Pinterest Stumbleupon Whatsapp
Ads by Google

Apple’s iPhone has a “kill switch,” and it’s already reducing smartphone theft Deterring Smartphone Thefts With Kill Switches, Windows XP Needs To Die, And More... [Tech News Digest] Deterring Smartphone Thefts With Kill Switches, Windows XP Needs To Die, And More... [Tech News Digest] BlackBerry posts surprise profit, Valve launches Steam Summer Sale, a U.S. college offers athletic scholarships to professional gamers, eBay Valet sells your unwanted stuff for you, and Conan O'Brien shows off at E3 2014. Read More . Google has announced they’ll be adding a kill switch to Android. Until it arrives, you can still secure your Android device by enabling remote locking and wiping features.

Kill Switches Vs. Remote Wiping

Here’s how the kill switch works on an iPhone So Your iPhone Was Lost or Stolen: Here's What To Do So Your iPhone Was Lost or Stolen: Here's What To Do If your iPhone is no longer in your possession, you might never see it again but there are still a few things you can do. Read More . Assuming you enable Find My iPhone, you can log into Apple’s Find My iPhone website and track your phone if you lose it. Enable “Lost Mode” and the phone will be locked and unusable, with a message of your choice displayed on your screen. Crucially, the “Lost Mode” and “Find My iPhone” features work even after the thief factory-resets the device. The device is unusable until you deactivate the kill switch, so the thief won’t be able to sell it — except maybe for spare parts.

Android devices can be tracked, locked, and wiped remotely, but Google’s solution doesn’t survive a factory reset. A thief can steal an Android phone, reset it, and they’ll have a like-new phone. You can’t permanently disable the device remotely, although you can at least erase your personal data.

factory-data-reset-removes-android-device-manager-1

Android Device Manager

For now, all Android devices have access to Google’s Android Device Manager. Unlike third-party tracking solutions, this solution is completely free and already installed on your phone. You can use your existing Google account for this, so you don’t have to set up yet another account. It’s the ideal Android phone-tracking solution for most people.

Open the app drawer on your Android device and launch the Google Settings app. Tap Android Device Manager and enable the “Remotely locate this device” and “Allow remote lock and factory reset” checkboxes to activate this feature. Anyone with your Google account will be able to remotely track your device, lock, or reset it — so be sure to create a secure password 7 Ways To Make Up Passwords That Are Both Secure & Memorable 7 Ways To Make Up Passwords That Are Both Secure & Memorable Having a different password for each service is a must in today's online world, but there's a terrible weakness to randomly generated passwords: it's impossible to remember them all. But how can you possibly remember... Read More .

Ads by Google

android-device-manager-remote-locking-and-wiping-1

If your Android is stolen or lost Was Your Android Phone Lost or Stolen? This Is What You Can Do Was Your Android Phone Lost or Stolen? This Is What You Can Do There are many good options for remotely locating your stolen phone, even if you never set anything up before you lost your phone. Read More , you can visit the Google Play Store website, click the gear button, and select Android Device Manager. You can also just access the Android Device Manager website directly. If you want to track your Android device from another Android device, you can install the Android Device Manager app.

Google doesn’t keep a location history — it requests your device’s location when you sign in and discards it when you sign out. If the device has already been powered off, reset, or doesn’t have a Wi-Fi or cellular data connection, you won’t be able to track it. You can ring your device at full volume for five minutes to find it nearby, lock it with a new password, or erase the entire device and its data.

These features are useful, but even after you take the most drastic measures — a remote wipe — the thief will end up with a fresh, like-new phone they can use or sell. Yes, a thief can wipe a device even if it’s locked and they don’t know your password.

remotely lock or wipe android phone

Other Android anti-theft solutions 4 Android Anti-Theft Solutions Compared: Which Is The Best? 4 Android Anti-Theft Solutions Compared: Which Is The Best? Anti-theft apps like Lookout, Cerberus, Prey, and Android Lost offer a wide range of options for finding or protecting your device: GPS location, sounding an alarm, locking the phone, wiping the data completely, and more.... Read More have more features, such as the ability to take photos of a thief, display messages on the device’s screen, and have the device regularly check in and report its location so you can view it later.

Survive A Factory Reset With Root Access

Some Android device tracking solutions can survive a factory reset. They do this by using root access to install themselves on the system partition, so they persist even after a factory reset wipes the user data. To do this, you’ll need to root your Android.

Avast! Anti-Theft provides this feature, and it’s free. You have to install the Anti-Theft (rooted) app and go through the installation wizard to set this up. After you have, you can remotely lock your device and set an on-screen message, asking anyone with the device to please return it to you. The thief will have a useless phone that informs people it’s stolen — almost like how iOS’s kill switch works.

A knowledgeable thief could actually wipe the device completely — for example, they could re-flash the device’s operating system or install a custom ROM. But not every thief will know how to do this.

android-anti-thieft-survive-factory-reset-1

None of these solutions are quite as good as a kill switch integrated at a system level. They’ll help you locate a lost device and restrict access to your personal data, but they don’t stop a thief from wiping it and selling your phone. Even an app that burrows deep into the system with root access can be removed if a thief really knows what they’re doing.

Still, while we wait for an official kill switch, they’ll have to do.

Image Credit: Andrés Nieto Porras on Flickr

  1. zeborac
    July 3, 2014 at 5:13 pm

    Did you know this one https://preyproject.com/ ? It is free with basic features.

    • Aibek E
      July 18, 2014 at 8:08 pm

      thanks for sharing this, never heard of that

Leave a Reply

Your email address will not be published. Required fields are marked *