Comment GPG? (Score 1) 144
What's wrong with email+gpg and xmpp+gpg? Did it get broken? Why the need for a new protocol?
Obligatory XKCD: http://xkcd.com/927/
What's wrong with email+gpg and xmpp+gpg? Did it get broken? Why the need for a new protocol?
Obligatory XKCD: http://xkcd.com/927/
I've used VLC for almost a decade and i've never seen this message. How do you trigger it? According to online sources, it's run after an update, but I've never seen it, and update every single release. Running vlc 2.0.7 right now.
Xabber is your friend. Honestly.
Also, if you use an XMPP client to google's server, non-google XMPP users can still see you online.
Well, "internal" isn't a valid TLD, why would a browser guess that you have a local TLD named like that?
Omibar for firefox exhibits the exact same behaviour. Type something without a valid TLD into the search/address bar, and it assumes it's not a URL. Quite predictable.
You mean, Chromium?
Yeah, it in almost every's OS repositories (save for windows; but you can just download it from somewhere).
Dropping standards based technologies in favor of tightly integrated proprietary services seems to be popular lately, so I guess this is not surprising.
Not really. It's been popular with companies that have enough users to lock them in for at least 15 years.
It's just a matter of google not having enough users to do it before 2013. To vendor-lockin, you need a nice market share first.
That's a good point. If setup as a cron job though, it'd still execute as soon as the login screen is reached. The thief might not be able to get in, but the IP would have already been sent to the remote host. The lack of effective encryption would indeed suck, however.
Full disk encryption means your login screen won't be reached until way after the disk encryption password is entered.
Also, without logging in, the laptop won't connect to any wireless network (don't expect the thief to have an open network around).
Actually, you could make sure it's always in proximity with your cell phone and detonate if the signal (bluetooth?) is lost for too many minutes.
Just remember to always bring your laptop with you (or leave you cell phone behind if you leave your laptop).
That's what I've always though. Yet a comment further up suggested UEFI tracking might be possible. There's nothing implemented (yet) that I know anyway.
Exactly.
In fact, just forget tracking, and encrypt the whole disk---if it gets stolen, shrug it off, and buy another one (again, do full disk encryption).
The op clearly states he doesn't want to loose the laptop due to it's cost, not because of the information it contains.
Truecrypt is cool for windows, but the op clearly uses Linux. In his case LUKS is fine for FDE, or ecryptfs for his home partition (Ubuntu let you set this up when you first login as well).
For that to work, you need to give the theif full access to your laptop. Say goodbye to FDE, or any sort of privacy.
The problem with Prey, is that the thief needs to turn on your computer, and connect it to the network. This means giving him access to it. This discards full disk encryption. This, in turn, means that thieves get full access to all your data.
I've often come across the dilema. I prefer to run FDE, and permanently loose my laptop if it gets stolen, being able to sleep knowing no personal data has been leaked.
Next on slashdot: After the current sunday we'll have a Monday!
It's funny how there's huge amounts of people criticizing flash on slashdot every day, and then we have an article with a flash video (I can only assume it's a video, since I don't run flash) attached to it.
Do these guys even know how their target audience is?
You must realize that the computer has it in for you. The irrefutable proof of this is that the computer always does what you tell it to do.