They are Not Protecting You. They are Watching You.

They are Not Protecting You. They are Watching You.

It always starts with protection.

Age verification to keep children safe. Telemetry to improve security. Background checks to protect the border. App store policies to shield you from malware.

Sound reasonable? Here is what is actually happening.

The Pattern Is Always the Same

Look at what happened in just the last two weeks:

1. Apple started requiring ID verification to access certain features. They call it protection. What it actually does is tie your Apple ID and by extension your device to your real identity. Your government-issued ID in Apple database. Not encrypted in some vault. Just there.

2. Google announced it will block APK installations starting September 2026. They say it is for security, stopping malware. What it actually does is ensure every app on your Android phone must come through Google. They see everything you install. They can remove anything they want. And if you are using GrapheneOS or another privacy-focused Android fork? You are already feeling the walls close in.

3. OpenAI got caught funding fake consumer protection groups that push mandatory age verification laws. The same companies crying think of the children are the ones writing the laws that benefit them most. It is regulatory capture in plain sight and nobody is talking about it.

4. State governments are sharing driver data with Border Patrol. Washington Department of Licensing quietly handed over records for civil immigration enforcement. Nobody voted on it. There was no debate. The data existed, so it got used.

These are not isolated incidents. They are the same story repeating itself.

The Playbook Has Not Changed

You have seen this before:

  • We need this for national security, mass surveillance
  • We need this to fight terrorism, expanded government powers that never expire
  • We need this to protect children, ID verification tied to your real identity
  • We need this to improve our services, telemetry that tracks everything you do

Every single time, the justification is protection. Every single time, the result is more surveillance.

The Data Always Ends Up Where It Should Not

Here is what nobody wants to admit: centralized databases are honey pots. They exist, so power will use them.

Your data is not private if a government agency decides it is useful. Your location is not protected if a company can sell it. Your identity is not safe if an app requires it for your protection.

The Canada-US border works both ways. Five Eyes means your data does not stay in Canada. Washington DOL shared records because the database existed. The White House app tracks your location because the capability was built in.

Data collected is data that will be used. Usually not by who you expected.

What They Hope You Believe

They want you to think:

  • I have nothing to hide
  • If you are not doing anything wrong, you do not need privacy
  • The benefits outweigh the risks
  • This is just how things work now

But privacy is not about hiding. It is about having boundaries. It is about deciding who gets to know your business and not letting anyone else make that choice for you.

What You Can Actually Do

This is not a hopeless situation. But it requires acting:

  1. Reduce your attack surface. Every app is a decision. Every account is a database. Do you need that app? That service? That free account? The less you give away, the less exists to be misused.
  2. Use open-source software. When the code is public, somebody checks it. Signal is recommended by Canada own cybersecurity agency because it is auditable. FOSS means trust through verification, not trust through faith.
  3. Think about your phone as critical infrastructure. It knows where you sleep, where you work, who you call. Treat it accordingly. A Faraday bag costs 15 dollars. A privacy-focused OS costs 99 dollars. Both are cheaper than what happens when your data ends up somewhere you did not expect.
  4. Start thinking about desktop too. Linux Mint is a solid first step away from Windows 11 telemetry and recall features. Dual-booting is easier than you think. You do not have to commit, just explore.
  5. Know your rights at the border. Your phone can be searched. Your unlock code can be demanded. Your data can be copied. Know this before you cross. Sometimes the best privacy decision is leaving your phone in the car.

The Bottom Line

The surveillance is not coming. It is already here.

But here is the thing: awareness is the first step. You would not be reading this if you did not already suspect something was wrong. The next step is doing something about it, not out of fear, but out of principle.

Your data. Your business. Your choice, not theirs.

That is what privacy is really about.


Want help figuring out what makes sense for your situation?

Free 30-minute consultation. No sales pitch. Just a conversation.

Call Gianni: 250.444.8404