Do I need to tell the many ways in which the private keys of a victim can be obtained by a thief?
Please enlighten us.
OK, where do I start? You know what a 'computer' is? A 'program'? A 'hacker'? A 'trojan'? A 'key logger'? A 'hardware patch'? A 'memory dump'? A 'covert channel'? A 'malicious wallet software'? A 'pseudo-pseudo-random number generator'? A 'social engineer'? A 'disgruntled employee'? A 'naive user'?