(In higher ed IT we often give advice on protecting identity through careful practices. This is a simplified version of some of that advice.)
Thanks for reading! A blog works best with active participation. If you enjoy this blog, please +1 it and leave a comment. Share it on Twitter, Google+ or Facebook. More readers will drive more discussion.