Like many corporations, I got the impression that they contracted third party service(s) for customer support. This person's home was kind of out in the boonies. No cellular data service, no broadband service... and quite naturally dialup wasn't really a viable option; even if available. The TurboTax customer called the Geeks/Nerds onsite to help him. Several years ago, I was that Geek/Nerd tech. Product documentation and customer service were both claiming that the product would support doing Federal taxes with no internet connection except, for reasons I don't quite recall at the moment, it wouldn't. With only a few minutes of exposure to the issue, it seemed that I knew more about the product than their customer support team.
In other examples where I had to install their product on an O/S that I setup... which is always the PROPER way... that is, the user is NOT operating from an Administratively privileged account, their software just couldn't handle it. Diving in further, it became apparent that they were still using antiquated coding practices from more than a decade ago. (like Windows Millenium/98/95... not even NT) Even if I changed the install locations using custom setup options, Symbolic Links and/or used ProcMon in conjuction with SubInACL to grant the user/program access to all file and registry resources, the program would still demand privileges it wasn't using and didn't need. Setting compatibility modes didn't help. Like 99% of the software out there, it didn't install drivers or service(s).
I *HATE* programs like theirs with a passion... rendering even basic security practice useless; asking for full control of the system just to launch even if it wasn't doing a self-update. Last thing you want, is to train a user to routinely enter elevated credentials where doing that should be a rarity. In an Enterprise environment we ran into similar issues with their products and I HATED them there too. Just to keep from being bothered my coworkers would always elevate users to local admin.
In that situation and fortuantely, I only had to elevate program privilege upon a self-update. But again, it demanded privileges it didn't need because I had already granted the user access to the specific file and registry resources that the program wanted to modify.
It wouldn't surprise me at all if their software is wildly exploitable.
BTW, the handle is of no relation.
Intuition was a strong ally growing up... no glasses and not being able to see the chalk board (even sitting in the front row), or read facial expressions... had to learn to put two and two together with large information gaps.