People still talk about smartphone privacy as if the scandal were a matter of settings. Turn off a toggle. Deny an app. Clear some permissions. Maybe install something with a reassuring shield icon and feel briefly less hunted.
That is comforting. It is also much too small.
The more honest starting point is that the phone itself is already a compromise between convenience, commerce, state appetite, and the userâs desire to believe the compromise is manageable. By the time an app asks for something outrageous, the deeper bargain has usually been settled long ago. The device stays close. The networks stay alive. The location layer remains interested. The hardware continues negotiating with infrastructure the user cannot see and did not design.
That is why the fantasy of "powered off" has always been so attractive. It gives people one clean gesture, one little ritual of refusal. Press the button, dark screen, case closed, self restored. Unfortunately the modern phone is not really built around your wish for disappearance. It is built around continuity. Continuity of connection, continuity of service, continuity of locatability, continuity of a relationship between device and system that remains much more active than the average user imagines.
This is the natural shape of the stack. Radios, baseband processors, passive services, background expectations, hardware designed by companies whose incentives were never primarily aligned with your desire to become momentarily illegible.
The architecture is already friendly to surveillance before any especially dramatic actor shows up. Governments do not have to invent the problem from scratch. Corporate platforms do not have to become villains in a comic-book sense. The arrangement itself is already generous to monitoring, inference, persistence, and quiet collection.
That is why so much privacy advice feels simultaneously correct and insufficient. Yes, use encrypted messaging. Yes, think about permissions. Yes, understand your threat model. But the larger truth is harder and less marketable: you are carrying a device whose ordinary function depends on remaining in a relationship with systems you do not control. Some defensive moves can narrow the exposure. Very few of them turn the machine into what people still romantically imagine it to be: a private possession with optional network behavior.
That gap between ownership and actual control is where the real irritation begins.