📜 ⬆️ ⬇️

The owner of the stolen laptop returned it thanks to the tracking software installed on the device.



Theft of phones, laptops and other similar devices is not often revealed. The reason is simple - to find all this using conventional methods is very, very difficult. Software makers, quickly realizing what they can earn, began to produce tracking programs for smartphones and laptops. Such programs allow, for example, to find out where the device is located (thanks to the GPS module or the location system for the WiFi access point). You can also delete your data by sending sms to your phone or sending a signal to an application installed on your laptop. But the recent incident is truly unique. The fact is that American Joshua Kaufman was stolen from his MacBook (plus jewels), and before that, for a couple of months, Kaufman installed the Hidden application, a tracking program using a laptop camera.

The thief did not delete or format anything (although he deleted the account of the present owner of the laptop), and began to use "as is". As a result, the application regularly photographed the thief, and sleeping, and riding in the car, and working for a laptop. In addition, the same application showed where the thief is located.
')
The owner of the laptop turned to law enforcement officers, but they began to lower the whole thing on the brakes, so to speak. After this disappointed Joshua decided to create a tumblr page dedicated to the theft and the thief. On the page and now adorn photographs of our hapless attacker. In one of the photos, he sleeps peacefully, not knowing yet that the Hidden program is vigilantly watching him.





This went on for several days, until the owner of the laptop was called from the police and was told that the criminal had been arrested, the laptop had been taken away, and now all his property could be obtained intact. The police also added that they had arrested the criminal thanks to the photographs that Kaufman had provided them.



So this kind of software sometimes really helps to catch the thief. True, there is a high probability that attackers who also read all sorts of stories on the Web will “get wiser” with each such case by formatting hard drives on devices and deleting everything that is possible.

Via mashable

Source: https://habr.com/ru/post/120355/


All Articles