TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Mark Bao tracks down his stolen laptop and has the last laugh

269 点作者 biggitybones大约 14 年前

30 条评论

biggitybones大约 14 年前
"The thief has since returned the laptop, in hopes of clemency in the form of the YouTube video being pulled. Bao has indicated, though, that he's not interested in cutting a deal. Instead, he's content using backup service Backblaze—which syncs changes made to the laptop in the cloud—to find access the guy's Facebook page, dig up PhotoBooth pictures he took, and generally let him stew in his internet humiliation for a while." - <a href="http://gizmodo.com/#!5784633/laptop-thiefs-ridiculous-dance-video-posted-by-tech+savvy-victim" rel="nofollow">http://gizmodo.com/#!5784633/laptop-thiefs-ridiculous-dance-...</a><p>Now he's just turned it into a plug for his startup. Smart guy.
评论 #2359880 未加载
评论 #2359910 未加载
garyrichardson大约 14 年前
As someone who's had plenty of things stolen in the past, these stories make me happy.<p>The vengeful part of me hopes this jerk gets laughed out of every job interview he ever has for being the guy who stole the computer and had his dancing video put on youtube.
评论 #2359839 未加载
评论 #2359711 未加载
noodle大约 14 年前
as an update, he got his laptop back (thief turned it in, perhaps because he knew he was caught). because he now has 2 airs, he's going to auction off the original and donate proceeds to japan efforts.
blhack大约 14 年前
I absolutely hate this sort of vigilantism. How does anybody know that the guy in the video is actually the guy that stole the laptop? How do we know that he isn't just some guy who bought it on craigslist?
评论 #2360142 未加载
评论 #2360083 未加载
评论 #2360035 未加载
评论 #2360140 未加载
评论 #2360029 未加载
评论 #2360046 未加载
评论 #2360337 未加载
评论 #2360048 未加载
评论 #2360557 未加载
评论 #2360138 未加载
评论 #2360117 未加载
Stormbringer大约 14 年前
On the stolen laptop theme, I recently saw a youtube video by an Australian chap which went like this:<p>Tenant/house-guest (who is wanted for fraud in several states) ran off, leaving several thousand dollars in rent in arrears and in the process stealing three laptops.<p>FAB (the victim) gets some reports from friends a couple of weeks later that the perp is staying in a nearby motel. FAB goes around early-ish in the morning, knocks of the perps door, and the perp opens the door and the discussion gets heated. FAB is 'forced to defend himself' <i>cough</i> and after he finishes bouncing the perps head off the walls and is waiting for the police and ambulance to arrive (perp is un/semi-conscious), eh enters the motel room, recognises the three laptops, and puts them in the boot of his car.<p>Police arrive. Ambo turns up and hauls perp off to hospital. Police insist that FAB give the laptops to the motel manager, and they tell the motel manager to await further instructions.<p>Later that day perp checks himself out of hospital, goes back to motel, asks for laptops, manager gives them to him, and then high-tails it off to Victoria (the other end of Australia).<p>Moral of the story: police are useless no matter what country you are in.
评论 #2363620 未加载
dstein大约 14 年前
Mark should try to hack it so it broadcasts live without the thief's knowledge. It could be a huge inside joke where nobody tells him, kind of like The Truman Show.
评论 #2359823 未加载
评论 #2359698 未加载
评论 #2359740 未加载
gojomo大约 14 年前
Ultimately, the same sort of self-help Mark has used for recovery could be used by criminals for identity-theft against others.<p>How? Preload a cheap laptop with software to let you monitor it. (This could be made way more sophisticated, and hard to eradicate, than a online backup subscription.) Leave it somewhere to be stolen. Monitor its later use for information that could allow stealing many times the initial laptop value from its later users. (Those later users may in some instances be the laptop thief, but could more often be others who thought they were buying a cheap used laptop.)<p>This is a good reason to beware deals that seem too good to be true, when purchasing used computer goods.
评论 #2360701 未加载
charlief大约 14 年前
The detective work reminds me of an old great (p-p-p-powerbook):<p><a href="http://www.zug.com/pranks/powerbook/" rel="nofollow">http://www.zug.com/pranks/powerbook/</a>
评论 #2360450 未加载
评论 #2360300 未加载
评论 #2360148 未加载
pmikal大约 14 年前
I tracked down a stolen laptop using Prey (<a href="http://preyproject.com/" rel="nofollow">http://preyproject.com/</a>) and Live Mesh's remote desktop. Upon having the laptop stolen, Prey notified my it was online. I remote connected, installed a keylogger and used that along with Prey's camera images to identify the thief and have the person arrested.
thematt大约 14 年前
This is the perfect situation where Prey (open source), would have come in handy: <a href="http://preyproject.com/" rel="nofollow">http://preyproject.com/</a>
pedrokost大约 14 年前
I preferred the story of Zoz. He provides a detailed explanation of how he recovered his lost Mac. <a href="http://hackaday.com/2010/12/25/a-hackers-marginal-security-helps-return-stolen-computer/" rel="nofollow">http://hackaday.com/2010/12/25/a-hackers-marginal-security-h...</a>
mklappstuhl大约 14 年前
Am I the only one that thinks that this could be a contrived story?
评论 #2360595 未加载
alphadog大约 14 年前
Mark needs to do my PR. He always seems to find a way to get into the news.
AbyCodes大约 14 年前
Here is a similar video cum presentation ( and its better in my opinion ) :<p>Defcon 18 : Pwned by the owner - What happens when you steal a hackers computer -- zoz part <a href="http://www.youtube.com/watch?v=U4oB28ksiIo" rel="nofollow">http://www.youtube.com/watch?v=U4oB28ksiIo</a><p>The Presentation is really funny, but some may find the "invasion of privacy" a little disturbing. Its kinda on the extreme side ( warned! ) but is very informative and funny nonetheless.
评论 #2361837 未加载
SriniK大约 14 年前
Why is it #1 HN entry? It's a sincere question.
评论 #2361233 未加载
nakkiel大约 14 年前
"Don't steal computers belonging to people who know how to use computers"<p>Implying using a data sync service turns one into one of the chosen few who "know how to use computers".
huhtenberg大约 14 年前
It'd be nice to know why the guy captured on video is in fact the <i>theif</i> (and say not someone who got the laptop off Craigslist).
mncolinlee大约 14 年前
Best cloud backup sales pitch ever! Then again, I wonder how much data gets stolen from badly-designed cloud apps.
esad大约 14 年前
I'm not sure Mark is the smarter one in this one. If the thief has been able to auto log-in as him and fill his browser history, this probably means that he can also read Mark's history and the rest of his home directory is lying there unencrypted, with his identity wide exposed.
rgbrgb大约 14 年前
This happened to me with a cabbie! I tracked mine down through web history as well.<p>A friend made a short radio story about it: <a href="http://thebarkandthebite.files.wordpress.com/2010/10/cab-for-web.mp3" rel="nofollow">http://thebarkandthebite.files.wordpress.com/2010/10/cab-for...</a>
techiferous大约 14 年前
"The best part is that the person currently in possession of Bao's machine has no idea that the victim has access. For now, Bao's just having his "lulz," and doesn't seem terribly concerned with reclaiming his property."<p>This is not true.<p>The thief has offered an "apology" of sorts: <a href="http://bostinnovation.com/2011/03/23/dont-steal-a-computer-from-a-nerd-and-record-yourself-making-it-rain" rel="nofollow">http://bostinnovation.com/2011/03/23/dont-steal-a-computer-f...</a><p>And Mark Bao has his laptop back and "plans to sell the returned Apple and donate the proceeds to the Red Cross Japan fund." <a href="http://blogs.forbes.com/kashmirhill/2011/03/22/to-catch-a-computer-predator/" rel="nofollow">http://blogs.forbes.com/kashmirhill/2011/03/22/to-catch-a-co...</a>
markbao大约 14 年前
What the hell. I was hoping that this wouldn't hit Hacker News and was satisfied until I woke up this morning. :p<p>I'm actually slightly embarrassed that this is on Hacker News right now.
评论 #2360396 未加载
评论 #2360681 未加载
albahk大约 14 年前
This is way overblown. A guy steals a laptop and gets caught red-handed so you post a video to embarass him.<p>He's lucky he didn't get his hand cut off like in other countries.
johanh大约 14 年前
Swedish thieves send you a backup. <a href="http://bit.ly/ha6dmq" rel="nofollow">http://bit.ly/ha6dmq</a>
teyc大约 14 年前
Why is it that the last comment on every blog that features this story calls it a hoax?
klbarry大约 14 年前
Mark Bao has really not made a single mistake in his PR execution. I have to congratulate him and learn from him, as others here have also said.
montydad5000大约 14 年前
That is some epic revenge there. Kudos to the victim!
JacobAldridge大约 14 年前
Three words for the thief: Wrong victim. DANCE!
alias8大约 14 年前
The thief could also very easily find Mark, punch his face out and see who has the last "lulz"
评论 #2359843 未加载
评论 #2359821 未加载
philthy大约 14 年前
when i told a friend about this he said<p>"35 pass erase followed by OSX on a portable drive, resell immediately at a good distance for a good keep quite discount"<p>when i responded with<p>"what about some kind of advanced government software or computer forensics kit"<p>his rebuttal<p>"only going to get you if its laden with child porn"<p>i chuckled