If you’re ever in a situation (burglary, etc.) where an unattended computer is within reach, do not consider taking it for fear that the system may belong to this hacker. Simply put, “a hacker has his computer stolen, and tells the story of how he recovered it and got the criminal caught.” Continue reading for the story, told at DEFCON.