Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • Vocab
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Liminal
  4. Bystander Consent Protocols

Bystander Consent Protocols

Privacy frameworks for people captured by spatial computing devices without their participation
Back to LiminalView interactive version

As spatial computing devices become increasingly prevalent in public spaces, a critical challenge has emerged: how to protect the privacy and autonomy of individuals who are not actively participating in these technologies. Bystander Consent Protocols represent a developing framework of technical standards, legal guidelines, and ethical practices designed to safeguard people who appear incidentally in spatial recordings, augmented reality overlays, or other immersive computing environments. Unlike traditional photography or video recording, spatial computing captures rich three-dimensional data about environments and the people within them, including depth information, movement patterns, and potentially biometric markers. These protocols establish mechanisms for detecting when non-consenting individuals enter a device's field of capture, determining appropriate levels of data anonymization, and implementing technical measures such as automatic blurring, skeletal abstraction, or complete removal of bystander representations from recorded data. The frameworks also address temporal considerations, specifying retention limits for incidental captures and establishing clear deletion procedures for data involving non-participants.

The proliferation of mixed reality headsets, smart glasses, and other wearable spatial computing devices has created unprecedented privacy concerns in shared spaces. Traditional consent models, designed for discrete photography or surveillance systems, prove inadequate when individuals may be continuously captured by dozens of nearby devices without their knowledge or explicit agreement. Bystander Consent Protocols address this gap by establishing industry-wide standards for how spatial computing platforms handle non-participant data. These frameworks tackle complex questions about opt-out mechanisms in public spaces, determining whether individuals should have the right to broadcast "do not record" signals that nearby devices must respect, similar to how some jurisdictions handle facial recognition databases. They also establish guidelines for how augmented reality content can interact with real people, preventing scenarios where digital overlays attach identifying information, advertisements, or other content to individuals without permission. For businesses deploying spatial computing technologies, these protocols provide crucial legal clarity and help mitigate liability risks associated with privacy violations.

Early implementations of bystander protection measures are already appearing in commercial spatial computing platforms, with some manufacturers incorporating automatic face blurring and figure abstraction features into their devices. Research institutions and privacy advocacy groups are actively developing technical standards for privacy-preserving spatial capture, exploring approaches such as on-device processing that prevents raw environmental data from ever leaving the device, and federated learning systems that enable spatial mapping without centralized data collection. Several jurisdictions are beginning to incorporate bystander consent considerations into existing privacy legislation, recognizing that spatial computing represents a fundamentally different privacy challenge than traditional recording technologies. As these devices transition from niche applications to everyday consumer products, the development of robust Bystander Consent Protocols will prove essential to maintaining social trust and ensuring that the benefits of spatial computing do not come at the cost of individual privacy rights. The trajectory of these frameworks will likely influence broader conversations about consent, surveillance, and autonomy in increasingly sensor-rich urban environments, establishing precedents that extend well beyond spatial computing into other emerging technologies that blur the boundaries between public and private space.

TRL
2/9Theoretical
Impact
4/5
Investment
2/5
Category
Ethics Security

Related Organizations

Meta Reality Labs logo
Meta Reality Labs

United States · Company

95%

Develops the Quest Pro and research prototypes (Butterscotch, Starburst) focusing on foveated systems.

Developer
University of Washington logo
University of Washington

United States · University

90%

Major public research university.

Researcher
Information Commissioner's Office (ICO) logo
Information Commissioner's Office (ICO)

United Kingdom · Government Agency

88%

The UK's independent regulator for data rights, providing specific guidance on AI and data protection.

Standards Body
Max Planck Institute for Informatics logo
Max Planck Institute for Informatics

Germany · Research Lab

85%

Pioneers in Neural Radiance Fields (NeRF) and light-field reconstruction algorithms.

Researcher
Mozilla logo
Mozilla

United States · Nonprofit

85%

Develops Firefox, which implements 'Resist Fingerprinting' (RFP) to standardize and obfuscate user device characteristics.

Standards Body
Stanford University logo
Stanford University

United States · University

85%

The Vuckovic Group develops inverse-designed photonics for quantum frequency conversion.

Researcher
Google logo
Google

United States · Company

80%

Creators of CausalImpact, a package for causal inference using Bayesian structural time-series.

Developer
OpenMined logo
OpenMined

United States · Nonprofit

75%

A community-driven organization building privacy-preserving AI technology, including PySyft for encrypted, privacy-preserving deep learning.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

Ethics Security
Ethics Security
Spatial Privacy Zones

Machine-readable geofences that tell devices where recording and sensing are restricted

TRL
3/9
Impact
5/5
Investment
3/5
Ethics Security
Ethics Security
Attention Manipulation Safeguards

Technical and regulatory constraints preventing exploitative persuasive design in XR environments

TRL
2/9
Impact
4/5
Investment
2/5
Ethics Security
Ethics Security
Spatial Data Sovereignty

Frameworks for controlling ownership and access to spatial computing data streams

TRL
2/9
Impact
5/5
Investment
3/5
Ethics Security
Ethics Security
Reality Filter Auditing

Logs and discloses every digital overlay modifying a user's augmented visual field

TRL
2/9
Impact
4/5
Investment
3/5
Ethics Security
Ethics Security
Indigenous Spatial Protocols

Frameworks ensuring spatial computing respects indigenous sovereignty over cultural heritage and sacred sites

TRL
2/9
Impact
5/5
Investment
2/5
Ethics Security
Ethics Security
Reality Authentication

Cryptographic verification of AR overlays to prevent malicious content injection

TRL
3/9
Impact
5/5
Investment
3/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions