Physical flash drive data transfer with three factor hardware security.
No network required at any point. Drive authorizes specific machines. Compiler installs once — reusable. Data readable only on authorized hardware. Wrong machine gets noise. Nothing else.
- Python 3.8 or higher
- USB flash drive or any writable directory
- Linux / Mac / Windows with WSL
No pip dependencies. All standard library.
git clone https://github.com/comanderanch/hashkey-airgap
cd hashkey-airgap{
"message": "data to transfer via flash drive",
"operation": "your operation here"
}python airgap_creator.py data.json /media/your-usbReplace /media/your-usb with your flash drive path.
On Linux flash drives typically mount at:
/media/username/DRIVENAME
/mnt/usb
On Mac:
/Volumes/DRIVENAME
Output:
Drive ID generated
Fold sealed — 89 bits
Drive registry created
Max 2 machines can authorize
Physical delivery. No network. Nothing to intercept.
Insert flash drive. Navigate to drive:
cd /media/your-usbInstall compiler to this machine:
python ~/hashkey-airgap/airgap_drive.py installOutput:
Machine registered to drive
Machine ID: abc123...
Slot 1 of 2
Open the fold:
python ~/hashkey-airgap/airgap_drive.py openOutput:
Drive authorized — machine confirmed
Fold opened — 89 bits
Full payload visible
Drive is NOT burned. Reusable on this machine.
Already installed. Just open:
cd /media/your-usb
python ~/hashkey-airgap/airgap_drive.py openNo reinstall needed. Instant access.
No need for a new drive. From any authorized machine, inside the drive directory:
python ~/hashkey-airgap/airgap_drive.py update new_data.jsonOutput:
Fold updated — no new drive needed
New strand: 89 bits
Payload hash: xyz789...
Drive inserted in unknown machine. Drive checks registry. MAC not found.
Result:
Machine NOT authorized for this drive
Fold will not open
Drive appears inert to attacker
Attacker has drive but not authorized hardware. No fold access possible. Drive is inert. Data does not exist without the machine it was written for.
Drive allows 2 machines by default. Third machine tries to install:
Drive at capacity — 2 machines max
Cannot authorize new machine
Contact originator for new drive.
Factor 1 — Drive ID Sealed at creation. Unique per drive package. Wrong drive = blocked.
Factor 2 — Machine MAC Registered at first install. Compiler tied to MAC + Drive ID. Wrong machine = blocked.
Factor 3 — DNA Token Structure Payload encoded in 6-base pair fold. 89-bit strand. Without matching tokenizer = noise. Data does not exist without the system it was written for.
All three required simultaneously. No single factor is sufficient.
Check current drive state:
cd /media/your-usb
python ~/hashkey-airgap/airgap_drive.py statusOutput:
== DRIVE STATUS ==
Drive ID: abc123...
Strand: 89 bits
Max machines: 2
Authorized: 1
Open count: 3
airgap_creator.py creates drive package from data
airgap_drive.py install open update status on drive
data_to_fold.py JSON → 89-bit fold strand
color_fold_encoder.py RGB fold encoder
To connect flash drives to network protocol: See github.com/comanderanch/hashkey-bridge
Bridge enables:
- Network station authorizes drive
- Drive fold injects to network pipeline
- Network station issues trusted drives
- Neither protocol modified
- github.com/comanderanch/hashkey-standalone
- github.com/comanderanch/hashkey-bridge
- github.com/comanderanch/ai-core
MIT License — see LICENSE file Free to use, modify, and distribute with attribution.
This software is provided as-is for research and testing purposes. See DISCLAIMER.md for full terms. Use at your own risk. Not affiliated with Anthropic. Independent research project. Anthony Hagerty — Haskell Texas — 2026
Anthony Hagerty — Independent Systems Architect Haskell Texas — No retreat. No surrender.