I much agree on your advice to install a firmware password, but make shure you will remember it and to switch it off when selling/donating your computer. On newer Macs there is no way (only resoldering a chip I guess) to get around it.
Without a FW password you can’t boot from another volume/partition (including recovery).
I’m not sure though if it is possible to take the drive out, reformat and reinstall OSX (all same volume and account names) and reboot the FW password protected Mac, without vuwer running.
Maybe the reformatted same drive and volume has given another volume ID, which should be detected by the FW protection.
I have my vuwer Macs auto-login with the ‘’thief’s'’ account without password. When the Mac is on WiFi, I set Ethernet unactive and set System Preferences Changing to have the admin password (also for WiFi on/off switching). No admin password should be reqd for connectiong to another network. When unplugged and powered on it always logs into the theif’s account and the admin account is password protected.
I experimented with locking-out the thief’s account from the Applications/Utilities folder (e.g. no access to Disk Utility or Activity monitor). This made OSX hang totally on boot up and auto logging into the thief’s account, when auto-starting an app from the Utilities folder. So beware.
Vuwer is not invisible and a thief could do a search for software like vuwer and could kill the processes. Without Activity Monitor, Terminal, and without admin rights, things get very complicated.
When you have Little Snitch installed, and logging in on the thief’s account, please wait for vuwer to have send all the emails, and set always allow internet access rules for all the vuwer subprocesses (platypus, google and some more).
This way the thief won’t get notified that vuwer is working in the background.
I may never need vuwer to get a stolen Mac back, but it’s a good feeling to have it installed and setup for a maximum level of security.
Also messing and testing vuwer is just fun.
A key logger feature could be nice, but the privacy and security of Mac users could be in danger. Vuwer can already be used for spying on someone.
What if somebody installs vuwer and sells the Mac without telling?
Maybe you should notify a user (with admin rights) that vuwer is installed.