What is you crazy OpSec techniques?
I am talking over the top, what lengths to you go to ensure you Operation is air tight.
Not air tight, not truly “OpSec,” but people do call me crazy for having a separate e-mail for every service. This has caught three leaks so far–if you receive spam you immediately know which service got pwned. If that happens I delete the e-mail and move on. Takes some effort, but is worth it in my opinion.
Not mine, but typically some corporations and government agencies block USB ports or have devices that record everything going through those ports.
What is your definition of "Operation" because my threat-model is probably not your threat model.
But in the past, not doing crimes, gave crazy good results.