Privacy in the Age of AI & Surveillance
Lesson by Uvin Vindula
We live in the most surveilled era in human history. Every smartphone tracks location. Every search engine logs queries. Every social media platform profiles behavior. Governments deploy facial recognition in public spaces. AI systems can now identify individuals from their walking gait, voice patterns, or even the way they type. In this environment, privacy is not a luxury — it is a fundamental requirement for human dignity, freedom, and democracy. This lesson examines the threats and the tools available to protect yourself.
The Scale of Modern Surveillance
The surveillance landscape in 2026 operates on multiple levels:
Corporate Surveillance:
- Google processes over 8.5 billion searches per day, each one logged and profiled.
- Meta (Facebook, Instagram, WhatsApp) tracks user behavior across millions of websites through embedded pixels and SDKs.
- Data brokers compile profiles combining online behavior, purchase history, location data, and public records — then sell these profiles to anyone willing to pay.
- Your smartphone generates approximately 200 data points per day about your location, movement patterns, app usage, and communication metadata.
Government Surveillance:
- China's social credit system scores citizens based on behavior, restricting travel and access to services for those deemed untrustworthy.
- The NSA's PRISM program (revealed by Edward Snowden in 2013) showed that US intelligence agencies had direct access to data from Google, Apple, Facebook, and Microsoft.
- Facial recognition is deployed in public spaces across dozens of countries. AI systems can identify individuals with over 99% accuracy, even wearing masks.
- Central Bank Digital Currencies (CBDCs) could enable real-time monitoring of every financial transaction a citizen makes.
AI-Powered Surveillance:
- Large Language Models (LLMs) can analyze patterns in writing to identify anonymous authors with high accuracy.
- Deepfake detection requires AI to fight AI — but the same technology can also generate convincing fake evidence.
- Predictive policing algorithms use data patterns to predict crime, raising concerns about bias and pre-crime punishment.
- Emotion recognition AI claims to detect emotions from facial expressions and voice, despite serious scientific doubts about its accuracy.
Why Privacy Matters: Beyond "I Have Nothing to Hide"
The most common response to surveillance concerns is: "I have nothing to hide." This argument fundamentally misunderstands what privacy protects:
- Privacy protects dissent. Every social movement — civil rights, labor rights, democracy movements — required private communication to organize. Without privacy, the powerful can suppress dissent before it forms.
- Privacy prevents discrimination. Health data, religious beliefs, political opinions, and sexual orientation can all be used to discriminate. Privacy prevents this information from being weaponized.
- Privacy enables experimentation. People need private space to explore ideas, make mistakes, and develop without judgment. A society without privacy is a society that enforces conformity.
- Privacy is a power check. When governments and corporations know everything about citizens, but citizens know little about those institutions, the power imbalance becomes dangerous.
Privacy Tools for the Digital Age
| Category | Tools | What They Protect |
|---|---|---|
| Communication | Signal, SimpleX Chat | End-to-end encrypted messaging with minimal metadata |
| Browsing | Tor Browser, Brave Browser, Firefox with uBlock Origin | Anonymize web browsing, block trackers |
| ProtonMail, Tutanota | End-to-end encrypted email | |
| VPN | Mullvad, ProtonVPN (no-log policies) | Hide IP address and encrypt internet traffic |
| Financial | Bitcoin (self-custody), Lightning Network, Monero | Financial privacy, censorship resistance |
| Identity | SSI wallets, ZKP credentials | Verify identity claims without revealing personal data |
CBDCs: The Privacy Threat Most People Don't See
Central Bank Digital Currencies (CBDCs) are digital versions of national currencies issued by central banks. Over 130 countries are exploring CBDCs, and several have launched them. While proponents cite efficiency and financial inclusion, the privacy implications are profound:
- Programmable money: CBDCs could be programmed with spending restrictions — money that expires, money that can only be spent on approved goods, or money that is automatically taxed.
- Complete financial surveillance: Unlike cash, every CBDC transaction is recorded. The government would have real-time visibility into every purchase, transfer, and saving pattern of every citizen.
- Financial censorship: Accounts could be frozen or funds confiscated instantly, without due process, based on political dissent, unpaid taxes, or algorithmic "risk scores."
Sri Lanka is among the countries exploring a digital rupee. While this could bring efficiency benefits, Sri Lankans who experienced bank withdrawal restrictions during the 2022 crisis understand the real-world risks of giving the government even more control over citizens' money.
Practical Steps for Sri Lankans
Protecting your privacy doesn't require becoming a cybersecurity expert. Start with these practical steps:
- Use Signal for sensitive communications instead of WhatsApp or SMS.
- Use a privacy-respecting browser like Brave or Firefox with uBlock Origin.
- Hold Bitcoin in self-custody — not on exchanges — to maintain financial sovereignty.
- Use a VPN (Mullvad or ProtonVPN) when accessing sensitive services.
- Minimize data sharing: Don't give real information to services that don't need it. Use alias email addresses where possible.
- Understand your rights: Sri Lanka's Personal Data Protection Act (2022) gives you rights over your personal data — learn them and exercise them.
Key Takeaways
- •Modern surveillance operates at three levels: corporate (data brokers, tracking pixels), government (facial recognition, mass surveillance), and AI-powered (writing analysis, predictive policing)
- •Privacy protects dissent, prevents discrimination, enables experimentation, and checks institutional power — "nothing to hide" fundamentally misunderstands privacy's role
- •Essential privacy tools: Signal for messaging, Tor/Brave for browsing, ProtonMail for email, Mullvad VPN for traffic, and Bitcoin in self-custody for financial privacy
- •CBDCs represent a major privacy threat: programmable money, complete financial surveillance, and instant financial censorship — the opposite of what Bitcoin offers
- •Bitcoin and CBDCs embody opposite philosophies: Bitcoin is decentralized, permissionless, and privacy-preserving; CBDCs are centralized, permissioned, and surveillance-enabling
- •Sri Lanka's Personal Data Protection Act (2022) gives citizens rights over their data — but technological tools like encryption and self-sovereign identity provide stronger guarantees than legislation alone
- •Practical privacy starts with simple steps: use Signal, use a privacy browser, hold Bitcoin in self-custody, use a VPN, and minimize unnecessary data sharing
Quick Quiz
Question 1 of 3
0 correct so far
What is the fundamental flaw in the "I have nothing to hide" argument?