Ev responded to my comments from the other day about whether applications can be designed to steal. Jason's tried to encourage a discussion about the topic, asking how an application would function if it were designed to steal. Some interesting discussion follows.