Security
We use on-device checks for proximity, avoid exposing precise GPS, encrypt data in transit, and enforce access controls. Reporting and blocking tools help you manage encounters without public feeds.
Practices
- Encryption in transit; restricted access for staff and systems.
- Approximate distance only; no exact GPS shared with other users.
- Time-boxed notes (24h) to limit retention; expired tags automatically clear.
- Abuse tooling: reporting, blocking, and removal powers in line with Terms.