One Man, One Stolen Laptop... And Twitter, Prey (And A Purple Sarong?) To The Rescue
from the and-a-purple-sarong dept
A whole bunch of folks have been sending in random versions of the story of how author Sean Power recovered his stolen laptop despite being in another country, thanks to the power of social media, some open source software and some good samaritans. The "short" version is that Sean had his laptop stolen a few days ago in New York City, just a day before he had to go to Canada for a few days. He had some open source anti-theft software on there, called Prey. I'd never heard of it, but it gets excellent reviews. Anyway, after not being alerted to anything for a few days, Sean suddenly was notified that someone was using his laptop -- and he mentioned it on Twitter. From there, it helps to follow the story on Twitter, and thankfully Ryan Ozawa used Storify to post the relevant tweets:Nick and the girl in the purple sarong then put up a video of what happened which is both mildly entertaining and mildly frustrating (and it's not hard to assume that the girl has consumed a fair bit of alcohol by this point -- and I think I have to agree with the Village Voice that she may be the most annoying woman in the world) Update: The video has been set to private. Reese is claiming it's to "protect the identity" of the girl -- which seems odd...
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: community, laptops, social networks, stolen, tracking down
Reader Comments
Subscribe: RSS
View by: Time | Thread
I hope this is real.
And thanks for the reminder. I'm going to install it on my new tablet now.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
Try to keep up.
[ link to this | view in chronology ]
Re:
What's ironic about it? It was public when I wrote the story and the guy later changed it to private, supposedly to protect the privacy of the woman.
[ link to this | view in chronology ]
FAIL
[ link to this | view in chronology ]
Re: FAIL
[ link to this | view in chronology ]
Re: FAIL
[ link to this | view in chronology ]
Re: FAIL
[ link to this | view in chronology ]
http://www.techdirt.com/articles/20110505/00424214164/laptop-rental-provider-sued-spying-r enters-via-surreptitious-webcam-software.shtml#c326
The "agent" running on the computer contacts a server not controlled by the computer's owner. The owner then logs into their account to trigger collection of information about the current user (thief). In both cases a thief will be caught by using surreptitiously collected information while the computer is being used. The differences are;
1) Is someone who defaults on payments the same as a thief?
2) There was apparently no process in place to deactivate the agent when the rented computer was purchased.
This brings up the following questions:
-When someone stops subscribing to Prey, is the agent still active?
-Is the user told how to completely deactivate the agent at that time?
-What mechanism prevents an admin for the Prey server from changing settings for an account and doing some snooping?
-What is to prevent someone lending out such a computer to an unsuspecting soul and doing a little snooping of their own?
-If law enforcement is aware that such software is installed on someone's computer can they do some remote viewing with a wiretap order, search warrant, subpoena, NSL, or none of the above?
[ link to this | view in chronology ]
Re:
The 2 situations are not equivalent
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re:
Instead, you can review the open source code for the client (or pay someone you trust to do it for you) and set it up to email you directly with any reports. You just have to set up a URL that the client can check to decide whether or not to go into "I've been stolen" mode.
Like any remote control software, it does create a new point of vulnerability for your system, but I expect many folks will consider the trade-off to be worth it.
[ link to this | view in chronology ]
I know the thief handed it all over in the end though so I guess that's the main thing.
[ link to this | view in chronology ]
[ link to this | view in chronology ]