This document discusses how mobile devices collect a large amount of data about users through normal usage and sensors even without direct usage. It demonstrates how to set up Fiddler to inspect traffic from an iPhone to see what information is being sent without the user's knowledge or consent. It suggests developers inspect traffic, verify certificates, follow security best practices, and consider users' threat risk models to build trust and protect privacy.