk-classified in real time.
Clock drift greater than 60 seconds triggers a HIGH-severity alert. Timestamp manipulation does not go unnoticed.
Detects debugger attachment attempts at both managed and kernel API level. The attempt becomes CRITICAL evidence.
If a monitoring component is stopped unexpectedly, the watchdog restarts it and logs the interruption within 5 seconds.
We built Black Box so that even we cannot access your data. Forensic logs live exclusively on your device. The shadow copy is encrypted with AES-256 using a key derived from your PIN and your unique Machine GUID — bound to your exact hardware. When cloud sync launches, every entry will be encrypted with your personal key before it leaves your device. Our servers will receive only ciphertext.
AES-256-CBC encryption
Shadow copy encrypted with a key derived from PIN + Machine GUID.
PBKDF2 PIN hashing
Your PIN is never stored in plaintext — ever.
SHA-256 hash chain
Cryptographic proof of log integrity across every session.
4-layer evidence storage
Primary log, shadow copy, Windows Event Log, and anchor files.
Least-privilege service
BlackBoxSvc runs as a dedicated low-privilege local account.
Hardened IPC pipe
Named pipe ACL denies all anonymous connections.
Local protection is free, permanently. Subscription tiers unlock encrypted cloud backup and long-term retention when they ship.
Local protection. No subscription.
$0
BEST FOR
Secure cloud backup. Coming soon.
$6 / mo
COMING SOON
BEST FOR
Verified-student pricing.
$4 / mo
COMING SOON
BEST FOR
Requires verification with a college email address.
Request accessCustom deployment for organisations.
Custom
BEST FOR
Pricing tailored to organisation size, usage, and storage needs.
Contact salesCloud features ship in the next release. The current version includes full local protection at no cost.
WIN 10/11 · x64 · 4.41 MB · SHA-256 VERIFIED · NO CARD REQUIRED
v1.0.1 · RELEASED MAY 2026 · 4.41 MB · SHA-256 VERIFIED
Black Box must only be used on devices you own or have explicit written permission to monitor.