This one smells like a hoax. I suppose if you followed a cloud-only scheme for important stuff (like many do), it wouldn’t really matter.
Laptop Thief Mails Victim His Data On a USB Stick
What do you think? Find the comments.
This one smells like a hoax. I suppose if you followed a cloud-only scheme for important stuff (like many do), it wouldn’t really matter.
Laptop Thief Mails Victim His Data On a USB Stick
What do you think? Find the comments.
Twitter Comment
RT @theappslab: Laptop Thief Mails Victim His Data [link to post]
– Posted using Chat Catcher
Twitter Comment
Laptop Thief Mails Victim His Data [link to post]
– Posted using Chat Catcher
http://www.thelocal.se/29636/20101015/ has a little more detail to make it less hoax-like. But it still begs the question, how do we know the data was unaltered? There have been scandals over data fudging and statistical mistakes.
I was thinking the same thing. Data were returned but who’s to say they weren’t copied and sold to an identity theft ring. This could be a trick to throw the good professor into a state of relief, making him less vigilant.
We’re obviously half-empty types :/