He suggested starting with Trusted Execution Environments (TEEs) for short-term cryptographic privacy. Afterward, there may be a shift to a Private Information Retrieval (PIR) for stronger protection.