Destruction protocols
When compromise crosses a defined threshold, Odin Tech does not negotiate. It escalates through final alerting, key destruction, and operational extinction.
What can initiate destruction
Failed Unlock Threshold
Repeated unauthorized attempts indicate hostile handling and can force the device into the destruction path.
Panic PIN
Under coercion, a dedicated credential can signal duress while silently initiating the terminal response chain.
Remote Command
If control is lost remotely, destruction can be triggered before the device becomes a forensic prize.
One final marker before silence
At the threshold of irreversible key deletion, the device transmits a final distress signal. That creates immediate confirmation of compromise, a final external alert, and a definitive audit marker.
Final state
The storage may still physically exist, but the data remains encrypted without recoverable keys, the operating system is gone, and the device is no longer meaningfully bootable or useful to an adversary.
