- how do you do identity verification (to prevent fake profiles)?
- what sort of transparency is there in operations to confirm user data won’t be sold or wrongly used?
- what controls do users have on their data to guarantee it’s solely in their control (actually deleted, etc)?
- how do you do identity verification (to prevent fake profiles)?
- what sort of transparency is there in operations to confirm user data won’t be sold or wrongly used?
- what controls do users have on their data to guarantee it’s solely in their control (actually deleted, etc)?