. "See the link I provided earlier in this post for some examples of data being stolen from portable computing solutions." . . .