---

How to integrate Prey into the security posture of your Linux PC

The other option is to install Prey and still encrypt the disk, so that in the unlikely event the disk is decrypted without the configured passphrase, Prey will be able to call home and hopefully, help you recover the unit. If you go this route, remember to also have a backup system in place. You can’t lose your data by backing it up.

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis