Any reasonable deployment of any system is going to rely on a combination of all three kinds of privacy.
But the mixture of those types of privacy, and the assumptions that underlie them make a HUGE difference in the actual secrecy of the data being exchanged and processed - and the probability of privacy being violated.