Yes sir. Targeted by whom? And what are their resources? A low-resource bad actor can harvest much info from the scheme you are discussing.

Reply to this note

Please Login to reply.

Discussion

No replies yet.