You are not logged in.
Pages: 1
I just wanna tell you about a new wonderfull app I've found: prey. This little scripts keeps track of what is being done with your laptop, takes a screenshot and a picture of the user (if webcam available) and sends it to your email.
It's just perfect!!
prey.bootlog.org
All your base are belong to us
Offline
I just wanna tell you about a new wonderfull app I've found: prey. This little scripts keeps track of what is being done with your laptop, takes a screenshot and a picture of the user (if webcam available) and sends it to your email.
It's just perfect!!
prey.bootlog.org
If I'd steal/find a laptop, first thing I'd do would be to browse it, then reinstall. Doubt anyone would take it home and hook it up to the internet. Muggers/thiefs aren't that dumb...after all...they did manage to take it away from you
MacGregor DESPITE THEM!
7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
Offline
wouldn't even work because my hd is encrypted. lal
Offline
If I'd steal/find a laptop, first thing I'd do would be to browse it, then reinstall. Doubt anyone would take it home and hook it up to the internet. Muggers/thiefs aren't that dumb...after all...they did manage to take it away from you
You can always lend your laptop to a friend and then spy on him. A nerdy gadget.
My Elegant Pattern GTK theme.
My game development blog, now on a new site.
'~/.xinitrc is an Archer's DE' - moljac024
Offline
wouldn't even work because my hd is encrypted. lal
Yeah..those are really impossible to reuse
MacGregor DESPITE THEM!
7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
Offline
arch0r wrote:wouldn't even work because my hd is encrypted. lal
Yeah..those are really impossible to reuse
lol
The day Microsoft makes a product that doesn't suck, is the day they make a vacuum cleaner.
--------------------------------------------------------------------------------------------------------------
But if they tell you that I've lost my mind, maybe it's not gone just a little hard to find...
Offline
Pretty cool little script. I have it set up to run on boot, and start of any graphical environment. Gonna figure a way to make it a true daemon so I can stop and start it easily. Don't need it taking pictures of me all the time...
Offline
I seriouslly wouldn't recommend anyone use this thing..it's a security issue that you actually chose to have..not cool at all..
MacGregor DESPITE THEM!
7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
Offline
I seriouslly wouldn't recommend anyone use this thing..it's a security issue that you actually chose to have..not cool at all..
How so?
Offline
Wra!th wrote:I seriouslly wouldn't recommend anyone use this thing..it's a security issue that you actually chose to have..not cool at all..
How so?
Would you really want your laptop to have the option of sending a picture of yourself over the internet everytime you boot it? The example "success" case has nothing to do with this application, plus it's a lucky case... I doubt this will help 1 in 1000 users grab their laptops back
MacGregor DESPITE THEM!
7f 45 4c 46 01 01 01 00 00 00 00 00 00 00 00 00
Offline
How about this setup:
- Make an extra grub entry called "rescue root" or "admin" or something
- Have it mount a vanilla/minimal ubuntu with sudo removed on a spare partition or something
- Spread some "random secret files" or something, stuff that looks personal, generate a huge mess in some subfolder.
- Create some imaginary Email accounts with saved encrypted passwords (or ICQ or something)
- Put some fake ebay, paypal, WoW, etc. mails into thunderbird. Stuff like "Password retrieval mails". (THAT's bait.)
- Put an sshfs mount to a nonexistant server and a "full access" in fstab and a imaginary "full access" ssl key in home directory... or something
- Install some crappy games, spread multiple starters to each of them all over the desktop, mixed with random downloads and stuff (everything that makes the owner look more stupid and thus harmless).
- Integrate your script as invisible daemon on "rescue root" runlvl 1 or something
Me like Paranoia!
*warning, thread might contain a lot of "or something's"!
Offline
SkonesMickLoud wrote:Wra!th wrote:I seriouslly wouldn't recommend anyone use this thing..it's a security issue that you actually chose to have..not cool at all..
How so?
Would you really want your laptop to have the option of sending a picture of yourself over the internet everytime you boot it? The example "success" case has nothing to do with this application, plus it's a lucky case... I doubt this will help 1 in 1000 users grab their laptops back
I rarely reboot and restart Openbox maybe once or twice between reboots, so it really doesn't send anything from my e-mail account to my other e-mail account very often. It's also not about sending out a picture of yourself, it's intent is to send out a picture of whoever's sitting behind your computer at boot time.
Yeah, the case shown doesn't use this, but it's the same general idea. A picture is better than nothing.
Offline
@whoops: That's a rather clever idea. If you disable the autoboot feature in Grub, and add your real partitions that you actually use in a secondary menu that says something like "Maintenance junk" and have "Ubuntu 8.04 blah blah some kernel that's out of date" as the first selectable boot option... That way you do not need to dedicate a huge partition to it.
I keep getting distracted from my webserver project...
huh? oooh... shiny!
Offline
What if the thief is away grabbing some coffee, while the laptop boots
Offline
Or if the thief boots the laptop while he doesn't have any internet access ?
The day Microsoft makes a product that doesn't suck, is the day they make a vacuum cleaner.
--------------------------------------------------------------------------------------------------------------
But if they tell you that I've lost my mind, maybe it's not gone just a little hard to find...
Offline
I see the usefulness of this program. Granted if any of us were to take a laptop we'd know what to do. If we wanted to browse the disk we'd use a livecd. But if a coworker, student, or general person would steal it they'd be clueless. More than likely they'll have no idea how to operate our machine. However, if there is some type of open wlan network you might have a fighting chance of recovering your laptop. As it would probably only take 30 seconds to send the email with a an attachment.
According to the site it checks to see if a url exists. So from my understanding it will only activate when that url exists, but by the time you activate the url it might be to late. This would be a great program to have for a college student. Most campuses have unprotected wlan networks and laptop theft in colleges is high.
Offline
Or if the thief boots the laptop while he doesn't have any internet access ?
Well, this one is very likely, it makes the whole script be not so useful, since laptops rely mostly on wireless and most wireless networks have encryptions. Having said that all wireless networks withouth encryption won't be started autmatically, you ahve to connect to them. So the question is, will the script take the photo as soon as it connects? Anyways, I know that if he is a thief, he uses Windows so he wouldn't know how to connect a wireless network in Linux.
Another case scenario, he boots the laptop and see Arch Linux scrolling, he gets scared and turn it off, reinstalls with windows on the next boot.
Offline
moljac024 wrote:Or if the thief boots the laptop while he doesn't have any internet access ?
Well, this one is very likely, it makes the whole script be not so useful, since laptops rely mostly on wireless and most wireless networks have encryptions. Having said that all wireless networks withouth encryption won't be started autmatically, you ahve to connect to them. So the question is, will the script take the photo as soon as it connects? Anyways, I know that if he is a thief, he uses Windows so he wouldn't know how to connect a wireless network in Linux.
Another case scenario, he boots the laptop and see Arch Linux scrolling, he gets scared and turn it off, reinstalls with windows on the next boot.
Yes, it attempts to connect to any networks in range.
It's obviously not designed to catch everything, so if someone were smart enough to explore the HDD with a livecd and then format, you'd be SOL. But again, a slim chance is bwtter than no chaznce.
Offline
I have of those free subdomains so i can connected to my computer without remembering my ip address... now my isp is setup to give me an ip address dynamically, so i have to use ddns... as a cron job every hour it checks to see if it needs updating to a new ip address. I also run ssh on this computer. Now if someone stole it all and connected it to the internet all I would have to do is to ssh to my domain. You could do the same with a laptop.
Offline
kensai wrote:moljac024 wrote:Or if the thief boots the laptop while he doesn't have any internet access ?
Well, this one is very likely, it makes the whole script be not so useful, since laptops rely mostly on wireless and most wireless networks have encryptions. Having said that all wireless networks withouth encryption won't be started autmatically, you ahve to connect to them. So the question is, will the script take the photo as soon as it connects? Anyways, I know that if he is a thief, he uses Windows so he wouldn't know how to connect a wireless network in Linux.
Another case scenario, he boots the laptop and see Arch Linux scrolling, he gets scared and turn it off, reinstalls with windows on the next boot.
Yes, it attempts to connect to any networks in range.
It's obviously not designed to catch everything, so if someone were smart enough to explore the HDD with a livecd and then format, you'd be SOL. But again, a slim chance is bwtter than no chaznce.
That's right what I mean.
All your base are belong to us
Offline
How about this setup:
- Make an extra grub entry called "rescue root" or "admin" or something
- Have it mount a vanilla/minimal ubuntu with sudo removed on a spare partition or something
- Spread some "random secret files" or something, stuff that looks personal, generate a huge mess in some subfolder.
- Create some imaginary Email accounts with saved encrypted passwords (or ICQ or something)
- Put some fake ebay, paypal, WoW, etc. mails into thunderbird. Stuff like "Password retrieval mails". (THAT's bait.)
- Put an sshfs mount to a nonexistant server and a "full access" in fstab and a imaginary "full access" ssl key in home directory... or something
- Install some crappy games, spread multiple starters to each of them all over the desktop, mixed with random downloads and stuff (everything that makes the owner look more stupid and thus harmless).
- Integrate your script as invisible daemon on "rescue root" runlvl 1 or somethingMe like Paranoia!
*warning, thread might contain a lot of "or something's"!
I did something like this. The system was archlinux, but with a nice splash screen (so as not to scare the theif) and a firefox autostart with a random email account autologin. Instead of this script to take pictures, my script shredded the hard drive, repartitioned it, filled it with random data, then re-shredded it, and emailed me. After all that was done, it left one file one one NFTS partition on the disk, with my contact details, and stating that the machine was stolen (so if the thief got someone else to recover data from it/get it working again, they would see it). As for protecting from livecds, I locked my BIOS.
Consistency is not a virtue.
Offline
People who use linux everyday cannot use my laptop anyway. My setup is too complicated. Like my mind.
urxvtc / wmii / zsh / configs / onebluecat.net
Arch will not hold your hand
Offline
whoops wrote:How about this setup:
- Make an extra grub entry called "rescue root" or "admin" or something
- Have it mount a vanilla/minimal ubuntu with sudo removed on a spare partition or something
- Spread some "random secret files" or something, stuff that looks personal, generate a huge mess in some subfolder.
- Create some imaginary Email accounts with saved encrypted passwords (or ICQ or something)
- Put some fake ebay, paypal, WoW, etc. mails into thunderbird. Stuff like "Password retrieval mails". (THAT's bait.)
- Put an sshfs mount to a nonexistant server and a "full access" in fstab and a imaginary "full access" ssl key in home directory... or something
- Install some crappy games, spread multiple starters to each of them all over the desktop, mixed with random downloads and stuff (everything that makes the owner look more stupid and thus harmless).
- Integrate your script as invisible daemon on "rescue root" runlvl 1 or somethingMe like Paranoia!
*warning, thread might contain a lot of "or something's"!
I did something like this. The system was archlinux, but with a nice splash screen (so as not to scare the theif) and a firefox autostart with a random email account autologin. Instead of this script to take pictures, my script shredded the hard drive, repartitioned it, filled it with random data, then re-shredded it, and emailed me. After all that was done, it left one file one one NFTS partition on the disk, with my contact details, and stating that the machine was stolen (so if the thief got someone else to recover data from it/get it working again, they would see it). As for protecting from livecds, I locked my BIOS.
My BIOS is locked and so is grub (so someone can't just go into runlevel 1 ), but resetting the BIOS password is always an option - it is harder for laptops, but it is definitely doable.
The day Microsoft makes a product that doesn't suck, is the day they make a vacuum cleaner.
--------------------------------------------------------------------------------------------------------------
But if they tell you that I've lost my mind, maybe it's not gone just a little hard to find...
Offline
I know this is an old topic, but still relevant, I think.
Most of these replies are discussing a thief using the laptop and getting your personal data. Sure, just by using Linux we are making it more difficult for the average thief to do anything useful.
But it seems to me that Prey is not about protecting your data. It's about recovering the device.
It's like the Droid app "Where's My Droid." iPhones have similar ones. It turns on the necessary utilities and helps you locate it when it is either lost or stolen. I think it is silly to /not/ have an app like this. To /not/ have a lost/stolen plan.
So what's your plan of action if you lose your laptop in a coffee joint (i.e. travel a lot with it and days after not using it you don't know where you last left it) and/or someone steals your computer (i.e. leave it for a second unattended at a coffee shop or something and it's lifted)? Assuming you have things properly protected so that is not an issue. Can you recover the device? Do you even have an option to do so even if the chances are slim?
As far as I know, software like Prey are the only potential possibilities to recover the device.
I'm just looking into it now, but if it requires an open wireless network, I think it's useless. If it works once it is connected, sure, useful. For my setup at least. Doesn't take a genius to see a wireless looking icon on the taskbar and click on it to get the wicd gui. Anyone should be able to connect to their own wireless network with the gui available.
Then again, if they steal it, they have to login to an account, yes? I doubt a thief could hack into my account. We're talking very few thieves are technical enough for that. Statistically zero. I guess a simple account password prompt might make Prey useless for me.
Offline
Pages: 1