I don't have a laptop or a concern of one, but in an initial read of the concept on site (just out of interest to guage a full benefit of this):
1. For a tracking program like this to work, wouldn't it have to be undetected to the user upon general inspection (not in Add/Remove programs, no Start Menu folder, no icons, etc)? If known like this, all it would take to defeat it is to not go on the net until the program is removed.
2. For a "usage tracks" program (what it sounds like - logging IP, potentially taking webcam shot, etc), coupled with #1 (if all true), that would make this program a legitimate candidate for spyware and would likely be added to the databases of Spybot, SuperAntiSpyware, etc., turning detecting a program such as this into a lead-pipe cinch.
Even if #1 is false, I can imagine spyware authors jumping on this source and making good use of it (the encryption part, I'm sure, if it's good, but I'm sure other parts might be interesting, too), putting all programs that would be based on this code into the anti-spyware databases. Or someone simply not loading this onto their laptop, but a enemy/friends laptop/desktop.
And if #1 and #2 are true, that would make this program utterly moot in short order.
I wonder if this point has been addressed by the author?
----------
Measurement is not management.