User: Password:
Subscribe / Log in / New account

Prey: Open source theft recovery

Prey: Open source theft recovery

Posted Jul 8, 2011 12:16 UTC (Fri) by ndye (guest, #9947)
In reply to: Prey: Open source theft recovery by dsommers
Parent article: Prey: Open source theft recovery

could even be instructed to wipe the encrypted drive(s), all based on the initial grub call

Here I suggest a number of grace reboots before wiping the owner's data, supporting the next suggestion.

the challenge is how to tackle wireless networks, where some require authentication, some networks are hidden/no ESSID broadcast ... and when the rightful owner tries to boot the laptop on a plane, where there are no networking available

How about a special, hidden key sequence (controlled by the owner) that opens a backdoor in the "fake" OS, to authenticate the owner when phone-home fails?

(Log in to post comments)

Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds