1) limits of privacy steps as it relates to threat models
ie: limit of a privacy phone as it relates to a government level adversary
2) avoid the esoteric/philosophical takes about Bitcoin. There’s already plenty of that
3) outline one practical step people can take at the end of the newsletter so the reader can put the post into action