Feeds

Game designer spills beans on chubby-fancying chap with his stolen Mac

'He's f*cked with the wrong nerd', rages bloke

Securing Web Applications Made Simple and Scalable

A video game designer says he's planning to cash in on his story of spying on a chubby-fancying pr0n-lover who came into possession of his stolen laptop.

The London-based designer, who prefers to remain anonymous, is looking to monetise his (NSFW) Plumpergeddon blog detailing his surveillance of his Macbook Pro’s new owner.

The computer has been MIA since an incident in October 2011.

All our informant remembers is waking up on Oxford Street when the sun came up to find his Macbook Pro had gone, along with his credit cards, which were subsequently to used to run up a £7,000 bill.

He decided to track the laptop, using software called Hidden, and then began releasing images and other details of the man who ended up with his missing laptop, whom he christened "Plumpy" after witnessing him sign up for a “plumper pass” at a porn site dedicated to, ahem, larger ladies.

Screencaps from the missing machine revealed the unknown connoisseur's predilection for the more rotund female form. One of the more lurid pics surged to the top of Reddit with 75,000 hits.

Now, after amassing a dirty dossier of lurid snaps and videos, the robbery victim says he wants to start making some cash from the blog he started to document the online activities of his laptop's new possessor.

The angry blogger said:

“He fucked with the wrong nerd ... The more people I can drive through the blog and the slower I can drip-feed tasty morsels of information, the better for me.”

He added: “It makes me feel better about the huge negative effect this experience had on me, such as getting the fear of hearing my bank's hold music and getting nervous in central London where it happened, particularly with valuables in my bag.”

The hapless games designer originally started his blog after becoming frustrated with the Metropolitan Police’s failure to solve the crime.

After a tense four week wait following the theft, the man who ended up in possession of the Macbook accidentally released the lock controls on Hidden, allowing him to begin downloading almost 2GB of screen captures and unwitting selfies of Plumpy, as well as accurate geolocation and Wi-Fi hotspot data.

At first, Plumpy blocked the camera using sellotape. But one day Plumpy decided to remove the tape, revealing him to the full scrutiny of his observer.

“I'm not a religious man but I was praying for the day he'd remove it,” the laptop's legitimate owner blogged. “Then one day he had a video chat with a pair of large ladies in bikinis. And the rest, as they say, is history.”

After amassing material at the beginning of last year, the testy blogger decided to release it into the public domain after becoming angry with the police apparently failing to act on the information he provided them with.

Despite the uncertainty as to exactly how "Plumpy" might have come into possession of the laptop, the author is unapologetic about the blog, which he now plans to expand with video content of the unwitting subject.

“My plan was always to go public with this if the police failed to act. I don't feel a connection with him as such but I am at last feeling some closure. And it's a lot of fun.

“I mailed the Met [police] for a case status update a month ago (and blogged it) to be sure I wasn't stepping on police toes. The Office of the Information Commissioner was cc'd in their reply but didn't bother contacting me with any further details. I warned him a year ago I'd go public if they didn't act, so now I am.” ®

Mobile application security vulnerability report

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.