The next step would be private, personal relays running on your device/phone. I am working with the assumption that your personal data is being stored by an adversary to begin with. It’s all about tradeoffs.