TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Why you don't steal from a hacker.

272 pointsby gregcmartinalmost 14 years ago
My flat was raided and ransacked during the London riots, but thanks to tracking software I fed intel to the London Metro police until he was apprehended and my laptop returned.

36 comments

gibersonalmost 14 years ago
Glad the person got their Mac back, but why does this story and ones like it always end at the recovery of the property? Could we get an update on the <i>punishment</i> of the criminal? I'd like to know what kind of repercussions the criminals suffer--do they get prosecuted? I'm just curious if these software tracking systems have been used in court as evidence to convict any of these criminals.
评论 #2878536 未加载
评论 #2878518 未加载
评论 #2879157 未加载
评论 #2878870 未加载
评论 #2878566 未加载
评论 #2881881 未加载
评论 #2880820 未加载
gregcmartinalmost 14 years ago
Sorry I wasn't implying that the software I used made me a hacker, that is simply just my profession... I use the term very widely to be someone who codes, pentests, reverses malware or jailbreaks iphones...
评论 #2878533 未加载
pclarkalmost 14 years ago
This is why I have file vault + password screensaver on my MacBook Pro + insurance. I'd sooner have to wait a few days to get a new laptop than rely on: a) the user not instantly formatting the computer, b) prey finding my laptop, c) the police doing something about it.
评论 #2880621 未加载
nikcubalmost 14 years ago
the word 'hacker' has been diluted to a new low<p>first to 'somebody who can write a web app', to now 'somebody who can install software'
评论 #2878375 未加载
评论 #2878267 未加载
评论 #2878319 未加载
评论 #2878259 未加载
评论 #2878701 未加载
评论 #2878796 未加载
评论 #2878445 未加载
mcantoralmost 14 years ago
It's amazing how when big media releases a story about "hackers ruining America", people come out of the woodwork saying "actually, the term for someone who practices forced electronic entry is 'cracker', and 'hacker' just means someone who writes code", but when someone uses it that way, the HN post fills up with comments about how the term 'hacker' has been diluted.<p>PICK ONE, GUYS.
评论 #2879180 未加载
benatkinalmost 14 years ago
I care more about the safety of my data than the safety of my computer, so I have FileVault full-drive encryption turned on. I don't think a thief could log into my computer without wiping the drive, which would wipe Prey if I had it installed. So I'm not going to bother installing it.
评论 #2880630 未加载
a3_nmalmost 14 years ago
This is neat, but it only works if your setup is simple enough to be usable by a random thief so that they can get an Internet connection ready so that the machine can phone home. Were someone to steal my laptop and boot it, they would reach a tty login prompt in a dvorak layout, and playing around in grub would also lead to an LFS install with a patched agetty greeting them in lolcat. (My LFS was just for fun, so I did silly stuff with it.)<p>In other words, they would probably just wipe the computer and install Windows, and I wouldn't hear about the machine. I guess I could have a Windows install ready with a guest account and sneaky tracking software just for the benefit of an hypothetical thief, but it doesn't seem worth the effort.
评论 #2879628 未加载
therealmost 14 years ago
using a laptop recovery service to do exactly what it was intended to do. sweet hack, bro!
评论 #2878282 未加载
icebrainingalmost 14 years ago
<i>&#62;Luckily the thief was a smart little bugger and he was able to bypass the password by using an OSX install CD to create a new admin account.</i><p>So why did he rely on luck instead of SSHing to the laptop and unlocking the machine?<p><i>&#62;I cranked up the frequency of reports to one in every five minutes to try to get a screen capture of him using gmail or facebook so I could snag a name or login credentials. </i><p>Hmm, start a keylogger (and a sniffer) in the background and then scp the logs a couple hours later?
评论 #2878381 未加载
评论 #2878310 未加载
评论 #2878382 未加载
vascoalmost 14 years ago
My mom is a hacker too. She hacked her own gmail account the other day by recovering her password, she even had to remember the name of her first pet!
评论 #2878434 未加载
tyler_ballalmost 14 years ago
Here is a much funnier and more technical account of someone retrieving their stolen computer. In video form!<p>Skip to 3:15 <a href="http://www.youtube.com/watch?v=OAI8S2houW4" rel="nofollow">http://www.youtube.com/watch?v=OAI8S2houW4</a>
评论 #2878665 未加载
jcfreialmost 14 years ago
Am I the only one who feels that it's wrong to put someone's personal information and picture on the internet just because he stole a laptop? Of course you get your personal information stolen as well, but in my opinion that doesn't justify spreading his image and name all over the internet. that kind of intrusion into privacy (of the thief) is a much bigger crime in my eyes than the loss of some laptop.
评论 #2879241 未加载
评论 #2878719 未加载
评论 #2878708 未加载
评论 #2878722 未加载
评论 #2879301 未加载
评论 #2878929 未加载
评论 #2878774 未加载
评论 #2879794 未加载
评论 #2878706 未加载
Sargisalmost 14 years ago
Is this one of those viral marketing campaigns again? Yesterday, there was a popular thread on Reddit about some guy who retrieved his stolen Macbook by using the exact same software that's being mentioned here. And not to mention the several other threads here on HN a few months ago that are suspiciously similar.<p>Or maybe it's just really useful.
评论 #2878527 未加载
评论 #2878320 未加载
评论 #2878298 未加载
sudonimalmost 14 years ago
I just installed Prey. Ignoring the OP's use of the word "Hacker", you don't have to pay them anything to get good value from the software.<p>I set it up so if this file ever disappears <a href="http://iamnotaprogrammer.com/prey.html" rel="nofollow">http://iamnotaprogrammer.com/prey.html</a> it starts sending me alert messages like the one below:<p>Good news my friend, it seems we found it.<p>Here's the report from your computer:<p>######################################################## # geo ########################################################<p>:: lat=(deleted)<p>:: lng=(deleted)<p>:: accuracy=33.0<p>######################################################## # network ########################################################<p>:: public ip=(deleted)<p>:: internal ip=192.168.8.121<p>:: gateway ip=192.168.8.1<p>:: mac address=34:15:9e:07:af:86<p>######################################################## # session ########################################################<p>:: logged user=sudonim<p>:: uptime=14:21 up 3:12, 6 users, load averages: 2.12 1.91 2.06<p>Happy hunting!<p>-------<p>Then it attaches a picture taken with my camera and a screenshot. All in all, pretty handy to have running.
评论 #2879592 未加载
评论 #2879825 未加载
gstalmost 14 years ago
What I don't understand: I you're so concerned that someone steals your laptop, why do you then install tracking software instead of encrypting your harddrive?<p>If someone steals my laptop I wouldn't care about the cost of lost hardware. Instead I'd care more about my private data that now is in the hands of someone else.
评论 #2880954 未加载
breckalmost 14 years ago
Quick look at the source code (<a href="https://github.com/tomas/prey" rel="nofollow">https://github.com/tomas/prey</a>) seems to show that if you wipe the HD you're SOL. I'm still waiting for Apple to release Find My Mac (similar to Find My IPhone), which will withstand a hard drive reformat.
评论 #2878633 未加载
dkokelleyalmost 14 years ago
I've been wondering about these services. Not having more information about the inner-workings of a monitoring/recovery service, I'm concerned about the company's ability to spy on me the same way I could spy on anyone who uses my stolen laptop. What prevents this from happening?
评论 #2878325 未加载
评论 #2878351 未加载
waffle_ssalmost 14 years ago
Selling corporate firewall hardware doesn't make you a hacker
评论 #2879009 未加载
kirillzubovskyalmost 14 years ago
One problem I find with these tracking applications, at least for the average users, you actually have to remember that: (1) you have one installed and (2) your credentials.<p>It's kind of a problem, if you have all your other data stored using something like 1Password.<p>I know for sure I have a tracker installed on my laptop, but since it's running in "stealth" mode, I have no clue what it is or where to find it. I guess I am not hacky enough.
kragenalmost 14 years ago
Wait, all he had to do was report the guy's name, address, and photo to the police, and they got the computer back <i>for him</i>? It sounds like the London Metro Police are a lot better than the ones in, say, San Francisco.
_piusalmost 14 years ago
What I worry about with many of these recovery stories is that you're probably not humiliating the criminal, just some unlucky person who bought the computer on Craigslist.
评论 #2880532 未加载
joshaidanalmost 14 years ago
Looks like the story just got pulled. I wonder if it was from all the criticism over the use of the word hacker, or if it was for privacy reasons.
评论 #2878824 未加载
nakkielalmost 14 years ago
A lot of bits wasted here about semantics but not a single one raising the multiple racist allusions on the linked blog post.
joshaidanalmost 14 years ago
I noticed he forgot to black out the guy's IP address 90.201.72.42 in the screenshot.
评论 #2878914 未加载
Void_almost 14 years ago
This is exactly why I don't use password protection on my MacBook Pro.
pothiboalmost 14 years ago
The guy browsed the internet for muslim revelation videos. I could have give him 1 tip to be in God/Allah's good Grace: Don't steal other people's stuff.
gabaixalmost 14 years ago
404 page has been pulled out 1 min ago.
rajpaulalmost 14 years ago
"took a report and dusted for prints, performed typical forensics"<p>I'm impressed that the police dust for prints in England. I've never heard of someone getting that kind of thoroughness for a domestic burglary where I live.
评论 #2878547 未加载
saturn7almost 14 years ago
How the world has changed, Hackers use macs?
评论 #2878494 未加载
评论 #2878657 未加载
评论 #2878451 未加载
EGregalmost 14 years ago
Why didn't a real hacker have a keylogger installed on his machine instead of just the webcam thing? You could have gotten the guys' password to his facebook
评论 #2878912 未加载
rickdalealmost 14 years ago
I am sorry, but mere mortals have not heard of and don't use prey project. Hackers use prey project. Professional ones.
xdalmost 14 years ago
This article seems to imply this "hacker" used some actual skill set to retrieve their stolen goods. Installing tracking software on a mac and then bragging about it when stolen and then found doesn't fit with what I'd call being a hacker.<p>Nice story though. And I'm happy another rioting / looting is going to court to answer for there actions.
评论 #2878802 未加载
MatToufoutualmost 14 years ago
Maybe this guy IS a hacker, or maybe he's NOT, I don't care, but the word hacker is worthless using in this story, didn't see any hack involved...
dwrowealmost 14 years ago
"Hacking" is now referred to, someone posting on anothers facebook, since they were still logged in. /facepalm
lawlitalmost 14 years ago
So now everyone who installs a "tracking software" on his laptop is a hacker. Really, the internet has changed.
budu3almost 14 years ago
Did Sam Odio's blog get hacked? Because I refuse to believe that the Sam whose comments I've been reading on HN would steal from someone. Sam how is what you're doing different from what Anonymous et al are doing? However irritating Jonathan's experiment is, it doesn't give you the right to impose you idea of morality on them.
评论 #2880124 未加载