It depends on how the CC system is designed with respect to the network and encryption. Technically, nothing is outside the range of hacking if given enough computing power. Here are 3 CC examples if you are really interested in this with respect to this discussion:
- Monero (XMR): Launched in 2014, it is the most private cryptocurrency, making it virtually impossible to trace transactions or connect them to individual users.
- Zcash (ZEC): Allows users to choose when to share transaction or address information, providing selective transparency.
- Dash (DASH): Utilizes an encoded PrivateSend feature similar to CoinJoin to enhance privacy.
DOGE was created to get rid of waste, fraud, and abuse. Auditing is just one of the first step in that process, as is the case with any data analytics.
Many 3rd party tech companies have access to sensitive private data. Government employees are terrible when it comes to designing and managing these large data systems so they hire companies to design and implement in a turnkey fashion. Contractors are regularly involved in day to day management. IBM has historically been the biggest player but times have changed and other companies have been included. I know this because I've been involved in some of these projects.
Bureaucratic agencies are the worst about working between the private and public sectors. Unlike DOGE, which has an expected end date, some private sector companies are perpetually involved through lobbying, managing (through movement between public and private), and even legislating.
Regardless of what people think of DOGE, it will continue because it is being used by the executive branch (per the presidents authority) for fixing problems associated with agencies under the purview of the executive branch.
Having been involved in information technology for decades, I see no value in offloading any data to another network in this process as that would be tedious and painstakingly slow. It's much easier and quicker to do everything directly on the federal IT infrastructure.
Personally, I'm not as concerned with the social security administration knowing things as I am with national security monitoring everything I do. Similarly, Big Tech already knows more about what people are doing then most people realize and they don't need a SSN to do it. If you carry a smartphone then Big Tech likely knows more about you than you know about yourself. Having worked in IT security, I can tell you that it's difficult to limit what Big Tech knows even after I've enhanced my privacy. Like we've already both stated (in different ways), privacy and security within data systems is mostly a "bastardization of the language." I would probably go as far to say that China already has all of the US SSN's (through hacking) and the DNA data from a large portion of people who have used a company for genealogy or health reasons (through direct or indirect ownership of labs). If I allow myself to worry about it, I'll make myself sick.