I don't actually believe that privacy-preserving telemetry is even a thing that can be real. Telemetry is designed to leak information about what's happening on a system, and by doing that you inevitably leak bits of privacy-adjacent material, and if you accumulate enough bits you get reidentification of previously "anonymous" information.
This is in reference to our favorite elephant in the room's favorite hat, see https://discussion.fedoraproject.org/t/f40-change-request-privacy-preserving-telemetry-for-fedora-workstation-system-wide/85320/1 for the relevant discussion bits.
My favorite old-school reading on the topic of reidentification is the 33 Bits blog https://33bits.wordpress.com from Arvind Narayanan.
Now this is the right way to do opt-in telemetry:
https://dmesgd.nycbug.org/index.cgi?do=index
Launched in 2004, dmesgd aims to provide a user-submitted repository of searchable *BSD dmesgs. The dmesg(8) command displays the system message buffer's content, and during boot a copy is saved to /var/run/dmesg.boot. This buffer contains the operating system release, name and version, a list of devices identified, plus a whole host of other useful information. We hope others find this resource useful and further contribute to its growth.
Not only is this telemetry opt-in, but it's also public, and the contributors can edit their contributions as appropriate to elide inconvenient information or add more annotations to the system details. With a nearly 20 year track record, this is an important collection.