Pro Users: Did you lose your company’s device, with all your customers’ data on it? Don’t worry. The latest version of Prey for Android now can wipe your device clean, in case you need to protect that sensitive information. Just a click on your Prey account will effectively reset the device to factory defaults, securing your company’s secrets.
Just a quick fix for our Bash desktop client, mainly for compatibility.
- [FIX] Detection of OS version for Mac and Windows now works as expected.
- [FIX] Updated location of `updates_url` from Github to S3.
These fixes act as a progression over what was included in 0.6.0:
- [FIX] Fixes for Gentoo (pryoidain’s patch from Github issue #339).
- [FIX] Update endpoints for `update_device_info` request (ie. hardware info).
- [FIX] Ensure SSL certificate validation in Linux configurator.
If you want to check out new features you might want to take a look at the Node client we’ve been working on — it’s already in the oven!
Some things are better off controlled remotely.
You know, like giant robots, Solid Snake’s Nikita missiles, or even cockroaches. Since we really like robots (but not as much cockroaches), starting from today, you can also control your Android device using SMS commands. And honoring Solid Snake, from now on you can also hide Prey’s icon at will with a simple call, effectively infiltrating any thief’s defenses.
We just pushed the update to Google Play, so you should be getting it during the next few hours. It basically gives you full remote control over your mobile skipping the need of logging to the Prey Control Panel.
We’re still celebrating the world didn’t end last year, and to show you how happy we are, here’s our first 2013 present for you: Prey for Android now takes pictures of whoever steals your device. From now on, it doesn’t matter anymore if your desktop, laptop, tablet or phone gets stolen—as long as there’s a built-in camera on your device, you’ll see the bad guys’ faces.
But that’s not all the news! Prey for Android got much more handsome, it also features an Uninstallation Lock, and now gathers hardware information to help you identify your lost device in case it gets found. Some bugs were also fixed.
A few days ago we pushed version 0.5.9, which is a big jump from good-old 0.5.3. While this new client includes a ton of new things, the most important being the fix for the geolocation issue (aka. “no map on reports”), plus duplicate device detection, full SSL support with certificate verification, support for OS X’s network auto-connect, a better configurator for Linux and improved offline actions. Whew!
You can find and download the new client from our downloads section. For those of you interested in the small print, here’s the full changelog.
It’s been a while since we last updated our Android client so it was time to put our elves — I mean, our team — back into Android action. We recently pushed a big juicy update that includes a complete revamp of the UI, some security enhancements, and yes, Camouflage Mode.
Right now you have two options: you take the blue pill, and head on to Google Play and install or update Prey on your phone or tablet. You take the red pill, you stay on our blog and keep reading, and we show you how deep the rabbit hole goes.
Months ago, when we began drawing sketches, trying to imagine what the iPhone client for Prey would look like, well it sure looked easy-peasy. It really did. But when we actually put our hands into it, we bumped into a number of things we had to sort out to make Prey work the way we wanted to, and of course, without breaking any of Apple’s rules. So it took longer than expected but the work is now done, and the wait finally over.
Prey is now available for iPhones and iPads at the App Store. Open source, for free, tested and ready to kick some burglar butt. Check it out.
Good news Ubuntu users! If you already upgraded to Ubuntu Natty Narwhal (11.04) then you’ll be able to install Prey directly from Ubuntu’s official package repositories. We’ve been working side by side with the Debian devs so now you’ll be able to find Prey in Ubuntu’s Software Center or get it by opening up a terminal and typing the famous one-liner:
$ sudo apt-get install prey
The package is listed on Ubuntu’s universe repository so be sure to enable it through Synaptic it (Settings > Repositories > check Community-maintained Open Source software) if you want to use it.
Now, there’s a few differences between the official Prey version and the one bundled in Debian and Ubuntu. Keep on reading!
Yup, it’s here.
It took as a bit longer than expected but the iOS client is ready to run in the wild, and we want you to help us try it out. If you have an iPhone running iOS version 4 or above, you can be one of the first to see Prey running on Apple’s platform. You’ll also get a Personal Pro account for a whole year and we’ll only ask that you fill in a form a week or two after installing the app.
Want to give it a shot? Then send us a Direct Message through Twitter with your registered email address (the one associated to your Control Panel account). If you get a DM back from us then it means you were one of the selected few who made it!
Update: Registration is now closed. Thanks everyone who signed up!
0.5.2 is out! A while ago we pushed this release update which includes a couple of security enhancements, lots of code cleanups and a small fix for On-Demand mode, as some people were having trouble switching back to On-Interval after going to stand-by mode. Lets take a deeper look at the changelog:
- Response encryption: Prey now supports 128 bit AES decryption for response bodies, which means that all data sent by the Control Panel will be encrypted with a salted secret key, rending theoretical man-in-the-middle attacks impossible. We’ll be deploying this gradually during the next days!
- We also added a check to prevent malitious code execution through config values in the response XML. (Issue #85)
- Better way of knowing if On-Demand is still active or not, using timestamps from the keepalive pings sent by the server. This should fix the issue that prevented some users from switching back to Interval mode.
- Lots of code cleanups, removed duplicate or unused stuff. We’re also switching backticks for $() calls, which is much easier to read.
- Small improvements to the auto update process.
- Initial support for Prey to be run as a non-root user. On Ubuntu we were able to run as a third user with some sudo permissions. Once we get it working on Mac we’ll switch over and not run Prey as root any more (yes, we heard you guys).
- Support for SMTP servers which don’t require authentication. Simply leave the SMTP user/pass fields blank and you’re set. Passwords with spaces should also work.
- Added a simple SMTP user/pass verification routing in check mode (Standalone users).
That’s about it! For the full commit list check out the comparison view on Github. As always, any questions or comments are welcome.