Free Adeona service tracks stolen laptops

Sep 25, 2008
Researchers (from left to right) Gabriel Maganis (UW), Thomas Ristenpart (UC San Diego), Tadayoshi Kohno (UW) and Arvind Krishnamurthy (UW), posing as laptop thieves, are caught in the act by the computer's internal camera. The Adeona laptop-tracking software securely sends these photos and Internet protocol addresses to a remote database, where the computer's owner can privately track the laptop's location.

(PhysOrg.com) -- As college students head back to school with gleaming new laptops, some will, unfortunately, see the last of their machine in a library, cafeteria or dorm room. And it's not just college campuses that are hot spots for computer theft, or just students who are the targets. Newspapers recently reported that airports in the United States record hundreds of thousands of laptop thefts annually. Such thefts are not only expensive, they also often mean losing sensitive data.

Researchers at the University of Washington and at the University of California, San Diego have created a new laptop theft-protection tool. The software not only provides a virtual watchdog on your precious machine -- reporting the laptop's location when it connects to the Internet -- but does so without letting anybody but you monitor your whereabouts.

The tool is named Adeona, after the Roman goddess of safe returns, and is posted at adeona.cs.washington.edu/ . It works by using the Internet as a homing beacon. Once Adeona is installed, the machine will occasionally send its Internet protocol address and related information to OpenDHT, a free online storage network. This information can be used to establish the computer's general location.

On a Macintosh computer, Adeona also uses the computer's internal camera to take a photo that it sends to the same server.

Adeona was initially released for free under an open source license in June, and further work will be presented at the ToorCon computer security conference in San Diego Sept. 28. The authors are Thomas Ristenpart, a doctoral student at UC San Diego, who was a UW visiting student in summer 2007; Gabriel Maganis, who recently received his UW undergraduate degree in computer engineering; Tadayoshi Kohno, a UW assistant professor of computer science and engineering; and Arvind Krishnamurthy, a UW research assistant professor of computer science and engineering.

Unlike commercial systems, in which users surrender their location information to a company, Adeona scrambles the information so it must be deciphered using a password known only by the person who set up the account. If the laptop is stolen, only the original owner can access the location data (and, for Macintosh users, a photo). The owner can then bring this information to the police to aid in tracking down the stolen machine. Even if the free OpenDHT storage network was hacked, the information would remain private.

"Adeona is free and easy to install, so anyone who owns a laptop, or even a small company, can use it to track their assets," Maganis said. "We're really hoping laptop users all over the world will install it on their machines."

The tool resulted from an experiment in privacy protection that began two years ago.

"We wanted to build a tool that allows you to track the location of your laptop but at the same time doesn't allow someone else to track you," Kohno said. "Typically when you create a forensics trail, you leave breadcrumbs that you can see, but so can everyone else. We've created a private forensics trail where only you can see those breadcrumbs."

More broadly, the research investigates ways to maintain privacy in a world where geographic tracking is becoming increasingly common.

"Platforms such as the iPhone enable development of more and more software programs that use geographic information in fun and useful ways. Many of these applications could benefit from mechanisms for preserving user location privacy," Ristenpart said.

Since Adeona's public release, more than 50,000 people have downloaded the software under the open source license. The current version works on desktop and laptop machines running Windows, Macintosh or Linux. Researchers say they have already received numerous requests for an iPhone version.

"People like it because it's open source," Maganis said. "That's what we're hearing."

Companies offer features that might justify paying a fee, but they too can learn from Adeona to ensure clients' privacy, Maganis said. "Companies can adapt our techniques to provide high levels of privacy for their own services."

Provided by University of Washington

Explore further: Microsoft beefs up security protection in Windows 10

add to favorites email to friend print save as pdf

Related Stories

Robots recognize humans in disaster environments

Oct 21, 2014

Through a computational algorithm, a team of researchers from the University of Guadalajara (UDG) in Mexico, developed a neural network that allows a small robot to detect different patterns, such as images, ...

Thinner iPads, sharper iMacs in Apple's lineup (Update)

Oct 16, 2014

(AP)—Apple unveiled a thinner iPad Thursday with a faster processor and a better camera as it tries to drive excitement for tablets amid slowing demand. The company also released an update to its Mac operating ...

Mobile revolution shakes up Silicon Valley

Oct 07, 2014

Smartphones, tablets and other gadgets aren't just changing the way we live and work. They are shaking up Silicon Valley's balance of power and splitting up businesses. Long-established companies such as ...

Recommended for you

Microsoft beefs up security protection in Windows 10

21 hours ago

What Microsoft users in business care deeply about—-a system architecture that supports efforts to get their work done efficiently; a work-centric menu to quickly access projects rather than weather readings ...

Team infuses science into 'Minecraft' modification

Oct 24, 2014

The 3-D world of the popular "Minecraft" video game just became more entertaining, perilous and educational, thanks to a comprehensive code modification kit, "Polycraft World," created by University of Texas at Dallas professors, ...

Microsoft's Garage becomes an incubator of consumer apps

Oct 24, 2014

For five years now, The Garage has served as Microsoft's incubator for employees' passion projects, an internal community of engineers, designers, hardware tinkerers and others from all different parts of the company who ...

Students win challenge for real-time traffic app

Oct 24, 2014

Three University of Texas at Arlington Computer Science and Engineering students have won a $10,000 prize in the NTx Apps Challenge for a smart traffic light network that adjusts traffic light schedules to ...

User comments : 1

Adjust slider to filter visible comments by rank

Display comments: newest first

Zig158
5 / 5 (1) Oct 09, 2008
Most thieves format immediately after checking out if you have anything of value on your computer. Only an idiot would connect a stolen computer to the Internet. Any one caught by this tool, should be bludgeoned to death for extreme stupidity.