Instead, a pseudonym, such as a screen name or an alias, could be used to protect the first entity's privacy and provide additional security.Although the first entity need not use a real identity, the first entity must establish an account with a money source.