my assumption at this point is that some agency or institution somewhere has access to everything i have access to.
if i had the talent, i would work on an AI firewall. our devices should live in an air gapped bubble, making a bunch of requests and sending on a bunch of responses, that are collected, inspected and then relayed by the AI firewall, once each interval set by the user, i.e. once per hour.