Skip to content
/ pombo Public

Theft-recovery tracking opensource software.

Notifications You must be signed in to change notification settings

BoboTiG/pombo

Folders and files

NameName
Last commit message
Last commit date

Latest commit

77bf1b7 · Mar 27, 2025
Oct 31, 2019
Oct 18, 2024
Feb 19, 2020
May 20, 2020
Apr 13, 2020
Feb 18, 2020
Feb 19, 2020
May 18, 2015
Feb 24, 2020
Feb 19, 2020
Feb 19, 2020
Feb 24, 2020
Feb 19, 2020
Mar 27, 2025
Feb 19, 2020
Feb 19, 2020
May 20, 2020
May 18, 2015
Aug 26, 2023
Feb 24, 2020
Feb 24, 2020

Repository files navigation

Pombo

Tip

Become my boss to help me work on this awesome software, and make the world better:

Patreon

Theft-recovery tracking open-source software.

What is it?

Pombo can help you recover your computer in the event it's stolen. It works on Windows, GNU/Linux and Mac OSX.

How does it work ?

Pombo works silently hidden in the background, sending tracking information to a webserver of your choice.

If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam !

Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and only you can decrypt it.

Features

  • Protects your privacy: Tracking information is encrypted with a public key before sending, and only you can decrypt it with the corresponding private key.
  • Secure: No port to open, and does not permit remote access.
  • Does not rely on third-party sites/services: You control the client and the server. You can change servers anytime.
  • Totally free: No software fee, no service subscription.
  • Open-source: You can hack it, adapt it.
  • Reliable backends: Pombo does not try to re-invent the wheel and uses solid backends (eg. no home-made encryption, uses rock-solid GnuPG)
  • Only takes a snapshot if an internet connection is available.
  • Discreet: Uses zero CPU, zero memory and does not appear in process list when not active (not a daemon).
  • Information collected:
    • System name
    • Machine vendor/type and serial number
    • Public IP address
    • Date/time
    • Information about all network interfaces (wired and wireless), including hardware address (MAC) of WiFi access point the computer is connected to.
    • Current network connections
    • Nearby routers information
    • List of all nearby WiFi access point, with their hardware address (MAC), SSID and power.
    • Screenshot
    • Webcam snaphot (if you have a webcam)

Sample report

Pombo sends only GnuPG encrypted zip files (for example ubuntu_20090824_155501.zip.gpg) but for practical reasons, here is an example of what they contain:

What is provided

  • pombo.py (to install on the computer to track)
  • pombo.php (to install on the webserver which stores tracking information)

Requirements

  • The computer to be tracked must run GNU/Linux, Mac OSX or Windows
  • Software: Python, GnuPG
  • Your GPG public key
  • A website where you can install the php script (php4 or php5)
  • A very small GnuPG knowledge

Recommendations

  • Enable auto-login: The thief will not be blocked by the login screen and will be less likely to wipe the harddisk.
  • Copy your private key in a safe place. If you keep it only in your computer and it gets stolen, you also loose your private key, and the capacity to decrypt tracing files.
  • Don't leave your private key on the computer to protect. Although the private key is itself encrypted and password-protected, it's better not let your private key in the hands of the thief.
  • To protect your private files from prying eyes, use VeraCrypt, safe and reliable.