Would it be conceivable that if this fictitious premie was using a Rawat Foundation computer set up at a tent site...that the log in info could be traced back to that premie? In other words how secure would those computers be? Wopuld this fictitious premie fear being identified if he / she used a known screen name? I am just asking because computer stuff is NOT something I am knowledgeable about. Hell, I won't even use my Business computer to go online. I won't do internet banking transactions and am very cautious about depositing cash in an ATM machine!
Although taking cash out of ATM's is fine and easy... I actually hope they somehow screw those transactions up and neglect deducting my withdrawel! LOLOL