Adding insult to injury, you disguise invasive tracking as 'monitoring' and 'intrusion detection,' all while selling users' data to third parties whose security you cannot guarantee—potentially the very culprits behind the breaches you claim to gu...