Good point about people unknowingly giving their coins to less-than-honest agents.
I actually wanted to read more about how this deceptive harvesting leads into an attack on the network, but I get the point about people reacting to incentives and how on an open-source protocol, a person or persons could set up mechanism to siphon or concentrate resources.
Good points.