03 March 2006

Undercover reviewed

Many people asked us how Undercover behaves in case of theft and whether this system really works. We always tell them that we have done extensive testing of all steps involved and that we did quite a few real-world simulations.

Starting today, we have a more convincing answer: the fine folks at Mac360 have done an independent review of Undercover. For this review, we simulated a real theft. The review describes the different stages Undercover goes through when the Mac is stolen and how each stage works. You can read the review here: part I and part II. Now all people wondering whether Undercover really works no longer have to take our word for it.

2 comments:

Anonymous said...

>Now all people wondering whether Undercover really works no longer have to take our word for it.
No, I'm pretty sure many of us would still rather have a way to verify the installation and operation are working for our machines.

Anonymous said...

I'm sure recovery works fine.

My main concern is though, how can I be sure you won't use the software to spy on me without the mac being stolen. And don't give me the line about the unique identifier. It's your server and your software, surely you could hack it any which way you want. As I see it there is no guarantee other than you sound like a nice guy...