Prey: Open source theft recovery
Posted Jul 8, 2011 12:16 UTC (Fri) by ndye
In reply to: Prey: Open source theft recovery
Parent article: Prey: Open source theft recovery
could even be instructed to wipe the encrypted drive(s), all based on the initial grub call
Here I suggest a number of grace reboots before wiping the owner's data, supporting the next suggestion.
the challenge is how to tackle wireless networks, where some require authentication, some networks are hidden/no ESSID broadcast ... and when the rightful owner tries to boot the laptop on a plane, where there are no networking available
How about a special, hidden key sequence (controlled by the owner) that opens a backdoor in the "fake" OS, to authenticate the owner when phone-home fails?
to post comments)