ALCYONE SECURE / USE CASESEIGHT SCENARIOS · ALL INDUSTRIES

Who Black Box
protects.

From a student handing in a laptop for repair to a hospital managing third-party vendor access — Black Box creates tamper-evident proof of what happened during any device service window.

01

Accountability

A tamper-evident record deters bad actors and gives you something concrete if things go wrong. Accountability changes behaviour.

02

Transparency

Know exactly what system activity occurred during a repair window. Encrypted logs remain under your control.

03

Compliance

Support DPDP Act, GDPR, CCPA, HIPAA, and PCI-DSS audit requirements with cryptographically verifiable activity logs.

§ 01Scenarios

Eight industries.
One recorder.

Each scenario is drawn from documented real-world incidents. Black Box does not prevent tampering — it makes every action visible, verifiable, and legally attributable.

01CONSUMER

Laptop & Phone Repair

Protect your device when repair technicians have unsupervised access for hours.

SCENARIO

Your laptop needs a motherboard replacement. You install Black Box before giving it to the repair shop. Every file open, USB connection, and login during the service window is signed into a tamper-evident log. You return with evidence of exactly what happened.

  • +Detect unauthorised access to personal files
  • +Identify if technicians install additional software
  • +Verify system configuration changes
  • +Create evidence if data is compromised
02ENTERPRISE IT

Corporate Device Servicing

Monitor corporate laptops during maintenance, repairs, or hardware upgrades.

SCENARIO

A company sends employee laptops for SSD upgrades. Black Box runs on each device, creating forensic records. All activity is logged and verifiable — no employee data accessible without the session PIN.

  • +Maintain device integrity during vendor servicing
  • +Ensure compliance with data protection policies
  • +Detect any unauthorised access attempts
  • +Create audit trails for compliance reports
03HEALTHCARE

Hospital & Medical Equipment

Forensic monitoring for hospital workstations during vendor service visits.

SCENARIO

A hospital's CT scanner requires scheduled maintenance. Black Box runs on the connected workstation to ensure no patient data is accessed or exfiltrated during the service window, creating a compliant audit record.

  • +Protect patient data and privacy during servicing
  • +Create compliant audit trails
  • +Detect unauthorised access to patient records
  • +Ensure equipment integrity documentation
04LEGAL

Legal & Forensic Investigations

Create verifiable forensic records for legal proceedings and dispute resolution.

SCENARIO

An attorney needs to preserve evidence that a client's device was accessed without authorisation. Black Box creates cryptographically verified logs — a SHA-256 hash chain that demonstrates the access and proves the log was not altered.

  • +Create chain-of-custody for forensic evidence
  • +Verify device tampering with tamper-evident logs
  • +Support litigation with cryptographically verifiable data
  • +Document unauthorised activity patterns
05RETAIL / PAYMENTS

E-Commerce & POS Systems

Monitor payment systems and store computers during maintenance windows.

SCENARIO

An e-commerce retailer's payment processing server requires updates. Black Box runs to create a forensic record that no payment card data was accessed or copied during the maintenance window.

  • +Support PCI-DSS compliance for payment systems
  • +Detect credit card data access during servicing
  • +Create verifiable audit trails
  • +Prevent payment fraud via unauthorised access
06TECHNOLOGY

Software Development & Source Code

Protect developer machines when accessed by third parties for hardware support.

SCENARIO

A development team's build server needs hardware maintenance. Black Box ensures the maintenance technician cannot access proprietary source code or intellectual property stored on the server without it being logged.

  • +Protect intellectual property and source code
  • +Detect unauthorised file access with ETW kernel logging
  • +Create records of what was accessed and when
  • +Prevent corporate espionage during servicing
07EDUCATION

Students & Academic Users

Protect personal research, thesis work, and credentials during campus repairs.

SCENARIO

A student's laptop with three years of research data needs a screen replacement. Black Box activates before handover, recording every action during the repair window. The student returns with proof nothing was accessed or copied.

  • +Protect thesis and research documents
  • +Detect if credentials or accounts were accessed
  • +Create a simple pre-repair safety step
  • +Available free for individuals — no subscription
08PERSONAL

Individual Privacy Protection

Build a tamper-evident audit trail for any moment your device leaves your hands.

SCENARIO

A freelancer with confidential client contracts hands their laptop in for a battery replacement. Black Box logs every event — files opened, USB devices connected, accounts accessed — and produces a signed forensic report on return.

  • +Monitor device for any intrusion or access
  • +Create a personal audit trail with zero configuration
  • +Detect malware or unauthorised software installation
  • +Verify data privacy was maintained

Ready to protect
your device?

Black Box is free for individuals. Download the 2.9 MB installer, activate before your next handoff, and get a forensic report on return.