The Notebook Review forums were hosted by TechTarget, who shut down them down on January 31, 2022. This static read-only archive was pulled by NBR forum users between January 20 and January 31, 2022, in an effort to make sure that the valuable technical information that had been posted on the forums is preserved. For current discussions, many NBR forum users moved over to NotebookTalk.net after the shutdown.
Problems? See this thread at archive.org.

    Honeypot security!

    Discussion in 'Security and Anti-Virus Software' started by woofer00, Mar 24, 2011.

  1. woofer00

    woofer00 Wanderer

    Reputations:
    726
    Messages:
    1,086
    Likes Received:
    0
    Trophy Points:
    55
    Just had an odd thought - what are your thoughts on leaving a laptop visibly insecure, where in reality it's a honeypot that calls home and/or IDs it's IP on command?

    The thought came to me while reading an article about people recovering their stolen computers by tracking IPs and other info. The idea is to leave the OS itself unprotected, while all your data would in fact be encrypted and/or secured in some fashion. The thief could power on and tool around in the OS while your laptop is calling home. Personally, I see a password-locked laptop as a laptop that will probably get wiped, while a less secure machine would be used with wiping, while [x] program is silently active.

    Thoughts?
     
  2. DetlevCM

    DetlevCM Notebook Nobel Laureate

    Reputations:
    4,843
    Messages:
    8,389
    Likes Received:
    1
    Trophy Points:
    205
    I would even try to let a laptop visibly left to be stolen, no matter what.