Assume You’re Always Watched
Operate as if law enforcement, rivals, or hackers are monitoring everything. Avoid predictable patterns change locations, communication methods, and aliases often.
No Names, No Faces
Use encrypted, anonymous identities burner handles, coded language. Never discuss...