Irreversible Response

Destruction protocols

When compromise crosses a defined threshold, Odin Tech does not negotiate. It escalates through final alerting, key destruction, and operational extinction.

Trigger Conditions

What can initiate destruction

Failed Unlock Threshold

Repeated unauthorized attempts indicate hostile handling and can force the device into the destruction path.

Panic PIN

Under coercion, a dedicated credential can signal duress while silently initiating the terminal response chain.

Remote Command

If control is lost remotely, destruction can be triggered before the device becomes a forensic prize.

Last Signal Protocol

One final marker before silence

At the threshold of irreversible key deletion, the device transmits a final distress signal. That creates immediate confirmation of compromise, a final external alert, and a definitive audit marker.

Final state

The storage may still physically exist, but the data remains encrypted without recoverable keys, the operating system is gone, and the device is no longer meaningfully bootable or useful to an adversary.

No overwrite requirement to achieve finality
No recovery exception path
No forensic artefacts of value