"G. Morgan" <G_Morgan@easy.com> wrote in message
news:bpa567htcc7gjh397mqavi9op949v96270@Osama-is-dead.net...
> Dustin wrote:
>
>>possibilities if the
>>lojack was tricked into thinking the worst by a malware file that
>>detected it's presence and took advantage.

>
> A new attack vector, suggest you?
>
> That would be a nasty one.


More a payload than an attack vector. Like the old cryptovirology
angle, with a twist. You want your data back, pay me. Upon payment
I *might* just tell you how - and it involves LoJack and you getting a
root key of some sort from them - nothing to do with me at all, as it
wasn't *my* key being used.