How does technology produce an opportunity to compromise privacy? Be sure to include examples found through original research.