Another Stab at Laptop Security 316
kogus writes "LoJack is licensing its brand name to Absolute Software, which provides Computrace -- soon to be known as the 'LoJack for Laptops' line of computer theft recovery systems. When a stolen Computrace-equipped system is connected to the Internet, it automatically and silently sends locating data to Absolute Software, which then calls out the law. In some cases, Absolute Software customers are eligible for a $1,000 guarantee payment when a stolen system is not recovered within 60 days.
Yay (Score:4, Funny)
huh? (Score:5, Funny)
Re:Yay (Score:2)
Not secure at all. (Score:5, Interesting)
From TFA:
Unless you:
and/or
Nice illusion of security....wonder how many people will fall for it.
Re:Not secure at all. (Score:3)
Re:Not secure at all. (Score:2, Informative)
Re:Not secure at all. (Score:2)
It sure as hell is. You block everything except the few things you know you need or want. Most Win32 home firewalls also allow you to block specific applications.
It's rather trivial, actually.
And anybody who's going to swipe a laptop will probably wipe the drive with a reinstall because they won't be able to log into the system to poke around (unless they intend on hacking the login; again a rather trivial task once you have physical possession).
Re:Not secure at all. (Score:2)
Of course, the "phone home" message could be a garden variety http/s request. So unless you setup your firewall to deliberately block your own web access....
It's rather trivial, actually.
Re:Not secure at all. (Score:4, Interesting)
You probably want http, so the firmware could do http://www.laptopjack.com/report.pl?laptopid=AF31
The whole logic could be embedded in a boot rom on the card, with DHCP and all. Or, if you custom-made the ethernet card, it could even store the last IP address and gateway, and use that next time you boot if DHCP failed. You could even theoretically set it to do this every few hours or something when the network is idle-ish, so that if someone nabs it while its running and keeps it on all the time, it still gets a chance to report.
If you wanted to be REALLY tricky, you could hit other sites first and test for the presence of proxies or what not, then go through a few options, like SSL client authentication using a stored certificate to identify the laptop if a direct connection can be established. Or using just normal client SSL if a proxy that will allow it is detected. Or last ditch, http:
Re:Not secure at all. (Score:2)
Since the site itself tells me that this is nothing more than software, and that replacing an internal NIC (which almost every laptop sold today has) is prohibitively expensive (in most cases requiring a modified motherboard), I'll reiterate my comment about the blocking/discovery being quite trivial.
Set up a non-Internet-connected pen and see what tries to get out of your fully locked down firewall system. Remove offending code. Rinse, repeat.
Or, better yet, just boot from CD and wipe the drive (whic
Re:Not secure at all. (Score:5, Insightful)
Too late for what? For recovery? No. For prosecution of the thief? Probably. For prosecution of the moron who bought it and knew it was stolen? No.
It's unlikely anyone but the last buyer will even attempt to connect it to the Internet. So whether the police uses 12 weeks or 4 months to get to him doesn't matter much, they will still find the laptop, and someone to put in jail.
On the other hand, the mechanism only works on idiots. If I were to buy a stolen laptop (not that I'm into that kind of thing anyway), I would of course wipe it clean, just as I do with any other new or used computer that gets into my hands...
Re:Not secure at all. (Score:3, Insightful)
Why do you assume the buyer is aware they've just purchased a stolen laptop?
If I were a laptop theif I don't really imagine my target market is people who want stolen laptops (unless I steal so many I use a fence)... I imagine it's the ebay crowd, and perhaps I'm rebranding them as company used decommissioned laptops to explain the pre-installed crap. Or maybe I'm at a swap meet dumping them relatively cheap etc.
Alot of buyer
Re:Not secure at all. (Score:5, Funny)
Nah, it's easy. Just set Inside Any -> Outside Any -> Service Any -> Deny and hit then add it ^&^&^&$&%&^[NO CARRIER]
Mod AC parent up :) (Score:2)
Re:Not secure at all. (Score:3, Interesting)
I just did that for real last week. Some guy came over and wanted to know how to tweak
Re:Not secure at all. (Score:5, Informative)
Here's a snippet from their website [absolute.com]:
Doesn't look like it's on firmware to me...
Re:Not secure at all. (Score:2, Interesting)
Re:Not secure at all. (Score:2, Interesting)
you just fdisk
Re:Not secure at all. (Score:3, Informative)
Re:Not secure at all. (Score:2)
If someone steals a machine with the intent to stealing confidential information (god knows what people store on their laptops these days) then this sytem might be worth the money.
Regardless of intended use its more likely that someone in this line of espionage would know about this software and have a disconnected LAN they can use to dissect the machine on, and if its just simple
Re:Not secure at all. (Score:2)
How do you figure? All I have to do is dump the data while airgapped. Problem solved.
Re:Not secure at all. (Score:2)
Don't forget the 'might'.
Like I said, I'm not convinced.
Re:Not secure at all. (Score:2)
Then worry about the data, not the hardware (Score:3, Informative)
Re:Not secure at all. (Score:2)
If I steal a laptop for the data on it the first thing I'm going to do remove the hard drive then trash the laptop. It's harder to trace a hard drive than the laptop. Then I'm going to hook the harddrive up to a decicated computer and mount it instead of putting it into another computer and booting off of it.
Once I have the data I'm goign to trash the harddrive.
Re:Not secure at all. (Score:2)
While no half-competent crook will let himself be caught this way, all that counts is whether (price_of_Computrace)/(probability_of_laptop_bein
Re: (Score:3, Insightful)
Re:Not secure at all. (Score:2)
"You['re] right, security is an illusion, and some people prefer to turn a blind eye rather than look at the root cause."
You were ranting on about data / network security which is a little different than physical security. Try and guess where most laptops are physically stolen from? Give up? The airport where bagage handlers are usually the guilty party. Not too long ago they made a whole slew of arrests here in my city of bagage handlers who stole laptops, cameras, camcorders, etc.. from pe
Re:Not secure at all. (Score:3, Interesting)
- How many corporations continue to run MS IIS to drive their corporate websites?
- How many people continue to run IE?
- How many people continue to run Windows and download the latest spyware infected software because it's trendy, even after they've had their computers infected countless times?
Your right, security is an illusion, and some people prefer to turn a blind eye rather than look at the root cause.
II
Re:Not secure at all. (Score:3, Insightful)
Yeah. You missed the fact that all of the IIS advisories were remote access vulnerabilities, while the Apache advisories were mostly DoS attacks and local privilege escalation.
Re:Not secure at all. (Score:2)
Re:Not secure at all. (Score:3, Insightful)
Depends on what kind of thief we're talking about.
I shouldn't have to go into that kind of detail, though. Just because one can semi-easily get around it doesn't mean it's worthless. I mean, that'd be like saying "Welp, why bother locking the door? They'll just break the window."
Let's talk about reality for a moment: It has been widely known, for DECADES, how to avoid leaving fingerprints at the scene of a crime. Despite being b
Re:Not secure at all. (Score:2)
Worse than just an illusion... (Score:5, Interesting)
We had a laptop stolen and called it in.
"Oh, you need to file a police report"
Fine, so we get the numbnuts who lost it to file the report and give us the report number.
"Okay, yes... we have recieved a call home from the laptop, and we know where it is!"
Great! Now when do we get it back?
"Wellll, you cant..."
and it just got worse from there. The police wouldn't retrieve the laptop, and these clowns wouldn't tell us where the machine was. But at least we knew:
- it was in fact stolen and not in the hands of the numbnuts employee
- it was in fact connected to the internet, being used, right then
- we couldn't get it back
- someone was at least enjoying their brand new laptop...
damnnit! This shit just annoys me. I'm going home.
Re:Worse than just an illusion... (Score:5, Interesting)
and Computrace wouldn't share the location of the stolen laptop, she was nice to tell me that they were online with it right now though.
Jesus Christ, it was a waste of money
Re:Not secure at all. (Score:4, Informative)
I also wondered about that as well, so I jumped on the website and did a bit of research before posting here.
FROM FAQ
Q. Can ComputracePlus be detected?
A. On most PCs, the Computrace Agent, which powers ComputracePlus, is silent and invisible and will not be detected by looking at the disk directory or running a utility that examines RAM. On many PCs - depending on their operating system - the Agent cannot be erased off the hard drive by deleting files because it is not visible in file directories. The Agent can survive a hard drive re-format, F-disk command and hard drive re-partitioning. The Agent can be removed by an authorized user with the correct password and installation software.
On a Mac system, it is very difficult for a standard user to deliberately or accidentally delete the Agent as the files cannot be deleted by anyone other than the root user.
Q. What happens if a computer's hard drive is removed? A. The Computrace Agent resides on a computer's hard drive so if the drive is removed and installed on another computer, the Agent will initiate contact with the Monitoring Center at its next scheduled call. It will then report its new location. The original computer will no longer be protected.
manufacturers (Score:5, Funny)
Re:manufacturers (Score:2)
yeah, but after the 12 minutes are up it's not much fun anymore, so then what? Wait for the cops to show up by looking at all them viagra pop up windows?
Most Stolen Laptops are stripped within minutes (Score:5, Funny)
Not most, but many (Score:2)
Re:Most Stolen Laptops are stripped within minutes (Score:2)
The more organized car heists either go to a chop shop or are put on a boat overseas.
There's no point canibalizing a laptop when it can easily be taken in one piece. What you meant to say was that the laptops are put on a boat for overseas countries within minutes...
Where perhaps they're to be used as spam relay bots?
Maybe I'm a little high, but... (Score:3, Funny)
Re:Maybe I'm a little high, but... (Score:2)
Ah... (Score:3, Interesting)
2. Purchase $100 security
3. Purchase $100 spyware remover
4. "Lose" laptop
5. Wait 60 days
6. Profit $300 for 60 days work
7. GOTO 1 (I never spaced lines by 10, what was up with that)
Re:Ah... (Score:2)
For example, if you'd written:
1. Purchase $500 laptop
2. Purchase $100 security
3. Purchase $100 spyware remover
4. Wait 60 days
5. Profit $300 for 60 days work
6. GOTO 1
You'd have to add line 4, the "lose" laptop option. Then you'd have to rewrite lines 5 and 6 then add line 7.
On the other hand, if you'd written:
10. Purchase $500 laptop
20. Purchase $100 security
30. Pu
1980 called... (Score:3, Funny)
Re:Ah... (Score:5, Informative)
The idea was that if you needed to insert a line or two at some place in your program, you'd be able to do so without renumbering all lines.
Fractional line numbers (Score:3, Funny)
5½ GOTO 3.1
No renumbering required, problem solved!
Yes, I know what you are thinking: what if we run out of fractions? Don't worry though! In such emergencies, you can start using irrational line numbers. There are tons of those, so you will never run out. This does tend to increase the size of the program considerably, so they should only be used as a last resor
Better than some other options (Score:5, Funny)
Well, if you work in IT, at least you'd be getting a raise.
Dissapointed (Score:2)
I always thought God could get better than a
Questions (Score:3, Interesting)
Locating Data (Score:2)
Re:Locating Data (Score:2)
<LOJACK_Loc_DATA>HELP ME!!!!</LOJACK_Loc_DATA>
<LOJACK_Loc_DATA_Response>What seems to be the problem?</LOJACK_Loc_DATA_Response>
<LOJACK_Loc_DATA>I've fallen....AND I CAN'T GET UP!!!</LOJACK_Loc_DATA>
<LOJACK_Loc_DATA_Response>Where are you? Can you describe your location?</LOJACK_Loc_DATA_Response>
<LOJACK_Loc_DATA>HELP ME!!!!</LOJ
Worthless unless... (Score:3, Insightful)
Hardware, or software? (Score:5, Interesting)
The spyware and firewall questions seem important as well - if this is just a "Hey, this is box XYZ and I'm at this IP address", talking to lojack's servers, well, fine, but how does the end-user know that they haven't blocked that with their firewall?
I'd love to see something technical on this, rather than some stock-tip-guy's interpretation.
Re:Hardware, or software? (Score:2)
Most likely they are putting code on the disk and in the flash.
I've administered computrace.... (Score:3, Informative)
Call out the law?? (Score:3, Interesting)
What does that mean?
Is there some law organisation in the USA that you can call saying "my laptop has been stolen and it is now on the internet at address 333.444.555.666" which will then go out to locate your laptop and return it to you??
Teh Internets Police! (Score:2)
Re:Teh Internets Police! (Score:2)
But I think it would be useless here to report something like this to the police. They will put your report on some stack of "nice things to do should we have some time left" and it will be assigned zero priority.
Re:Call out the law?? (Score:3, Funny)
Rappel down the side of the building, smash the window, flashbang the room. Whack the 15 year old who stole your laptop in thw chest with a CS grenade.
Re:Call out the law?? (Score:4, Funny)
roundup! (Score:3, Funny)
Well sonny I work for these here boys, and when I get a tellygram, I hop on my trusty steed 'Mac', and he and I head on down to russle me up some lappies. 'casionally I hook up with m' associate Ping; she's a real darlin' and knows how to ferret out the sneakiest son-of-a-guns, even them C
Re:Call out the law?? (Score:3, Funny)
Fuck that. Just give me the address of the fuck tard that stole my laptop. I'll go round up some goons and recover it mysel...
So what this tells me... (Score:2)
On the other hand, if thieves think will get busted by stealing laptops, this helps everyone. Schneier has an interesting note on his blog [schneier.com] about lo jacks in cars benefiting everyone.
I want a Q model James Bond. (Score:2, Funny)
First law of data security... (Score:3, Interesting)
Computrace is a piece of client software that "phones home" on a regular basis. It provides NO protection against things like formatting the hard drive before connecting to the Internet. http://www.absolute.com/Public/products/techplatf
Oooo... it uses an ENCRYPTED connection. Explain to me how this stops "fdisk; format c:" or "fdisk; mkfs
This must be designed to nab the stupid criminal, who jacks in as soon as they boot.
On the other hand, with the prevalence of open WAPs, it is quite possible a laptop with a built-in wireless NIC will connect and phone home before the hapless thief realizes it.
-Charles
hardware solution (Score:2)
"Guaranteed" is a loose term these days (Score:5, Informative)
I used to work for a computer store. We sold scores of laptop locks; all sorts of kinds of them. The Kensington locks sold like hotcakes because they had a $1,200 "guarantee" that the lock could not be compromised. The problem, we soon found out, is that the theif has to physically cut through the lock and leave behind the pieces. As we all know, some locks can be picked with even a bic pen [slashdot.org], and so a lot of good this "guarantee" did for some poeple. Some theives also just took the not-so-hard-to-steal item the laptops were attached too. (Lock it to a bed or desk people, please!)
No evidence to send in, no money back. I am willing to bet in this case there are similar loopholes for Absolute Software to play with.
--
Check out the Uncyclopedia.org
The only wiki source for politically incorrect non-information about things like Kitten Huffing [uncyclopedia.org] and Pong! the Movie [uncyclopedia.org]!
Solution: Buy a second lock. Break it. Send parts. (Score:2)
Were *I* in this position, I'd buy a second lock, break it, leave pieces of it lying around the area where the notebook was stolen, take a photo, and then proceed to make my claim.
Of course, there there is no way I would *really* do that officer...
corporations (Score:3, Insightful)
I think companies would be even more interested if there was a "kill-laptop" feature. So if the owner of the laptop goes to the IT department and says "my laptop was stolen!" (or lost), then they activate a flag so that when the laptop makes its secret connection, it receives a signal to erase itself, thereby protecting valuable company data. For many companies, protecting the data on the laptop might be more valuable than the laptop itself.
On the flip side, I would think that most people who steal laptops are going to wipe them or snoop around in them for awhile before connecting to the net and surf for porn. So this should hardly be viewed as a perfect solution for catching thieves (although WiFi certainly helps).
Re:corporations (Score:2)
It is amazing what you can do remotely with a stolen laptop before the thief notices anything. [wired.com]
Above article is a story about a guy who retreives his sister's computer by using Timbuktu Pro (a VNC like client/server solution fo
Re:corporations (Score:2)
Wow, What Garbage (Score:5, Informative)
From the website: www.absolute.com
Q. Can Computrace Personal be removed?
A. The Computrace Personal software is a low-level utility that is as tamper resistant as a disk-based utility can be. The software can only be removed by an authorized user with the correct password so please be sure the password is stored in a safe location and not on the protected computer.
Q. What happens if a computer's hard drive is removed?
A. The software resides on a computer's hard drive so if the drive is removed the computer will no longer be protected and can not be located if stolen or lost.
http://www.absolute.com/Public/computracepersonal
Wow, what great protection.
Come on!!!!! This ain't even hardware!!!
Boot any one of the many live *nix distro's (Score:2, Interesting)
Oh, I get it - it's just designed to recover stolen laptops from non-slashdot readers
$1000? please... (Score:3, Insightful)
Re:$1000? please... (Score:2)
The data shouldn't even *be* on a laptop in the first place.
What exactly does an HR person need to do remotely? Keep sensitive data on an internal server and use a VPN to access it.
and for my information? (Score:3, Funny)
Not just stolen! (Score:5, Interesting)
Our PHB ordered it installed after getting a call from a golf buddy. It was ripped out a week later. The heartbeats contain enough [cleartext] information that the increased chance of the laptop being broken into, or the salesguy socially engineered using the info was deemed higher than the chance it'd ever be stolen.
like cell phones (Score:2, Interesting)
However even the young kids who casually steal cell phones appear to have some sophistication, and are able to reprogram or wipe phones for resale.
Given that wiping and reinstalling the OS for laptop is trivial compared to reprogramming a phone, I do not see how this would stop anyone but the most casual of laptop thief.
I w
Nice marketing idea, but... (Score:5, Interesting)
--
watch funny commercials [tubespot.com]
A fool and his money. (Score:2)
I seriously can't believe this concept ever got past the drunken-scheming-businessplan-on-a-napkin phase.
Yes, this might catch your average completely clueless snatch-and-grab thief, but I wonder how often those guys go through the trouble of connecting a stolen laptop to an internet connection anyway?
What would be really fun is to report some PHB's laptop stolen while he's on a business trip with this software installed
How does the computer know it's stolen? (Score:2, Interesting)
I'm not entirely sure how the LoJack on cars works, but I seem to recall it requires you to report the theft, and then the cops/LoJack have some means for tracking the car's device. With a physical device, this might not require an always-transmitting approach so much as always-ready-to-transmit - that is, it could have enough battery power to start transmi
I can beat this... (Score:2, Funny)
These situations are just fodder for more posts, so why noy enjoy it?
Re:I can beat this... (Score:2)
I asked for this 10 years ago (Score:2, Interesting)
A better solution is to make it work like the car LoJacks - when the unit receives an "I'm stolen" message it replies with its location. Only major problem would be power - if a theif removed the batteries it could be a long time before some sucker replaced the batteries, and by then LoJack might've stopped broadcasting.
Of course, any kind of security won't work well if it can be disabled or removed without disabling
Why not intergrate a GSM/GPRS radio? (Score:2)
One way around that is to put in a celluar radio, not only will it allow net access almost anywhere where coverage exists, it can be used to call home and do lots of things easily. Perhaps port LinuxBIOS to the laptop (if you can get the docs) and set it to self destruct on bootup remotely, not sure if any trapping is possible v
Gee, let's start a scam.... (Score:2)
1: get a laptop
2: install this "security" software
3: report laptop stolen
4: wait 60 days
5: put in claim for money
6: profit
Just because I claim it's stolen and make sure I don't plug it into the internet for 60 days, or claim it's stolen then wipe the drive clean, does that mean I can make $1000??
It sounds about as ridiculous as
1 - collect underpants
2 - ???
3 - profit
Re:Gee, let's start a scam.... (Score:2, Informative)
1. get x
2. insure x
3. report x stolen
4. claim insurance
5. profit
its called fraud.
Re:Gee, let's start a scam.... (Score:2)
Re:Gee, let's start a scam.... (Score:2)
Calls out the law? Yeah, riiiight! (Score:2)
And the law proceeds, uninterrupted, with their donut break.
Seriously, "the law" doesn't pursue stolen cars all that aggressively. Instead, they say, "we'll take a report that you can turn in to your insurance company. What? You didn't have theft insurance? You're one dumb sonofabitch." The manufacturer implies that, once th
New business model (Score:2)
2) Install Computrace
3) Throw laptop away and file police report as stolen
4) Apply to Computrace for $1000 guarantee
5) Profit!
Re:woulda read it... (Score:2)
Re:woulda read it... (Score:3, Informative)
Have TFA anyway, if it makes you feeel any better
LoJack for Your Computer
By Michael Jaffe
July 6, 2005
Last week, LoJack (Nasdaq: LOJN) announced the dawning of a new era in data recovery.
What? Is the groundbreaking gorilla of stolen vehicle recovery committing Peter Lynch's cardinal sin of deworsification into the unrelated field of hard-drive hacking? Not really.
LoJack is licens
Re:woulda read it... (Score:2)
you troll...
here's the coral cache anyhow http://www.fool.com.nyud.net:8090/Server/foolprin
Popup annoyance. (Score:2)
It was a stupid popup. Just close it and read the article.
The AdBlock and FlashBlock extensions to Firefox are excellent, but somehow that site found a way around them.
--
Bush lied. 100,000 died. Violence & lying show a lack of social sophistication.
Re:what happens? (Score:2)
Re:software? (Score:2)
Again, here's a snippet from their website [absolute.com]:
It's looking a lot like software...
Re:My solution for thiefs (Score:2)