From: geeman@best.com
To: cypherpunks@EINSTEIN.ssz.com
Message Hash: 11be8db04429ee8a00ce9e85ca8be7ed217f9e6a2f815c89046438560792c1e3
Message ID: <3.0.32.19970611092701.00683c54@best.com>
Reply To: N/A
UTC Datetime: 1997-06-11 16:41:08 UTC
Raw Date: Thu, 12 Jun 1997 00:41:08 +0800
From: geeman@best.com
Date: Thu, 12 Jun 1997 00:41:08 +0800
To: cypherpunks@EINSTEIN.ssz.com
Subject: [CNN] Stolen Laptops and lame 'solution'
Message-ID: <3.0.32.19970611092701.00683c54@best.com>
MIME-Version: 1.0
Content-Type: text/plain
reproduced under fair-use:
> PC, phone home
>
> Industry aims to stop
> theft of laptops
>
> June 10, 1997
> Web posted at: 11:45 p.m. EDT (0345 GMT)
>
> From Correspondent Greg
> Lefevre
>
> SAN FRANCISCO (CNN) -- Expensive, compact and
> frequently out and about, a laptop computer makes an
attractive
> target for thieves.
>
> But the computer industry has devised some ingenious
ways to
> counter theft, including invisible software that
knows when the
> computer is in trouble.
>
> "As soon as the thief plugs that machine into a phone
network, it
> will phone home," said John Livingston, chief
executive of
> CompuTrace Service.
>
> The call goes to a Canadian office
> that in turn phones the cops. So far,
> it has a 100 percent recovery rate.
>
====== 100% of WHAT? Systems with it installed which are stolen? How
would you know what systems do NOT call in?
It's like the question the clerk asks at the airport: "Did anyone put
anything in your luggage you don't know anything about?"
Now that the word is out, of course, the wily thief will eschew pluggin in
until the hard drive is reformatted and installed
with a clean OS. As usual: the stupid will be caught.
Return to June 1997
Return to ““William H. Geiger III” <whgiii@amaranth.com>”