Requests for information can be refused, complied with fully, or partially, with zero-knowledge proofs used to verify information without transferring personal data.
Design technical systems to protect user interactions from being correlated across different relying parties, unless the user provides their legal identity.
Ensure that DPI operators cannot gain knowledge of user behavior or interactions without explicit user consent, using techniques like encryption and anonymization to safeguard privacy.
References