Deretti Cyber Labs/Privacy & Identity/Privacy Is Autonomy

01 — Foundational Essay

Privacy Is Autonomy, Not Secrecy

Why privacy is about control over your own information — and why that distinction changes everything about how you defend it.

Tiago DerettiMay 20258 min readFoundation

Most people, when they hear "privacy," think of secrets. Things they want to hide. Privacy, in this framing, is for people who have something to conceal. This framing is both wrong and strategically harmful. It produces exactly the wrong defense posture — one that protects only what feels embarrassing while leaving everything else exposed.

Privacy as Control

A more accurate and more useful definition: privacy is the ability to control what is known about you, by whom, for what purpose, and under what conditions. This definition is not original. It is embedded in how courts, philosophers, and technologists have thought about privacy since at least the late 19th century — from Warren and Brandeis's "right to be let alone" to contemporary thinking about informational self-determination.

The technology industry has spent enormous resources convincing you that the old, wrong definition is correct. The business model of surveillance capitalism depends on your believing that privacy is only worth protecting if you have something to hide. The moment you accept that premise, you have accepted the legitimacy of unlimited data collection.

Saying you have nothing to hide is like saying you have nothing to say, so you don't need freedom of speech.

— Widely attributed; the argument holds regardless of origin

Autonomy and Self-Governance

The political philosophy tradition connects privacy to autonomy — the capacity for self-governance, self-determination, and the ability to participate as a full person in civic and social life. Privacy is not merely about personal comfort. It is a structural condition for freedom.

When your location history is commercially available, you cannot assemble in private. When your communications are monitored, you cannot organize without awareness of observation. When your financial behavior is inferred and sold, you cannot make economic decisions free from commercial or political influence. These are not hypothetical concerns. They are documented behaviors of real systems operating at scale.

The Identity Dimension

Privacy and identity security are, at this point in history, the same problem approached from different directions. Privacy is about what can be known about you. Identity is about what others can do as you. Both depend on controlling information.

The data broker ecosystem creates the conditions for targeted identity attacks. Knowing someone's name, address, phone number, relatives, employer, and financial indicators is not just a privacy violation. It is attack infrastructure. Spear phishing requires contextual believability. SIM swap attacks require personal information to social-engineer carrier support. AI voice clone scams require publicly available voice samples and knowledge of family relationships.

The Practical Implication

The correct response is not despair and it is not paranoia. It is a different kind of discipline: systematic reduction of unnecessary exposure, combined with behavioral practices that treat unexpected contact with appropriate skepticism. This does not require becoming invisible. It requires treating your personal information as what it actually is: a security control. Your address, phone number, email, and name are authentication factors, social engineering resources, and targeting data. They deserve to be managed with that in mind.

Technology and the Quiet Loss of Control

Technology provides genuine benefits, and this section is not a technology-skeptic project. The question for anyone thinking clearly about privacy is not "should I use technology?" It is: "What am I exposing when I use it, to whom, and at what cost?" That question has a different answer for each platform, each app, each service — and the answer often requires understanding how data moves between companies after you have handed it to one of them.

Continue Reading