That is priceless.
It's like Y2K!
First off it cannot work.
Second, It cannot work.
First rule of security = PHYSICAL Security.
No matter what is deployed (RFID, GPS, Startrek Security Intervention) Two things must happen.
RFID. The laptop has to be with in the range of a reader. Pretty sure that's not going to happen.
GPS and all that other BS they are implying. Yea, OK the laptop has to be turned on.
So three scenarios.
1. Idiot steals laptop and sells to friend. Friend gets busted.
2. ID thief gets laptop, removes HDD, Clones HDD Throws laptop in river. (wow all that anti hacking technology worked real well for you didn't it?)
3. I get the laptop, Know that a special BIOS is needed to post the attached hardware. Remove the GPS and what ever else they thought of chip, and rewrite the bios so It functions with out the chip.
Post findings on the Internet.
Sell the laptop
If you have physical access to a computer, you own it!
It's a proud day for bastards anywhere when 4 posts in a row are all from the BOFHs. *Sniffle*.
*Chest swelling with pride*. My other PFY has hit it on the head in one of my points that having physical access will probably always equal root access:)
Unless of course they make a laptop where it has a full hand scanner that also checks a temp too so you can't saw someone's hand off and use that to get passed the reader heh. Then of course you could still set his hand on fire and dip it in warm water to make it still read it, but hey I didn't say it was bulletproof.
There are encryption methodologies that will absolutely prevent access unless the user has the correct credentials to "Unlock" the data. So physical access is meaningless.
That being said, that type of methodology is flawed in that only one or few will have such credentials. Now those of you that remember Novell from the early days. If you forgot your admin password, or your administrator got pissed - changed the password and left. You were pretty much ****ed!
Also, let us not forget the L.E.A.F. key for PGP. http://jya.com/pgp-clipper.htm
There will always be back doors, some line of test code not removed from the production release, something that with enough time and money - we'll get it. And to be honest, usually we will find your unencrypted data in the trash can, or facebook or somewhere where you least expect your data to end up.