http://q3o3hdjrxqwxlelvm2htqyvkxconebvvvg5xqwbbbupyuop6chq6ehyd.onion/guides/your-security-plan
For example, an attorney representing a client in a national security case may be willing to go to greater lengths to protect communications about that case, such as using encrypted email, than a family member who regularly emails funny cat videos.
Write down what options you have available to you to help mitigate your unique threats. Note if you have any financial constraints, technical constraints, or social constraints.