METHODS TO UTILIZE TUBIDY PROTECTIVELY: TRANSCENDENT PRACTICES IN SPITE OF SECURE DOWNLOADS