So How Is This Implemented in the Real World?

A woman sets her "point" of interest.
Google Maps is used to drop a pin on both where she's leaving from, and her ultimate destination.
Deviation of route
If a woman goes too far off route, she will be asked a question.
Changing Questions
Every week, a new question will be asked, such as a "was your package delivered on time, please say yes or no! Yes implies the woman she is safe, no or no answer implies that she is not. The question and delivery method will change, especially as assailaints get used to how the project works.
Unsafe Route:
A woman who is undergoing any kind of harrassment or potentially dangerous situation will have other women who know about her location start passing by. There is also a "trusted" list of people she provides upon verifcation, and that person is auto-messaged with a message she records upon signing up. This way non-users still can know when their loved one is in harm's way, but that way family and other related parties are notified instantly as well. This way trusted people are notified, but also, if the formally trusted individual is the one doing the harm, they still have other people notified. Also, these other "safety" people can be removed at any time, in-case a trusted ally becomes an unsafe enemy.
Safe Route:
The woman is left alone.

Law Enforcement and Anonimity

No Manipulative ADS!
The only ads you will ever see is from "safe spaces" marked by other women. These businesses can sponsor "scholarships" to offer the platform free to affected women(the base safety features are free and always will be) and the more they sponsor, the higher they are in the list of reccomendations! That way, you support businesses that support you.
Classes and Vocational Training!
The overall goal of Checkpoints is not just to help keep you safe, but to improve your life and help you excel. We will sponsor classes/education and educate women on scholarship oppurtunities.
Annonomous
To Checkpoints, you are essentially a ghost. There's no data to be scraped by some corporate conglomerate, because after your intiial government ID scan(in person during beta testing) we have no idea who you are anymore. You are assigned a random number (which you can change to a nickname, on the backend the # remains the same, please don't use your real name as your nickname and compromise your own safety!)
Protecting Your Identity
Just like we don't know who you are after verification, the same is true about any hackers or people trying to harm our users. Hackers can't take what doesn't exist, and upon verification, a script is run that deletes all user data used for data verification.
Police Intergration
The elephant in the room:Law Enforcement. If you have ever gone through the long, agonizing process of bringing the person who hurt you to justice, you know that courts are slow, it can be embarassing, and whether successful or not, it can be your name dragged through the mud. That's why...we let the woman choose whether to report to law enforcement. For public safety, there's a big asterix there-we do maintain footage of the assault, whether attempted or successful, but we use video editing tools to remove the woman from the footage-working with local law enforcement to still bring the assailaint to justice. It's not a great system, not even close, but it's what we have.
Payment and Subscription Cost
We don't want something to ever happen to a woman who couldn't afford to pay, but unfortuately, the big tech companies that control mapping and GPS data charge a ton for it.There are less-accurate, cheaper maps...but, less-accurate in a safety project is not ideal. So, the base safety feature is always free, but anything beyond that is a subscription. This platform was designed as a low-cost model while still ensuring women get paid to help other women. Not only will they help make their communities safer for both themselves and the women around them, but they can also make a living doing so. We aren't DoorDash, we care about how much the women make.