
“It’s definitely possible that some evil advertiser could use this to augment their data sets,” Green says. “But, gosh, it really requires a lot of evil. And it seems to me like a small case.”
Keeping ad tracking as an unlikely scenario, of course, depends on Apple and Google continuing to deny advertisers access to the API—or deprecating the feature altogether—after the coronavirus threat fades.
Will Contact-Tracing Apps Also Ask for Location Data?
Tracing Covid-19 infections based on Bluetooth contacts rather than GPS location data avoids a huge privacy concern. The latter, after all, can be used as evidence of everything from extramarital affairs to political dissent. But some critics have pointed out that contact-tracing apps that use Google and Apple’s Bluetooth-tracing functionality will inevitably ask for location data anyway.
They may want to do so to make the system more efficient, argued cryptographer Moxie Marlinspike, creator of the popular encrypted communications app Signal, in a series of tweets following Apple and Google’s announcement. According to the initial description of Apple and Google’s API, every app user’s phone would have to download the keys of every newly diagnosed Covid-19 person every day, which would quickly add up to a significant load of data. “If moderate numbers of smartphone users are infected in any given week, that’s 100s of [megabytes]” for every phone to download, Marlinspike wrote. “That seems untenable.” Instead, apps could better determine who needs to download which keys by collecting location data, sending users only the keys relevant to their area of movement.
Representatives from Google and Apple’s joint project and the TCN Coalition had the same response to this point: If the app simply asks the user for their region, that very general location would allow the app to download a manageable number of keys. By both groups’ back-of-the-napkin math, telling the app what country you’re in would reduce the daily key download to just a megabyte or two, no GPS tracking required.
That doesn’t mean some apps using Google and Apple’s API won’t ask for location data anyway. Health care organizations may miss the point of a system that avoids using GPS, or simply want the extra data to help better track infections. Google and Apple point out that if a location-tracing app wants to use GPS, it will need to first ask permission from the user, just as any app does.
But the question of location data points to a larger issue: Google and Apple can only point developers toward the most privacy-preserving approach. Every app will need to be judged independently on how it implements that framework. “There are a lot of additional problems that an app developer would need to work through in order to ship a product,” Marlinspike wrote. “That can possibly be done responsibly, but Apple/Google aren’t doing it for us.”
Can the App Itself Identify Covid-19 Patients?
Bluetooth-based Covid-19 contact-tracing schemes are designed to upload no data from most users, and only anonymous data from people who are infected. But it still uploads some data from users who report themselves as positive. That raises the question of whether the upload can truly be anonymous, given how hard it is to move any data across the internet without someone learning where it came from.
Even if the keys that the app uploads to a server can’t identify someone, they could, for instance, be linked with the IP addresses of the phones that upload them. That would let whoever runs that server—most likely a government health care agency—identify the phones of people who report as positive, and thus their locations and identities.
Source of this news: https://www.wired.com/story/apple-google-contact-tracing-strengths-weaknesses/
Related posts:
A protester stores a sign reading End the actual Racist War on Drugs opposite Hampton Plaza. Members inside the Prisoners Solidarity Committee as well as Peoples Power Assembly placed a car carav...
On computing, a proxy server sits between a device and the internet to retrieve web data on behalf of the user. Usually, there are three reasons to use a proxy, including privacy, speed, and traffic ...
In this week’s real-time analytics news: NVIDIA made multiple announcements at its GPU Technology Conference, UiPath introed new features, and more. Keeping pace with news and developments in the ...
by Andrew Wafer Author Andrew is not just trying to bring you closer to Windows, but he's truly interested in this platform. He just happens to be passionate about sharing that knowledge...
Working on the internet is not of safe as you think. You can find hackers out there ready to exploit your space. So , to save yourself secure and safe inside cyberspace, one needs to understand w...
If when you log into your Windows 11 or Windows 10 computer, and you fire up Outlook but you notice the email client is disconnected from the server, consequently preventing you from sending or ...
by Farhad Pashaei Author He has spent the last seven years tinkering with laptops, smartphones, printers, and projectors, as well as writing reviews about them. When he isn't writing, yo...
Using a private search engine such as StartPage or DuckDuckGo is becoming ever more important. Many privacy focused alternatives usually leverage the big search engines in order to return results, bu...
With the internet becoming a hotbed for tracking activities and an ever-growing race to collect data, it has become essential to find a means to hide your digital footprints, especially if you are a ...
Proxies are the connective tissue that makes the world wide web an expansive, safe, and feature-filled place. If it weren’t for proxies, not only would connections between clients and servers be slow...
Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way. Websites keep track of your IP address for various reasons, and in most cases, it’s n...
An elementary link between the internet and your device is proxy. A proxy allows creating anonymity to secure your identity. It makes the requests and activities appear coming from a different locat...
by Afam Onyimadu Author Afam is a geek and the go-to among his peers for computer solutions. He has a wealth of experience with Windows operating systems, dating back to his introduction...
Apple has tossed a lot of privacy and security upgrades into iOS 15, including on-device speech recognition, a code generator for two-factor authentication and an email feature that masks your networ...
In today’s marketing worldwide, everyone is competing to get found and attract the right regulars. Although it’s imperative to keep up with the market, not obtaining your brand’s privacy...
WePC is the essential net site for serious PC game enthusiasts. We offer everything from high end MICROSOFT custom builds and steerage to the latest hardware and simply component reviews, ...
This tutorial is about the How to Run Puppet 7 Server on Rocky Linux/Centos 8. We will try our best so that you understand this guide. I hope you like this blog How to Run Puppet 7 Server on Rocky Li...
The internet has become a vast network of information that people use to access all kinds of things. From downloading games to researching health care, the internet is filled with valuable informati...