Patterns — mobile
Encryption with user-managed keys
Use encryption in such a way that the service provider cannot decrypt the user's information because the user manages the keys.
Proactively provide continual, recurring notice to consented users of repeating access to their personal data, including tracking, storage, or redistribution.
Provide unobtrusive, non-modal, continuous notice when personal data is being accessed to increase awareness of real-time tracking.
Active broadcast of presence
Users may actively choose to automatically provide updates when they want to share presence information, to increase both the relevance of, and control over, their sharing.