The Illusion of Privacy: Part II. The Three Layers of Illusion
by Marivel Guzman | Akashma News
September 12, 2025

✨ This section builds the skeleton: transport-level encryption, metadata exposure, endpoint compromise.
1. Encryption Without Anonymity
HTTPS does one job well: it encrypts the stream of data between your browser and a server. A hacker on the same café WiFi cannot see the words you type or the article you load. But encryption is not anonymity. Your ISP, and by extension state agencies, still know that you connected to akashmanew.com. They may not see which article you read, but they know you were there. For intelligence contractors, this “metadata” is more than enough. Snowden’s leaks showed us that governments didn’t need to read every email — knowing who contacted whom and when was already gold.
2. Metadata as the New Surveillance Currency
Palantir and its competitors thrive on what HTTPS leaves untouched. Connection times, device IDs, location data, purchase histories — each a puzzle piece. Alone, they may seem trivial. Together, they form a mosaic of identity, behavior, and intent. If you read an Akashma News exposé at 8:05 p.m., and your phone pinged a cell tower downtown at 8:07, and you bought a coffee at 8:12 with your debit card, the lock icon has protected nothing of real consequence. Surveillance today is not about peeking into encrypted tunnels — it’s about mapping the shadows around them.
3. Endpoints: Where Encryption Never Reaches
Even the strongest lock is useless if someone watches over your shoulder. Pegasus spyware, and countless less famous siblings, operate at this level. They infect the phone or computer itself, capturing messages before they are encrypted and after they are decrypted. Screenshots, keystrokes, microphone activations — the spyware turns the device into an open book. HTTPS cannot touch this. This is why journalists, activists, and even heads of state have fallen victim: the illusion of privacy evaporates when the compromise begins at the source.
Key Sources
Glenn Greenwald — journalist who worked directly with Snowden and Poitras on the NSA leaks.
Laura Poitras — filmmaker & journalist, co‐recipient of the Snowden documents.
Snowden’s interviews, excerpts in No Place to Hide (Greenwald’s book) and in primary Guardian/Wired/Vanity Fair reporting.
1. “Encryption in transit vs metadata visible”
Snowden said NSA was collecting vast amounts of metadata on US citizens without warrant or specific suspicion.
The Boundless Informant tool (leaked by Snowden) visualized how NSA counted metadata globally — clearly showing metadata was collected and analyzed.
2. “Device compromise (endpoints) & opsec measures Snowden/Poitas/Greenwald took”
In Wired’s “Edward Snowden: The Untold Story,” Snowden describes removing batteries from phones, being cautious about location, being aware of techniques for surveillance.
In Citizenfour (Poitas/Greenwald) and the Vanity Fair “Shadowland of Secrets” article: Snowden communicating via encrypted channels, choosing to meet in Hong Kong, using security‐aware practices.
3. “Greenwald, Poitras have full archives / media roles”
Laura Poitras is one of the initial journalists to receive Snowden’s documents, along with Greenwald. They have said they hold full archives.
The book No Place to Hide by Greenwald details many of the programs revealed and discusses the leaks based on those documents.
What Isn’t Fully Supported (Caveats)
To keep things precise and avoid overclaiming:
“No one can snoop what article they’re reading” is too strong; these sources show metadata is visible and location information can leak through endpoints or device compromise. The sources do not claim HTTPS stops state‐level mass surveillance or endpoint spying.
Snowden’s own statements acknowledge there are trade‐offs, limitations. For example, in his interviews, he said you cannot have perfect security and perfect convenience.
There is no verified public documentation (from Greenwald/Poitras/Snowden) that HTTPS alone stops all forms of surveillance (especially advanced spyware like Pegasus). These claims are inference or extrapolation based on understanding of how technology works, not direct claims in the Snowden archive.
Read the Introduction to The Illusion of Privacy Series
The Role of Independent Thinkers

Share this:
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on X (Opens in new window) X
- Click to print (Opens in new window) Print
- Click to share on My space (Opens in new window) My space
- Click to share on Pocket (Opens in new window) Pocket
- Click to share on WhatsApp (Opens in new window) WhatsApp
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Reddit (Opens in new window) Reddit
- Click to share on Tumblr (Opens in new window) Tumblr
- Click to share on Pinterest (Opens in new window) Pinterest
- Click to email a link to a friend (Opens in new window) Email
- Click to share on Telegram (Opens in new window) Telegram
Related
-
September 30, 2025 at 5:11 amThe Illusion of Privacy and the Role of Independent Thinkers | Akashma Online News
Search AON
Top AON Articles
- Photo of Ilhan Omar in Mugshot Circulates on Social Media
- Exposing a Scam: Fake Rakuten Job Offers, Data Breaches, and the Erosion of Digital Privacy
- Great Stories - Alfred Nobel
- The Oil Connection to Afghanistan: Condoleezza Rice and Hamid Karzai
- The Tesla Illusion: How Elon Musk Rebranded a Visionary’s Name to Sell Us a Dream We Already Owned
- Japan Cultural Crisis
- Children as Currency: The Monsters Behind the Laughter
Most Recent Articles
- The Resurrection of the Individual
- When Power Needs a Martyr
- The Algorithm and the Altar
- From Invisible Man to Invisible Truth
- Keratin Serums — Beauty, Risk, and the Truth Behind “Silky” Promises
- The Illusion of Privacy: Trust and Betrayal
- The Illusion of Privacy: From Snowden to Palantir Pegasus, Why the Lock Icon Isn’t Enough
- The Illusion of Privacy: Part II. The Three Layers of Illusion
- Note from the Editor
- Gaza’s Ongoing Ordeal: A Call to Conscience
- Bring Back The Orbit Pavilion: A Sound Bath of the Cosmos
- The Illusion of Privacy and the Role of Independent Thinkers
- When AI Stalls: OpenAI’s GPT-4 and GPT-5 Failures in Real Investigative Workflows
- Flagging Blaze: How WordPress Promotes Sanitized History While Silencing Dissent
- “This Isn’t Freedom. It’s the Performance of Freedom”
- Fine Ingredients or Fine Print?
- The Case for Torras: Honest Consumer Review
- Simulation: “Neural Sovereignty—A Primordial Right”
- Rumble’s Battle in Brazil: A Clash of Jurisdictions and Ideologies
- The Sandwich and the Flower: What the Washington Post Missed—and Why It Matters
- The Alaska Airlines Shutdown and the Fragile Skies of Modern Aviation
- Neural Sovereignty Series Timeline of Neurotech Militarization
- Neural Sovereignty – From Battlefield to Backdoor
- Neural Sovereignty Investigative Speculation on Cognitive Control, Targeted Individuals, and Global Brain Project
- Simulation: Athena and Nyx – “When Akashma Spoke”