[0]: https://sahilrohilla.medium.com/how-to-bypass-the-hotspot-sh...
[1]: https://android.stackexchange.com/questions/47819/how-can-ph...
- Profiles. Different buckets for different things. One for work, another for leisure, etc.
- Some kind of alerting system to notify the user if the phone is potentially compromised / hacked. Could be a simple scan to look for obvious red flags / heuristics of known in-the-wild malware.