Skip to content


Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

Latest commit

- GNU/Linux: fixed ``
- GNU/Linux: fixed ``
- GNU/Linux: add more examples for `streamer`
- Fixed the GPG file creation!

Git stats


Failed to load latest commit information.
Latest commit message
Commit time


Theft-recovery tracking open-source software.

What is it?

Pombo can help you recover your computer in the event it's stolen. It works on Windows, GNU/Linux and Mac OSX.

How does it work ?

Pombo works silently hidden in the background, sending tracking information to a webserver of your choice.

If your computer is stolen, just log into your webserver to get the lastest file uploaded by Pombo, decrypt and hand it to the police. They will have all they need to catch the thief: IP address, date/time, nearby routers, screenshot, and even a photo of his/her face if you have a webcam !

Pombo protects your privacy: Tracking information is encrypted with rock-solid GnuPG and only you can decrypt it.


  • Protects your privacy: Tracking information is encrypted with a public key before sending, and only you can decrypt it with the corresponding private key.
  • Secure: No port to open, and does not permit remote access.
  • Does not rely on third-party sites/services: You control the client and the server. You can change servers anytime.
  • Totally free: No software fee, no service subscription.
  • Open-source: You can hack it, adapt it.
  • Reliable backends: Pombo does not try to re-invent the wheel and uses solid backends (eg. no home-made encryption, uses rock-solid GnuPG)
  • Only takes a snapshot if an internet connection is available.
  • Discreet: Uses zero CPU, zero memory and does not appear in process list when not active (not a daemon).
  • Information collected:
    • System name
    • Machine vendor/type and serial number
    • Public IP address
    • Date/time
    • Information about all network interfaces (wired and wireless), including hardware address (MAC) of WiFi access point the computer is connected to.
    • Current network connections
    • Nearby routers information
    • List of all nearby WiFi access point, with their hardware address (MAC), SSID and power.
    • Screenshot
    • Webcam snaphot (if you have a webcam)

Sample report

Pombo sends only GnuPG encrypted zip files (for example but for practical reasons, here is an example of what they contain:

What is provided

  • (to install on the computer to track)
  • pombo.php (to install on the webserver which stores tracking information)


  • The computer to be tracked must run GNU/Linux, Mac OSX or Windows
  • Software: Python, GnuPG
  • Your GPG public key
  • A website where you can install the php script (php4 or php5)
  • A very small GnuPG knowledge


  • Enable auto-login: The thief will not be blocked by the login screen and will be less likely to wipe the harddisk.
  • Copy your private key in a safe place. If you keep it only in your computer and it gets stolen, you also loose your private key, and the capacity to decrypt tracing files.
  • Don't leave your private key on the computer to protect. Although the private key is itself encrypted and password-protected, it's better not let your private key in the hands of the thief.
  • To protect your private files from prying eyes, use VeraCrypt, safe and reliable.