a “squad” of drones could use this protocol & trustlessly build a clone-drone after collecting pieces from donators, people who wanted to buy hardware and stake it into the drone system.
These drones could assemble the new drone in verifiably safe location.
Equipped with a camera, the first function of these drones could be identifying people and things.
This creates a network where people have an identity and 1 vote.
From there, people can vote on things that the network of drones should be responsible for building.
With a computer vision layer on top of proof of location it is also possible to achieve proof of research or data retrieval about the environment. Open source, high precision weather prediction data.