How to integrate Prey into the security posture of your Linux PC

Prey Web UI anti-theft

Prey is a cross-platform (Android, Linux, iOS, Mac OS X, and Windows desktop) anti-theft tracking software that, when installed and activated on a supported device, makes it possible to remotely locate, lock, wipe and recover it, if it’s stolen or missing.

It’s a good piece of software to install on your Linux computer, whether that computer is a desktop or a notebook.

And the best part is, it’s free software, with the source code hosted on GitHub. If you’re curious, you may view the source code of the various components at github.com/prey.

So how does Prey work?

Prey

Simple. You set up an account at https://preyproject.com/, then install an agent on your computer or computers that you wish to protect. It doesn’t necessarily have to take place in that order, but both tasks must be completed for the service to work. The service has a free and a Pro version, which starts at US$5.00/month.

Once the device is activated, you can begin to monitor it from the browser-based interface. If the device is stolen or missing, you can take a number of actions from your account, like lock or wipe it. Snapshots of the desktop or of whoever is sitting in front of the device can also be taken.

Related Post:  How to create MBR-based disk partitions for Antergos

Provided your computer has WiFi access, Prey can geolocate it, which will help in its recovery. Many such recoveries have been reported from around the world, including from countries like Chile, Iran and South Africa.

recovered computer courtesy of Prey

So you see, Prey is a very useful piece of software.

Since Prey works only after the computer is powered on, what happens if the computer’s hard drive is encrypted?

In that case, the new “owner” of the computer will not be able boot into the system, which means (s)he can’t access your data. The flip side of that is the Prey agent can’t call home, which means you won’t be able to recover yoour computer.

So that’s something to consider when evaluating Prey. What’s more important? Being able to recover your computer, which might not happen, even with Prey installed, or making sure that nobody but you can access your data, which is the peace of mind you get from encrypting the hard disk.

Related Post:  OpenSSH Server Installation on Linux Mint 6

Tough decision!

Here’s what I’ll do – forgo Prey, encrypt the disk and have a backup system in place. There are other physical security measures you can take to frustrate whoever gains unauthorized, physical access to your computer besides encrypting the disk, but that’s usually enough.

The other option is to install Prey and still encrypt the disk, so that in the unlikely event the disk is decrypted without the configured passphrase, Prey will be able to call home and hopefully, help you recover the unit. If you go this route, remember to also have a backup system in place. You can’t lose your data by backing it up.

This screenshot shows the Prey Web UI before any device is registered.
Prey Web UI

And this one shows the same interface after a device has been registered and is being tracked.
Prey Web UI anti-theft

Share:

Share on facebook
Facebook
Share on twitter
Twitter
Share on pinterest
Pinterest
Share on linkedin
LinkedIn

Hola! Did you notice that LinuxBSDos.com no longer run network ads?  Yep, no more ads from the usual suspects that track and annoy you across the Internet. But since I still need to pay to keep the site running, feel free to make a small donation by PayPal or your favorite cryptocurrency.

  • Bitcoin
  • Ethereum
  • Xrp
  • Bitcoin cash
  • Bitcoin sv
  • Litecoin
  • Binance coin
  • Cardano
  • Ethereum classic
Scan to Donate Bitcoin to bc1qzvlte2m224zkayhdc7fdfjkp2rsgt0l5a496ua

Donate Bitcoin to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin

Scan to Donate Ethereum to 0x0F4362DFF77F3Ba0Dc637F5f3Eba35D09a2fA60C

Donate Ethereum to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum

Scan to Donate Xrp to r4ggjvL36njsMCYTkJ3S7cTHscPsMsSGQv

Donate Xrp to this address

Scan the QR code or copy the address below into your wallet to send some Xrp

Scan to Donate Bitcoin cash to qrs0dedzp9t55af3nfwypydghp29r0xguy9s20fz2k

Donate Bitcoin cash to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin cash

Scan to Donate Bitcoin sv to 15K9TLyVDBtLuG9cYvXCX9SSkq9C9oUKHK

Donate Bitcoin sv to this address

Scan the QR code or copy the address below into your wallet to send some Bitcoin sv

Scan to Donate Litecoin to LetJ9QQMb7u2LMZ9Tu6rtHwcBcQFW98fbG

Donate Litecoin to this address

Scan the QR code or copy the address below into your wallet to send some Litecoin

Scan to Donate Binance coin to bnb1ga8trq08ssqepd90v6225nzfgy448pu5pw8gxp

Donate Binance coin to this address

Scan the QR code or copy the address below into your wallet to send some Binance coin

Scan to Donate Cardano to addr1qx2354yw49etstfljpdhwja3ajjlt487lg95vu9ngy2q6vu4rf2ga2tjhqknlyzmwa9mrm997h20a7stgectxsg5p5esq5l7d9

Donate Cardano to this address

Scan the QR code or copy the address below into your wallet to send some Cardano

Scan to Donate Ethereum classic to 0xcD6CC972a2297FcafACDcfE042C55C69516a9264

Donate Ethereum classic to this address

Scan the QR code or copy the address below into your wallet to send some Ethereum classic

Subscribe for updates. Trust me, no spam!

Sponsored links

1. Attend Algorithm Conference, a top AI and ML event.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.

Upcoming events

Leave a Reply

Your email address will not be published. Required fields are marked *

Get the latest

On social media
Via my newsletter

Partner links

1. Attend Algorithm Conference, a top AI and ML event for 2021.
2. Reasons to use control panel for your server.
3. DHgate Computers Electronics, Cell Phones & more.
Hacking, pentesting distributions

Linux Distributions for Hacking

Experts use these Linux distributions for hacking, digital forensics, and pentesting.

Categories
Archives

The authors of these books are confirmed to speak during

Algorithm Conference

T-minus AI

Author was the first chairperson of AI for the U.S. Air Force.

The case for killer robots

Author is the Director of the Center for Natural and Artificial Intelligence.

Why greatness cannot be planned

Author works on AI safety as a Senior Research Scientist at Uber AI Labs.