The Trusted Thief, the Careless Contributor and the Unwary User