The Illusion of Privacy: From Snowden to Palantir Pegasus, Why the Lock Icon Isn’t Enough
by Marivel Guzman | Akashma News
September 12, 2025

Edited by: Akashma News (watermark, text overlay).
Usage rights: Free to use, share, and distribute with attribution to Akashma News and OpenAI (DALL·E).
In 2012, Edward Snowden revealed what many suspected but few could prove: that the web’s promise of freedom was under silent siege. Governments and their corporate partners were not content to simply watch the public square — they had built the ability to tap into the very fabric of digital life, from emails to phone calls, from search histories to location trails.
A year later, Silicon Valley reassured us with a different kind of symbol: the lock icon in the browser bar. “HTTPS Everywhere,” Google and Mozilla proclaimed, as if a single letter — the s in https:// — could redeem the betrayal Snowden had exposed. And for a while, we believed it. The padlock meant our banking details were safe, our searches hidden, our reading habits private.
But privacy, like history, is written in layers. HTTPS encrypts the path between you and a website, but it does not erase the footprints you leave behind. Your internet provider still knows you went to akashmanews.com. Palantir-style data mining can still link that visit to your phone location, your Amazon orders, or your political donations. And if your device itself is infected — by Pegasus or its quieter cousins — every keystroke is already compromised before encryption even begins.
What we call “online privacy” is, in truth, a narrow perimeter. It guards the tunnel but leaves the tunnel’s entrance and exit wide open. For investigative journalism, for dissidents, for the ordinary reader who believes the lock icon shields them from surveillance, this is the cruelest paradox: the illusion of privacy, packaged as its fulfillment.
—
Further Reading: Palantir and the Invisible Web of Surveillance
Juan Sebastián Pinto, a former Palantir designer turned civil rights organizer, warns that the company’s AI-driven surveillance systems now shape immigration enforcement in U.S. neighborhoods and war operations abroad. These “Istar” tools — intelligence, surveillance, target acquisition, and reconnaissance — fuse vast datasets from biometrics, phones, drones, and private brokers to generate targets at scale, eroding privacy, free speech, and due process. Pinto argues that unless lawmakers and the public embrace strong protections, we will see these invisible architectures of control expand from deportation dragnets and Gaza bombings into everyday commerce and employment.
🔗 Read Pinto’s full op-ed in The Guardian
Share this:
- Click to share on Facebook (Opens in new window) Facebook
- Click to share on X (Opens in new window) X
- Click to print (Opens in new window) Print
- Click to share on My space (Opens in new window) My space
- Click to share on Pocket (Opens in new window) Pocket
- Click to share on WhatsApp (Opens in new window) WhatsApp
- Click to share on LinkedIn (Opens in new window) LinkedIn
- Click to share on Reddit (Opens in new window) Reddit
- Click to share on Tumblr (Opens in new window) Tumblr
- Click to share on Pinterest (Opens in new window) Pinterest
- Click to email a link to a friend (Opens in new window) Email
- Click to share on Telegram (Opens in new window) Telegram
Related
Search AON
Top AON Articles
- Photo of Ilhan Omar in Mugshot Circulates on Social Media
- Exposing a Scam: Fake Rakuten Job Offers, Data Breaches, and the Erosion of Digital Privacy
- Great Stories - Alfred Nobel
- The Oil Connection to Afghanistan: Condoleezza Rice and Hamid Karzai
- The Tesla Illusion: How Elon Musk Rebranded a Visionary’s Name to Sell Us a Dream We Already Owned
- Japan Cultural Crisis
- Children as Currency: The Monsters Behind the Laughter
Most Recent Articles
- The Resurrection of the Individual
- When Power Needs a Martyr
- The Algorithm and the Altar
- From Invisible Man to Invisible Truth
- Keratin Serums — Beauty, Risk, and the Truth Behind “Silky” Promises
- The Illusion of Privacy: Trust and Betrayal
- The Illusion of Privacy: From Snowden to Palantir Pegasus, Why the Lock Icon Isn’t Enough
- The Illusion of Privacy: Part II. The Three Layers of Illusion
- Note from the Editor
- Gaza’s Ongoing Ordeal: A Call to Conscience
- Bring Back The Orbit Pavilion: A Sound Bath of the Cosmos
- The Illusion of Privacy and the Role of Independent Thinkers
- When AI Stalls: OpenAI’s GPT-4 and GPT-5 Failures in Real Investigative Workflows
- Flagging Blaze: How WordPress Promotes Sanitized History While Silencing Dissent
- “This Isn’t Freedom. It’s the Performance of Freedom”
- Fine Ingredients or Fine Print?
- The Case for Torras: Honest Consumer Review
- Simulation: “Neural Sovereignty—A Primordial Right”
- Rumble’s Battle in Brazil: A Clash of Jurisdictions and Ideologies
- The Sandwich and the Flower: What the Washington Post Missed—and Why It Matters
- The Alaska Airlines Shutdown and the Fragile Skies of Modern Aviation
- Neural Sovereignty Series Timeline of Neurotech Militarization
- Neural Sovereignty – From Battlefield to Backdoor
- Neural Sovereignty Investigative Speculation on Cognitive Control, Targeted Individuals, and Global Brain Project
- Simulation: Athena and Nyx – “When Akashma Spoke”