What you're able to request from these companies officially is just the tip of the iceberg. The point is that between phone numbers, email reuse, google analytics etc with fingerprinting, and operating system telemetry, a complete picture is assembled of users.
If you're not looking for arguments and instead approaching things from understanding surveillance maybe my statements will make sense now.