I’ve had my data leaked more than enough times so I actually do need SOME of those things. alot of them Idk what they are or don’t need them. Everyone has their own threat/preference model. It shouldn’t be performative though. You use what you use and keep quiet about it.