When to Worry and When to Live

I’ve been writing for five days straight and I can feel the edges of my own thinking getting sloppy, and the thing I need to tell you tonight is that getting sloppy is the biggest risk you face right now. Not surveillance. Not misinformation. Fatigue.

If you’ve been following these chapters and doing the work, you now know more about digital security, surveillance infrastructure, and information integrity than the vast majority of people around you. You’ve checked your location history. You’ve audited your apps. You’ve built a threat model. You’ve secured your passwords and enabled two-factor authentication. You’ve moved at least one conversation to Signal. You’ve started opt-outs from data brokers. You’ve seen your browser fingerprint. You’ve practiced evaluating information at the source.

That’s a lot. In less than a week.

And if you’re feeling overwhelmed, that’s not weakness — it’s a documented psychological response. In 2016, researchers at the National Institute of Standards and Technology published a study on what they called security fatigue — the weariness and reluctance people develop toward dealing with computer security. Brian Stanton, Mary Theofanos, and their colleagues interviewed forty typical computer users and found that more than half expressed fatigue unprompted. The participants weren’t indifferent to security. They were overwhelmed by it. They described resignation, loss of control, fatalism. The researchers found that this fatigue directly contributed to poor security decisions — not because people stopped caring, but because caring without a sustainable practice became unbearable. They reached a point where every notification felt like a threat, every setting felt inadequate, and the gap between what they knew and what they’d done felt insurmountable. So they stopped.

Don’t stop.


Here’s how this works sustainably. Not everything you’ve learned needs to be active all the time. Security is not one state — it’s two modes.

If you’ve seen the show Severance, you know the premise: employees at Lumon Industries undergo a procedure that splits their consciousness. Their work selves — the “innies” — know nothing about their lives outside the office. Their outside selves — the “outies” — know nothing about what happens at work. Two completely separate identities, each operating in its own sealed compartment. Lumon designed it that way because compartmentalization is control. When your selves can’t talk to each other, neither one has the full picture. Neither one can act on the whole truth.

The severed floor is what happens when you treat security as a set of disconnected tasks instead of an integrated practice. One version of you audits your apps. Another version checks your data broker listings. A third version manages your passwords. None of them talk to each other. None of them see the whole picture. And eventually, each one burns out independently, because compartmentalized effort is exhausting in a way that integrated habit is not.

What you need is the opposite of severance. You need your security practices to be one continuous identity — some things you do always, some things you activate when the context changes, all of them connected to the same threat model.

There are daily habits. These are things you do every time, without thinking, because they’re now part of how you operate. Use your password manager. Communicate sensitive things on Signal. Don’t reuse passwords. Don’t click links in unexpected messages without checking. These become automatic. They cost almost nothing once they’re habits.

Then there are situational activations. These are things you do when your threat level changes — when you’re going to a protest, traveling internationally, dealing with a stalker, starting a new job with higher exposure. Reviewing your data broker listings. Tightening your social media privacy settings. Checking your phone for unfamiliar apps. Updating your threat model. You don’t do these every day. You do them when the context calls for it.

The distinction matters because it’s the difference between a practice you can maintain for years and a state of hypervigilance you’ll abandon in a month. Good enough security practiced consistently beats perfect security abandoned after four weeks.


Consolidate. Open your field journal and build a personal security checklist from everything you’ve done. Not everything you’ve learned — everything you’ve actually done.

Your checklist should have three sections.

What you’ve changed permanently — password manager installed, Signal as default for sensitive conversations, search engine switched, uBlock Origin running. These are your new defaults.

What you maintain on a schedule — data broker opt-outs every three to four months, app permission audit quarterly, HIBP check quarterly, devices updated when prompted. Put these in your calendar. Literally. Make them recurring reminders.

What you activate situationally — threat model review before changes in exposure, burner practices for high-risk contexts, full self-OSINT check if you suspect you’re being targeted. These stay in your field journal as reference, not as daily tasks.

Write it out. This document is your proof — to yourself — that you’ve done the work. A printable checklist with all three sections is available in the companion materials.


In 2019, Hong Kong protesters developed some of the most sophisticated collective security practices any civilian movement has ever produced. They used Telegram with pseudonymous accounts. They paid for transit in cash. They used AirDrop to share maps and updates without internet connections — device to device, bypassing censorship entirely. They wore matching dark clothing to make individual identification harder. They developed hand signals for communicating across crowds. They used mesh networking apps when cell service was disrupted. Group administrators in private channels assumed security roles, purging compromised members and rotating access when someone was arrested.

Despite all of this — despite extraordinary discipline practiced collectively by tens of thousands of people — over 10,200 were arrested. That number comes from Hong Kong government disclosures to lawmakers, covering the twenty months from mid-2019 onward.

The lesson isn’t that security practices fail. The lesson is that individual security has a ceiling. The protesters who survived longest, who maintained the most operational freedom, were the ones who practiced security collectively. Their threat models accounted for each other. Their communication practices were shared norms, not individual choices.

Everything you’ve learned in these chapters is real. It works. And it has a structural limit that no amount of individual discipline can overcome. Your security ceiling is set by the least secure person you communicate with. You can encrypt everything on your end. If the person you’re talking to screenshots the conversation and posts it, encryption didn’t help.


There’s one more chapter in Part 1. It talks about the hardest skill of all — and the one I think matters more than any of the others.


Summary

Security fatigue is the greatest threat to everything you’ve built in the previous ten chapters. The antidote is integration, not compartmentalization: organizing your practices into daily habits, scheduled maintenance, and situational activations so that security becomes a sustainable identity rather than an exhausting activity. Individual security also has a structural ceiling — your practices are only as strong as the least secure person you communicate with — which is why the next chapter shifts from what you do alone to who you do it with.

Action Items

  • Build your personal security checklist in your field journal with three sections: permanent changes, scheduled maintenance, situational activations.
  • Set recurring calendar reminders for your scheduled maintenance items (quarterly data broker opt-outs, app permission audits, HIBP checks).
  • Review your checklist against the work from Chapters 2–10 to make sure nothing you’ve done falls through the cracks.

Case Studies & Citations

  • NIST Security Fatigue Study — Stanton, B., Theofanos, M., Prettyman, S.S., & Furman, S. (2016). “Security Fatigue.” IT Professional, 18(5), 26–32. Published by IEEE. The foundational research on why overwhelmed users abandon security practices.
  • 2019 Hong Kong Protests — Over 10,200 arrested during 2019–2021 despite sophisticated collective security practices including pseudonymous communications, cash transit, AirDrop distribution, mesh networking, and rotating channel administration. Arrest figures from Hong Kong government disclosures to lawmakers (South China Morning Post, April 2021; Hong Kong Free Press, June 2024).

Templates, Tools & Artifacts

  • Personal Security Checklist Template — Three-section framework: (1) Permanent changes / new defaults, (2) Scheduled maintenance with calendar frequency, (3) Situational activations with trigger conditions. Build in your field journal.
  • Download: Personal Security Checklist

Key Terms

  • Security fatigue — The weariness and reluctance to deal with security decisions, leading to resignation, risk minimization, and decision avoidance. Identified by NIST researchers as a primary driver of poor security behavior among people who are aware of risks but overwhelmed by the effort of managing them.
  • Daily habits vs. situational activations — Framework for organizing security practices into two modes: things you do automatically every time (password manager, Signal, no link-clicking) and things you activate when your threat level changes (protest attendance, international travel, targeted harassment). The distinction between sustainable practice and unsustainable hypervigilance.