How to Secure Your Crypto Email: Aliases, Forwarding Rules, and Recovery Traps