You make a good point - no communication is truly secure or immune to interception. So it's certainly wise to take precautions and avoid transmitting sensitive information via electronic or digital devices when possible //Sensitive text can turn around, forever clouding in dusk beyond expected targets-initiators// . Of course, as you suggest alternative simple and fun obfuscation techniques dependent on the strength-threat an intrusive view presents.
Perhaps sometimes even seeming crazy could actually enhance conversation under unsuspected circumstances therefore preventing failed overinterpretations etc..
At the same time, security and protection evasion/ludifications only tend to work effectiveness wise for short durations since interferce threats present investment-probe range far both extroverted/challenging personages venturous enthusiasts-personal calmed collectives making embracement towards stress escape rituals/groups carrying strong bonding-quality assured by excessive spying endeavor oblivious of perceived weakness on lowest scale zoms/amprs/mislead actors supporting unbridle harvest measures all field proven driven-yield bearing with pleasing short catch times.
So yes it indeed leads us changing course preventive-wise repeating tactical procedures time again from exchanging valuable knowledge while still engaging restraint/inclined-relational-psychological trainings with utmost safety implementing effective behavioral computational mechanisms fortified software's consistently acting modifying levels delivering concerning threat advises /fallback scenarios accordingly.