Dissident Product Guide

 

 


The Dissident

 

Product Guide and Overview

Customization Options and Guide

 

A world class tool created to order to support your campaign objectives around the globe

 

Our main value comes from our scalability and customization with the ability to take the best tools available, bundle them together in a custom interface, and then deploy it directly to the target populace in secure and disposable USB device. 

 

The end result is simplicity – plug the device in, boot your computer, access the pre-configured tools via a GUI, communicate securely via text or voice, and access payment via a crypto wallet. Everything boots forensically, leaving no trace when finished. 

Hardware Options

Designed to blend in

 

The Dissident is a service based product which scales up the functionality of the Skeleton Key, and optimizes it to support a specific operation. The end result is a tool that a user can plug into any computer (without leaving a trace) and immediately and safely communicate with any secure system globally.

  • Local Branding and Identification: Each USB device has the option for exterior printing to match a local region. Devices can be made to mimic existing organizations, or part of a completely new brand created specifically for this purpose.
     
  • Optimized for older hardware: The physical USB device uses Qubes as the base OS, which allows us to use resource optimized containers – which run much more smoothly on very old machines.
     
  • Top layer application: As Xorre utilizes the container based architecture of Qubes, you can have an independent application running as the “top layer” of the device. Simply put, have a “real” application boot on the device, with the operational tools hidden.

 

Operational Capabilities

Offensive Security Tools and Packages

 

Xorre OS uses the best in industry offensive security tools running in optimized containers. Options include:

  • Information Gathering: The pre-configured tools allow the user to run robust credential harvesting and vulnerability scanning applications. The easiest way to get information from hostile forces in the field. 
     
  • Network Exploits: These exploits run from scripts with no user interaction needed. Have complete confidence that the tool will do what YOU tell it to do. 
     
  • Misinformation: Designed to spread misinformation on the battlefield. Includes tools for spoofing user information to create false information trails.
     
  • Dark Web Communications: Communicate with your assets securely and safely, with a setup EASY for them to use.
     
  • Intelligence Sharing: Use the stacked network container feature of Xorre OS to securely send information and logs back automatically. 
     

Campaign Support

Pre-configured and simple tools

 

Xorre is built with the end user in mind – the people you ultimately want using your tool where you need it most. You can customize the capabilities to meet your exact needs, with no user input.

  • Simple Interface: Xorre takes advantage of the native Linux environment to create a custom interface and GUI. This lets users access every tool on the device, without needing to understand any of the underlying technology.
     
  • Secure Communication: Utilize multiple secure and encrypted communication layers to create direct communication channels with handlers, but with the connection information hidden to the user. It is virtually impossible to compromise a network’s integrity.
     
  • Crypto Support: Devices can be setup to include multi-signature crypto wallets. These function as standard wallets, but require multiple sets of signatures to transfer funds. This allows a user to see and interact with the funds, but not transfer them until the operation or task is complete.

 

Localization Support

A tool is only powerful when people are able to use it, and there is currently a major gap in functionality for non-English users – and the problem is even worse for people without a desktop or laptop device. Xorre provides extensive localization support, greatly expanding the reach. 

  • Multiple Languages: Xorre takes advantage of the built-in localization tools available in Linux, and can provide tools in multiple languages (on demand), including: Arabic, Chinese, Russian, Turkish, Nigerian, and Hebrew. 
     
  • Graphical (Pictograph) Interface: Using a GUI, users can also interact with the tool in a purely graphic format, using accessibility widgets and diagrams to provide basic functionality to illiterate users.  
     
  • Front-end applications: The Xorre OS features a decoy application “running on top” of the secure tools, and this application can be customized to match a specific region – or even a specific company or organization.