Prey is a set of bash scripts that helps you track your computer when it is stolen.
This guide shows you how to install Prey.
Install AUR.AUR from the
Add a new device using the control panel on Prey's website.
/usr/share/prey/config and add your device key and API key, both of which are listed in Prey's control panel.
/usr/share/prey/prey.sh as root to ensure that the configuration is correct.
Enable systemd service prey-tracker.service and prey-trackter.timer to automatically start Prey at boot.
To enable/disable modules, you must change the executable permissions for the the "run" files in prey's respective modules/core subdirectories. Adding executable permissions to a module will enable it, while removing permissions will disable the module.
You can use a GUI to configure prey using the
Note that if this doesn't work you are missing a dependency, not sure if Python alone suffices.
The GUI can be used to configure standalone mode.
/usr/share/prey/config can be edited to change
Note that in Standalone Mode, all modules in
/usr/share/prey/modules run by default. To disable them, remove executable permissions on the module's
run file (located within the module's
core subdirectory). For example, the following command disables the
# chmod -x /usr/share/prey/modules/alarm/core/run
To troubleshoot, run
# /usr/share/prey/prey.sh --check
If scrot is installed, prey will use it to take a screenshot if the
session module is enabled. Unfortunately, scrot emits an annoying beep everytime it is run. To disable beeping, append
to the beginning of
There seems to be a bug in version 0.5.3 which gives an error if the SMTP password is set when using "email" post_method, which returns an error, but works fine when executed normally without the --check option.