Wisdom of crowds, with limits
Liquidity and manipulation defenses separate serious markets from gimmick sites.
Device hygiene
Reboot-to-clean modes and lockdown profiles reduce exposure when traveling through hostile networks.
Policy lag
Export controls and vendor bans trail mercenary spyware—assume compromise and layer defenses.