![]() |
2010-02-25
, 11:03
|
Posts: 145 |
Thanked: 80 times |
Joined on Jan 2010
|
#61
|
The Following User Says Thank You to cyeung For This Useful Post: | ||
![]() |
2010-02-25
, 11:08
|
Posts: 388 |
Thanked: 842 times |
Joined on Sep 2009
@ Finland
|
#62
|
That is a perfectly valid assumption, but what is the likelihood of this happening?
![]() |
2010-02-25
, 11:17
|
|
Posts: 34 |
Thanked: 8 times |
Joined on Dec 2009
@ London
|
#63
|
About same than the thief wanting to do anything with your data? If they're after your passwords or other private data they are surely gonna take a closer look at things like this...
Most thieves want just the hardware, though. And if they're any smart the first thing they do is take the battery out and reflash the device before the tracking software can do anything.
![]() |
2010-02-25
, 11:47
|
Posts: 334 |
Thanked: 45 times |
Joined on Jan 2010
|
#64
|
![]() |
2010-02-25
, 20:43
|
Posts: 247 |
Thanked: 91 times |
Joined on Jan 2008
@ London/M4 Corridor
|
#65
|
That is a perfectly valid assumption, but what is the likelihood of this happening?
![]() |
2010-02-25
, 20:45
|
Posts: 247 |
Thanked: 91 times |
Joined on Jan 2008
@ London/M4 Corridor
|
#66
|
That is a perfectly valid assumption, but what is the likelihood of this happening?
![]() |
2010-02-26
, 05:43
|
Posts: 336 |
Thanked: 610 times |
Joined on Apr 2008
@ France
|
#67
|
In the meantime, if your risks are different than mine, deploy the current script. But do so with the knowledge of the risk to the system waiting to gather data via ssh upload.
![]() |
2010-03-01
, 02:00
|
Posts: 10 |
Thanked: 0 times |
Joined on Feb 2010
|
#68
|
Looks useful! Would be nice if we had an automatic 'mugshot' funtion as well.
![]() |
2010-03-01
, 13:47
|
Posts: 247 |
Thanked: 91 times |
Joined on Jan 2008
@ London/M4 Corridor
|
#69
|
The problem is that a lot of shared wireless connections don't allow SSH or FTP access. In that case, i would recommend using wget to post the data to a webpage.
Even if you go with the SCP route, this isn't a security issue. You can create a dedicated user account who can only go to /home/spy and doesn't have execution rights to anything, and also has disk quotas, etc. Even better, set the shell to /sbin/nologin.