Things like measuring and reducing attack surface, self-defending data, damage-potential effort ratios, fully homomorphicencryption, and end-to-end message confidentiality.
Just as homomorphicencryption allows people to aggregate two functions without knowing the original input, new data mining technologies may allow meaningful statistical results without access to original raw user data.