Hill in the Field. Again.
"Answer to the riddle, more hidden than the crook / Only way to find it is to spit another hook" -- JJ DOOM, "Bookfiend"
Same forensic engine as Kill Shot. Same passive capture. Same chain of custody. Same self-destruct on misuse. Free for every veteran in Canada. Distributed by MCpl Jarr Hill (Ret) through his national peer support network.
Hill Shot captures system activity without ever injecting code, sending packets, or modifying the target. What it records is what was already happening. Every byte is hashed, encrypted, and logged.
The device never injects code, never sends packets, never modifies the host system. It observes and records what is already broadcast or accessible. Read-only. Always.
Every captured event is hashed with SHA-256 in a sequential chain. Each entry references the previous hash. Tampering breaks the chain and is immediately detectable. Court-admissible integrity.
All captured data is encrypted at rest using AES-256-GCM. Logs cannot be read without the research key. Even if the device is physically seized, the data is cryptographically protected.
If the device detects offensive use -- injection attempts, packet crafting, active exploitation -- it bricks itself. Firmware wipe. No recovery. The tool enforces its own ethics.
Hill Shot is distributed exclusively to veterans through Jarr Hill's national peer support network. Same forensic engine as Kill Shot, free of charge. Your service earned it.
Every Hill Shot report carries the machentagar.ca watermark. When institutions see it, they know who's in your corner. A research institute with a forensic standard and a track record. Fifty dollars for civilians. Free for you.
Every specification serves forensic integrity. No feature exists for convenience that compromises evidentiary value.
| Specification | Detail |
|---|---|
| Capture Mode | Passive only -- read, observe, record. Never inject. |
| Hashing Algorithm | SHA-256 sequential chain (each entry references previous hash) |
| Encryption | AES-256-GCM (authenticated encryption with associated data) |
| Anti-Misuse Protocol | Firmware self-destruct on offensive use detection. Irreversible. |
| Packaging | Tamper-evident seal with unique serial hash |
| Compatibility | Any USB-capable system. No drivers. No software. Standalone firmware. |
| Methodology | Published and peer-reviewable. Open research protocol. |
| Data Sovereignty | All data stays on-device. No cloud. No telemetry. No phone-home. |
| Classification | Research instrument. machentagar.ca Research Institute. |
Three steps. No configuration. No expertise required. The device handles everything from capture to encryption to chain-of-custody logging.
Plug Hill Shot into any USB port. The device initializes in passive mode. No drivers, no prompts, no installation. Silent start.
The device observes and records system activity. Every event is SHA-256 hashed in sequence. All data encrypted with AES-256-GCM. The chain of custody builds itself.
Remove the device. Decrypt logs with your research key. Verify the hash chain. Every entry is timestamped, hashed, and court-ready.
Frederick Banting sold his insulin patent for $1. Hill Shot costs veterans $0. The institutions that failed you pay the institutional rate. You pay nothing.
Unlimited use. Full forensic engine. No exceptions. No expiry.
Institutional licences available at machentagar.ca/killshot/