2. Creating a threat model

2.5. Put in a reasonable effort

There is no perfect option for security. Consider how much trouble you're actually willing to go through to eliminate these risks. Not everyone has the same priorities, concerns, or access to resources. Your risk assessment will allow you to plan the right strategy for you, balancing convenience, cost, and privacy.

For example, an attorney representing a client in a national security case may be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a mother who regularly emails her daughter funny cat videos.