Active Topics

 


Reply
Thread Tools
allnameswereout's Avatar
Posts: 3,397 | Thanked: 1,212 times | Joined on Jul 2008 @ Netherlands
#21
Originally Posted by Naranek View Post
I think it would be better to have the device remain operational. If it locks up, the thief would probably flash it or throw it away. As long as it is functioning, the thief might use it himself or sell it to someone, so it'll keep popping up in the network and sending location data. I'm fairly confident the authorities would in fact act on this if I had a good trace of the device. After all, you don't know how much other stolen things you'd find from the perpetrator.
Sorry, I don't think you're being realistic here.

How are you going to phone home if the thief or user doesn't have an Internet connection? He might have some WiFi and BT passwords but those aren't neccesary useful unless he/she lives near your WiFi APs, or also got your phone.

A car gets stolen from West Europe and 12 hours later its already out of Europe. The car at whole, or nowadays: in parts. Small electronical devices like this get stolen and resold quickly. The person who ends up with it will be a poor smuck who can't afford it new. He/she bought it 2nd hand, knowing or not it was stolen. The higher the difference between regular 2nd hand and the price its being sold, the higher the chance is its a stolen device.

A script like this is a great idea, but IMO it is part of a bigger plan. Its better to prevent a device like this to be stolen. Don't walk around with it in the big city, like a tourist looking at his/her uberexpensive GPS device, this attracts certain people. For example this weekend I've been in Amsterdam and I usually kept my NIT in my moneybelt. I have 2 good locks for my bicycle which is the minimum, I lock my bicycle always properly (2 locks, in a way pissing off the burglar as much as possible to slow him/her off), and my bicycle looks old. Also, if you expect a device to be stolen, use encrypted partitions like TrueCrypt or LUKS. Activate these during boot, and disable swap (or use encrypted swap).

There are, basically, stupid thieves and smart thieves. The stupid ones are already jailed. The smarter ones are still floating around. You can protect yourself from the stupid ones, but the smarter ones is more difficult. Therefore, while I'm not saying the feature is useless, I highly doubt the thief would use the device. The difference between a bike and a device like this is that the thief cannot know what the device is, and what its features are. He'd probably think its a weird phone (because its a Nokia). This'd also be one of the reasons the first thing he'll do is putting the thing off and getting the SIM the hell outa there. Because he or she knows about tracking via 2G cell tower. I think the first the he does is putting it off, and then figuring out how much they go 2nd hand, going a bit under the normal price but not too much so it doesn't look sneaky, or if his customer base knows its stolen he gives it for a friend price (say 50 EUR).

And, I know for sure cops don't give a SHlT about a stolen bike or mobile phone. They don't have the manpower for this, and it doesn't earn them any cash either. They write it down in their database, but nothing will get done except maybe later for profiling if the thief strikes again. The chances these people get caught are, in my country very low. IIRC less than 20%. Heck, they have a hard time jailing people dealing harddrugs while they always do it in the same neighborhood, even same places approx too.

There is another program linked to here on ITT about a message at boot up which shows whatever text you prefer like an e-mail message. Its more effective against honest finders.

Just some viewpoints.. cheers

Addendum: When setting up a defense barrier it is important to first define who and what you're trying to protect yourself from, and then implement one or more ways against this/these attack vector(s).

When I walk with my NIT I also put my left hand under it, using the thing it should stand on around my left hand with my fingers around the device on the right top. Then finger or stylus from the right hand. This way it is also harder to accidentally drop the device.

That said, I will probably use VPN + FTP + a write only directory to which the IP and current GPS data will be send to, but I would do this via crontab, and only set this on when I'd go to a risky area to save CPU cycles. Maybe it'd be useful to have some kind of authentication every X days, verifying the user is still authentic. If not, it goes into phone home mode. I'm pretty sure some proprietary software works like that

Last edited by allnameswereout; 2008-07-13 at 23:43. Reason: addendum
 

The Following 3 Users Say Thank You to allnameswereout For This Useful Post:
lcuk's Avatar
Posts: 1,635 | Thanked: 1,816 times | Joined on Apr 2008 @ Manchester, England
#22
Trying to do something quick and simple to at least give you a chance of getting your machine located and back to you is better than doing nothing at all.

We had a short discussion on irc about this thread and I went hunting for a google maps api which should keep historical tracks of your device if its required.

Once you get the functionality to tell the server where your device is (whether once per session or every few minutes) then many additional data processing options can be used

http://conversationswithmyself.com/m...apTracker.html

It would be really good to add this server side functionality into maemo.org * and have the client software pre-configured to go to your account there.

Obviously all private unless specified and can be reconfigured to any server.


*mainly because not everyone has their own cputime and webspace available.

Last edited by lcuk; 2008-07-13 at 23:29. Reason: added *
 
Posts: 60 | Thanked: 17 times | Joined on Feb 2008
#23
Originally Posted by allnameswereout View Post
Sorry, I don't think you're being realistic here.

How are you going to phone home if the thief or user doesn't have an Internet connection? He might have some WiFi and BT passwords but those aren't neccesary useful unless he/she lives near your WiFi APs, or also got your phone.

A car gets stolen from West Europe and 12 hours later its already out of Europe. The car at whole, or nowadays: in parts. Small electronical devices like this get stolen and resold quickly. The person who ends up with it will be a poor smuck who can't afford it new. He/she bought it 2nd hand, knowing or not it was stolen. The higher the difference between regular 2nd hand and the price its being sold, the higher the chance is its a stolen device.

A script like this is a great idea, but IMO it is part of a bigger plan. Its better to prevent a device like this to be stolen. Don't walk around with it in the big city, like a tourist looking at his/her uberexpensive GPS device, this attracts certain people. For example this weekend I've been in Amsterdam and I usually kept my NIT in my moneybelt. I have 2 good locks for my bicycle which is the minimum, I lock my bicycle always properly (2 locks, in a way pissing off the burglar as much as possible to slow him/her off), and my bicycle looks old. Also, if you expect a device to be stolen, use encrypted partitions like TrueCrypt or LUKS. Activate these during boot, and disable swap (or use encrypted swap).

There are, basically, stupid thieves and smart thieves. The stupid ones are already jailed. The smarter ones are still floating around. You can protect yourself from the stupid ones, but the smarter ones is more difficult. Therefore, while I'm not saying the feature is useless, I highly doubt the thief would use the device. The difference between a bike and a device like this is that the thief cannot know what the device is, and what its features are. He'd probably think its a weird phone (because its a Nokia). This'd also be one of the reasons the first thing he'll do is putting the thing off and getting the SIM the hell outa there. Because he or she knows about tracking via 2G cell tower. I think the first the he does is putting it off, and then figuring out how much they go 2nd hand, going a bit under the normal price but not too much so it doesn't look sneaky, or if his customer base knows its stolen he gives it for a friend price (say 50 EUR).

And, I know for sure cops don't give a SHlT about a stolen bike or mobile phone. They don't have the manpower for this, and it doesn't earn them any cash either. They write it down in their database, but nothing will get done except maybe later for profiling if the thief strikes again. The chances these people get caught are, in my country very low. IIRC less than 20%. Heck, they have a hard time jailing people dealing harddrugs while they always do it in the same neighborhood, even same places approx too.

There is another program linked to here on ITT about a message at boot up which shows whatever text you prefer like an e-mail message. Its more effective against honest finders.

Just some viewpoints.. cheers

Addendum: When setting up a defense barrier it is important to first define who and what you're trying to protect yourself from, and then implement one or more ways against this/these attack vector(s).

When I walk with my NIT I also put my left hand under it, using the thing it should stand on around my left hand with my fingers around the device on the right top. Then finger or stylus from the right hand. This way it is also harder to accidentally drop the device.

That said, I will probably use VPN + FTP + a write only directory to which the IP and current GPS data will be send to, but I would do this via crontab, and only set this on when I'd go to a risky area to save CPU cycles. Maybe it'd be useful to have some kind of authentication every X days, verifying the user is still authentic. If not, it goes into phone home mode. I'm pretty sure some proprietary software works like that
I was thinking more in terms of sysadmins than cops. In some cases, sysadmins might offer some help if you could show that the ip addresses and gps location were in their network.

As far as the thief getting access to the internet with the stolen device, all s/he has to do is walk into a place with free WIFI and connect the device. S/he doesn't need any of your passwords to do this and get connected.

I personally would rather at least try to recover my $500 investment than do nothing, especially if I knew where the thing was connecting. You might be right that nobody along the line would care enough or have enough time to lend a hand, but again, it's probably worth at least a try.
 
Posts: 60 | Thanked: 17 times | Joined on Feb 2008
#24
Originally Posted by lcuk View Post
Trying to do something quick and simple to at least give you a chance of getting your machine located and back to you is better than doing nothing at all.

We had a short discussion on irc about this thread and I went hunting for a google maps api which should keep historical tracks of your device if its required.

Once you get the functionality to tell the server where your device is (whether once per session or every few minutes) then many additional data processing options can be used

http://conversationswithmyself.com/m...apTracker.html

It would be really good to add this server side functionality into maemo.org * and have the client software pre-configured to go to your account there.

Obviously all private unless specified and can be reconfigured to any server.


*mainly because not everyone has their own cputime and webspace available.
This is a great idea. It would be optional - if you wanted to register the location of your device at some central or distributed server at boot, that could be enabled and only disabled with a password or ssh key.
 
Posts: 176 | Thanked: 34 times | Joined on Feb 2008
#25
OK, I don't get it.

This whole thing seems to be based entirely on the supposition that the N8xx is stolen as opposed to just being lost (and eventually found) - a far more likely scenario, non?

I'm not sure why you wouldn't just want to replace the start-up splash screen with your name and contact (email) info and a short message asking for the 'return of the unit if this screen appears since you would remove it it you'd sold or given it away'.

Or have the screen splash, after, say, 40 minutes automatically after start-up to avoid a thief first playing with the N8xx a bit before trying to pawn it off so someone who would see it would at least *know* it is either missing/stolen?

I mean, I don't see why you can think a thief is going to spend much time with this unit. S/He might as well get rid of it quickly as possible since anyone who actually *knows* anything about these Nokia units will know that the tablet is missing the recharger and the usb cord. And if the thief tries to pawn it off to some idiot who *doesn't* know what the hell s/he's getting, the thief would have to have as full a battery as possible to razzle-dazzle a potential buyer.

At that point, it really is up to the person in possession of the unit whether to go through the process to get it back to you but at least that person *knows* the unit has been lost/stolen as opposed to your method which seems to endlessly track the unit with no way to either inform the new 'owner' or give the new 'owner' a chance to get the unit back to you.

Alternatively, if I was so concerned about theft, I'd just etch an email address on the back plastic and if it does go missing, at least you can post signs up or tell local internet forums to look out for it.

I dunno. I've worked in tourism in the past and I've been in a job position where a lot of incredibly interesting things that are genuinely lost come across my desk and the first thing I try to do before I give it to the Lost & Found Department is to find an obvious method the owner has left for me to contact them and, um, your method is not obvious.

In fact, in iTunes, my iPod is actually named a specific email address and the contact information on it is also linked to an email address (if I'm traveling in Europe, I can't reasonably expect someone to phone me back in North America just to tell me they've found my iPod and, well, I'd still be traveling in Europe, anyway. Email is a much quicker, much freer method of contact).

However, you give an N8xx with this thing on the unit to your girlfriend/boyfriend and I guess you can become a stalker? If you can track people with those iPod+Nike units, why not the Nokia N8xx's?
 
Posts: 60 | Thanked: 17 times | Joined on Feb 2008
#26
Originally Posted by Betty Woo View Post
OK, I don't get it.

This whole thing seems to be based entirely on the supposition that the N8xx is stolen as opposed to just being lost (and eventually found) - a far more likely scenario, non?

I'm not sure why you wouldn't just want to replace the start-up splash screen with your name and contact (email) info and a short message asking for the 'return of the unit if this screen appears since you would remove it it you'd sold or given it away'.

Or have the screen splash, after, say, 40 minutes automatically after start-up to avoid a thief first playing with the N8xx a bit before trying to pawn it off so someone who would see it would at least *know* it is either missing/stolen?

I mean, I don't see why you can think a thief is going to spend much time with this unit. S/He might as well get rid of it quickly as possible since anyone who actually *knows* anything about these Nokia units will know that the tablet is missing the recharger and the usb cord. And if the thief tries to pawn it off to some idiot who *doesn't* know what the hell s/he's getting, the thief would have to have as full a battery as possible to razzle-dazzle a potential buyer.

At that point, it really is up to the person in possession of the unit whether to go through the process to get it back to you but at least that person *knows* the unit has been lost/stolen as opposed to your method which seems to endlessly track the unit with no way to either inform the new 'owner' or give the new 'owner' a chance to get the unit back to you.

Alternatively, if I was so concerned about theft, I'd just etch an email address on the back plastic and if it does go missing, at least you can post signs up or tell local internet forums to look out for it.

I dunno. I've worked in tourism in the past and I've been in a job position where a lot of incredibly interesting things that are genuinely lost come across my desk and the first thing I try to do before I give it to the Lost & Found Department is to find an obvious method the owner has left for me to contact them and, um, your method is not obvious.

In fact, in iTunes, my iPod is actually named a specific email address and the contact information on it is also linked to an email address (if I'm traveling in Europe, I can't reasonably expect someone to phone me back in North America just to tell me they've found my iPod and, well, I'd still be traveling in Europe, anyway. Email is a much quicker, much freer method of contact).

However, you give an N8xx with this thing on the unit to your girlfriend/boyfriend and I guess you can become a stalker? If you can track people with those iPod+Nike units, why not the Nokia N8xx's?
Many ways to solve the problem.
 
Posts: 176 | Thanked: 34 times | Joined on Feb 2008
#27
Originally Posted by dannemil View Post
Many ways to solve the problem.
Gotta admit... your way is way cooler, though

Me? I'm Ms. Practicality (and not much of a stalker)
 
Posts: 69 | Thanked: 24 times | Joined on Feb 2007
#28
I'm just going to stick a spanner in this...

Earlier this year I had my XBox 360 stolen. Last month I got a call from Microsoft saying someone had tried to re-register it on Live. I passed this on to the police and the police and Microsoft started talking to each other. Unfortunately, in the words of a MS support person I spoke to "we've never had anyone stupid enough to turn on a stolen XBox before" and neither them nor the police had a clue what to do.

It's all very interesting making your N800 tell you it's been turned on after it's been stolen... it might even be interesting taking a photo of the person operating it. But you'll probably only end up with a picture of the poor sod who bought it cheap from a 2nd hand pawn shop, not the person who stole it.

Also... so you're giving the new 'owner' of my N800 SSH access to my PC? That doesn't seem so wise.

And I can say from personal experience, it's damn frustrating knowing that your stolen property is being used *right now* by someone who shouldn't have it, and you're powerless to do a thing about it. It's actually better not knowing.

The GPS wouldn't be a workable solution either... have you seen how long it takes to get a lock outdoors? "I think I might be stolen. Please stand still for 20 minutes while I get a lock on your location, thanks"... not going to happen.
 
lcuk's Avatar
Posts: 1,635 | Thanked: 1,816 times | Joined on Apr 2008 @ Manchester, England
#29
Piku,
You would not need to give them ssh access to anywhere.
Simply ping a URL on some public webserver you have.
Pass the location as parameters to the page and have the page store the location in a database.

Nothing more, nothing less.

We aren't saying we can get the machine back but at least knowing where it is might help.

You are right about the gps lag time, but since we can send the last known location it at least narrows down the search. depending on how they use it and what is logged you should get a good idea of location more than simply an ip address ping.

Also, I believe you overestimate the intelligence of your common criminal, watch My Name is Earl for examples
 
allnameswereout's Avatar
Posts: 3,397 | Thanked: 1,212 times | Joined on Jul 2008 @ Netherlands
#30
Adeona is an open source application doing just this, and more.
 

The Following User Says Thank You to allnameswereout For This Useful Post:
Reply


 
Forum Jump


All times are GMT. The time now is 12:41.