From Trilemma to Trifecta: Three Privacy-Preserving Approaches