Respect Sensitive Metadata
Even harmless-looking tags can aggregate into intimate profiles. Use neutral phrasing, split personal and shared vocabularies, and encrypt private indexes. Audit sync targets for leaks. Build a mental model of who could see what and when, aligning convenience with boundaries, dignity, and the principle of least necessary disclosure.