What happens when my Mac is stolen?
Transmission of network information
Like most other theft-recovery software, Undercover will transmit network information of the stolen Mac. This information includes both internal and external IP addresses and the router address, enabling our recovery center to accurately trace the Mac's physical location.
See what happens on your stolen Mac
Undercover is the world's first theft-recovery software that will send screenshots of your stolen Mac at regular intervals. These screenshots will sooner or later reveal the thief's identity (e.g. when chatting, reading and writing emails,...) making it much easier to work with law enforcement in order to recover your Mac.
See who's using your Mac
Undercover introduces another world first: if your Mac has a built-in or external iSight, Undercover will transmit pictures of the thief and his surroundings every 6 minutes, making it even easier to identify the current user. It's like having a private detective working for you.