Get a Pentest and security assessment of your IT network.

Cyber Security

Device Fingerprinting: Tracking Stolen Devices

TL;DR

Yes, a ‘fingerprint’ file can help track a stolen device, but it’s not foolproof. It relies on software installed *before* the theft that collects unique hardware and software information. This fingerprint is then used to identify the device if it connects to the internet or reports back to a central server. It’s more about recovery than real-time tracking like GPS.

What is Device Fingerprinting?

Device fingerprinting creates a unique ID for your device based on its configuration. This isn’t a physical mark, but a collection of data points including:

  • Operating System
  • Installed Software (browsers, plugins)
  • Hardware details (CPU type, RAM amount)
  • Network settings (MAC address – though this can be spoofed)

This information is combined to create a hash value – the ‘fingerprint’.

How it Works: Step-by-Step

  1. Install Fingerprinting Software: Before your device is stolen, you need software that can collect this data and store the fingerprint. Examples include:

    • Prey Project: Free for basic use; tracks location, takes screenshots, etc.
    • Absolute LoJack: Commercial solution with more features.
    • System Management Software (SMS): Often used in businesses to track company devices.
  2. Initial Fingerprint Capture: The software creates the initial fingerprint when installed and configured. This is stored securely, usually on a server controlled by the software provider.
  3. Theft Occurs: Your device is stolen.
  4. Device Connects to the Internet: If the stolen device connects to the internet (Wi-Fi or mobile data), the fingerprinting software attempts to report back to its server.
  5. Fingerprint Comparison: The software sends a new fingerprint hash value from the stolen device to the server. The server compares this with the stored fingerprints.
  6. Alert & Recovery Actions: If a match is found, you receive an alert (usually via email or SMS). You can then take actions like:

    • Remote locking
    • Data wiping
    • Location tracking (if the software supports it)
    • Displaying a message on the screen.

Example: Using Prey Project

Prey Project is a good starting point for understanding how this works.

  1. Download & Install: Download and install Prey Project from https://preyproject.com on your device (Windows, macOS, Linux, Android, iOS).
  2. Create an Account: Create a free account on the Prey Project website.
  3. Configure Settings: In the Prey Project control panel, configure what actions you want to take when a stolen device is detected (e.g., lock screen, wipe data, get location).
  4. Device Reporting: When the device connects to the internet, it will silently report its status and fingerprint back to your Prey Project account. You’ll see the last known location on a map and can trigger remote actions.

Limitations & Considerations

  • Software Must Be Installed Before Theft: This is crucial. Fingerprinting software cannot be installed *after* the device is stolen.
  • Internet Connection Required: The device needs an internet connection to report back its fingerprint.
  • Battery Life: Continuous monitoring can drain battery life.
  • Spoofing & Tampering: Skilled thieves may be able to spoof hardware identifiers or disable the software. MAC address spoofing is relatively easy.
  • Privacy Concerns: Be aware of the privacy implications of collecting and storing device information.
  • Not a Replacement for Security Software: Device fingerprinting should be used in conjunction with other security measures like strong passwords, encryption, and anti-virus software.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation