Phead
Yeah that’s why I went through the whole threat profile exercise:
Define my assets (money, passwords, identity, reputation, time, independent thought, freedom)
Define where my assets are stored (bank, password vault, gov records/corporate databases, online profiles, and N/A, respectively)
Define what I’m trying to protect them from (criminals, doxxers, overzealous Internet vigilantes, spammers, scammers, targeted ads and algorithmic manipulation, overly-wide search warrants)
Define “risk likelihood” multiplied by “consequence severity” (mostly low to moderate, but corporate manipulation is certain and I really don’t like it, and overly-wide search warrants are random but the consequences are really really bad)
And unfortunately a lot of those horses are already outta the barn but yknow better late than never, so I can at least cut down on the amount of new data the data brokers can collect and sell, and stop giving big companies that are too chummy with poorly managed law enforcement my moment to moment location… and just generally being more secure against random opportunistic attacks.
So to me that sounds like de-googling, de-Verizoning, getting a no-log vpn, using silent link, and using jmp.chat/Jabber-XMPP/Cheogram (because no one I know is on any E2EE comms service).