Your idea of distributing Zooz tokens through proof-of-movement is a really nice way to bootstrap your app but I fear it will never be "hacker proof".
1. Proof-of-social-being algorithms
You send my entire contact list to your server? Jeez, sounds worse than NSA and for a little reward. As you say:
it's pretty easy to identify millions of bots, but it won't reach easily a single or a few bots.
I would be concerned about "a few bots" accumulating Zooz tokens with fake trips. That's unfair for all other users.
2. Proof-of-location algorithms -- which basically cross refer real-time-location data between different users, and between users and external data.
First of all that means we can only mine with an active internet connection right? Thus La’Zooz will deplete my data plan.
Second, applying this in practice would get you a super high false negative rate. As Waldschrat2 pointed out:
other App users may be in a location with A/C (e.g. car, bus, office... - less than 25°C) - while the usual motobike drivers will have temperatures of 35°C+...
Similar problems happen if you compare available Wi-Fi networks: my smartphone's antenna may be worse than that of other users, a bus might be blocking the signal, the Wi-Fi network may be temporarily offline or have changed name, etc.
Also, what about routes crossed only by a single user? You'll have no data to cross reference there. Will you discard those? ... Not fair.
3. Proof-of-movement algorithms -- [...] Of course, one can "record" his movement data, but then we'll see multiplication of such data all over the place.
What prevents an hacker from doing some little data permutations (tilt to the right instead of tilt to the left or whatever) to fool you?
These proof-of-movement heuristics are akin to Google's PageRank cat-and-mouse game, but way harder. There will always be ways to fool you. Also, you'll never be able to release the full heuristics out in public... so much for transparency and getting community feedback. It’s doomed to security by obscurity.
https://xorrtgj.wordpress.com/2015/04/26/hackers-lets-hoard-zooz-tokens/