Cryptographic boundaries restore neutrality by constraining roles through code, not discretion. Privacy functions as an architectural repair against overexposure, not a compliance checkbox.