Apple and Google Respond to Covid-19 Contact Tracing Concerns – WIRED

Security contacttracing 1125115253 ProxyEgg Apple and Google Respond to Covid-19 Contact Tracing Concerns - WIRED

“It’s definitely possible that some evil advertiser could use this to augment their data sets,” Green says. “But, gosh, it really requires a lot of evil. And it seems to me like a small case.”

Keeping ad tracking as an unlikely scenario, of course, depends on Apple and Google continuing to deny advertisers access to the API—or deprecating the feature altogether—after the coronavirus threat fades.

Will Contact-Tracing Apps Also Ask for Location Data?

Tracing Covid-19 infections based on Bluetooth contacts rather than GPS location data avoids a huge privacy concern. The latter, after all, can be used as evidence of everything from extramarital affairs to political dissent. But some critics have pointed out that contact-tracing apps that use Google and Apple’s Bluetooth-tracing functionality will inevitably ask for location data anyway.

They may want to do so to make the system more efficient, argued cryptographer Moxie Marlinspike, creator of the popular encrypted communications app Signal, in a series of tweets following Apple and Google’s announcement. According to the initial description of Apple and Google’s API, every app user’s phone would have to download the keys of every newly diagnosed Covid-19 person every day, which would quickly add up to a significant load of data. “If moderate numbers of smartphone users are infected in any given week, that’s 100s of [megabytes]” for every phone to download, Marlinspike wrote. “That seems untenable.” Instead, apps could better determine who needs to download which keys by collecting location data, sending users only the keys relevant to their area of movement.

Representatives from Google and Apple’s joint project and the TCN Coalition had the same response to this point: If the app simply asks the user for their region, that very general location would allow the app to download a manageable number of keys. By both groups’ back-of-the-napkin math, telling the app what country you’re in would reduce the daily key download to just a megabyte or two, no GPS tracking required.

That doesn’t mean some apps using Google and Apple’s API won’t ask for location data anyway. Health care organizations may miss the point of a system that avoids using GPS, or simply want the extra data to help better track infections. Google and Apple point out that if a location-tracing app wants to use GPS, it will need to first ask permission from the user, just as any app does.

But the question of location data points to a larger issue: Google and Apple can only point developers toward the most privacy-preserving approach. Every app will need to be judged independently on how it implements that framework. “There are a lot of additional problems that an app developer would need to work through in order to ship a product,” Marlinspike wrote. “That can possibly be done responsibly, but Apple/Google aren’t doing it for us.”

Can the App Itself Identify Covid-19 Patients?

Bluetooth-based Covid-19 contact-tracing schemes are designed to upload no data from most users, and only anonymous data from people who are infected. But it still uploads some data from users who report themselves as positive. That raises the question of whether the upload can truly be anonymous, given how hard it is to move any data across the internet without someone learning where it came from.

Even if the keys that the app uploads to a server can’t identify someone, they could, for instance, be linked with the IP addresses of the phones that upload them. That would let whoever runs that server—most likely a government health care agency—identify the phones of people who report as positive, and thus their locations and identities.

Source of this news:

Related posts:

Baltimore state’s attorney: A year ago, Surprisingly stopped prosecuting low-level crimes. Here’s wh...
A protester stores a sign reading End the actual Racist War on Drugs opposite Hampton Plaza. Members inside the Prisoners Solidarity Committee as well as Peoples Power Assembly placed a car carav...
How to prevent users from changing proxy settings on Windows 10 - Windows Central
On computing, a proxy server sits between a device and the internet to retrieve web data on behalf of the user. Usually, there are three reasons to use a proxy, including privacy, speed, and traffic ...
Real-time Analytics News for Week Ending November 13 - RTInsights
In this week’s real-time analytics news: NVIDIA made multiple announcements at its GPU Technology Conference, UiPath introed new features, and more. Keeping pace with news and developments in the ...
How to Rotate the Screen on Windows 10 - Windows Report
by Andrew Wafer Author Andrew is not just trying to bring you closer to Windows, but he's truly interested in this platform. He just happens to be passionate about sharing that knowledge...
The particular do you need a proxy site? - iLounge
Working on the internet is not of safe as you think. You can find hackers out there ready to exploit your space. So , to save yourself secure and safe inside cyberspace, one needs to understand w...
Outlook disconnected from server; How to reconnect? - TheWindowsClub
If when you log into your Windows 11 or Windows 10 computer, and you fire up Outlook but you notice the email client is disconnected from the server, consequently preventing you from sending or ...
How to fix the Windows 11 proxy error -
by Farhad Pashaei Author He has spent the last seven years tinkering with laptops, smartphones, printers, and projectors, as well as writing reviews about them. When he isn't writing, yo...
5 Best Private Search Engines in 2021 | Browse anonymously -
Using a private search engine such as StartPage or DuckDuckGo is becoming ever more important. Many privacy focused alternatives usually leverage the big search engines in order to return results, bu...
Free Proxy List 2020 [Proxy Server List To Hide Your IP Address] - Fossbytes
With the internet becoming a hotbed for tracking activities and an ever-growing race to collect data, it has become essential to find a means to hide your digital footprints, especially if you are a ...
Mobile Proxies: What You Need To Know -
Proxies are the connective tissue that makes the world wide web an expansive, safe, and feature-filled place. If it weren’t for proxies, not only would connections between clients and servers be slow...
MacOS How to Hide Your IP Address - Alphr
Disclaimer: Some pages on this site may include an affiliate link. This does not effect our editorial in any way. Websites keep track of your IP address for various reasons, and in most cases, it’s n...
Why is SEO proxy important for your business? - Techstory
An elementary link between the internet and your device is proxy. A proxy allows creating anonymity to secure your identity. It makes the requests and activities appear coming from a different locat...
Computer can't connect to remote computer [security package error] -
by Afam Onyimadu Author Afam is a geek and the go-to among his peers for computer solutions. He has a wealth of experience with Windows operating systems, dating back to his introduction...
iOS 15: Here are the new privacy and security upgrades you'll get - Tom's Guide
Apple has tossed a lot of privacy and security upgrades into iOS 15, including on-device speech recognition, a code generator for two-factor authentication and an email feature that masks your networ...
Just how can Marketers Benefit From Using a VPN? - TechGenyz
In today’s marketing worldwide, everyone is competing to get found and attract the right regulars.   Although it’s imperative to keep up with the market, not obtaining your brand’s privacy...
Is there a New World mm_connerr_rep_timeout error? the reason why WePC - PC Assembling Community
WePC is the essential net site for serious PC  game enthusiasts. We offer everything from high end MICROSOFT custom builds and steerage to the latest hardware and simply component reviews, ...
How to Run Puppet 7 Server on Rocky Linux/Centos 8 - BollyInside
This tutorial is about the How to Run Puppet 7 Server on Rocky Linux/Centos 8. We will try our best so that you understand this guide. I hope you like this blog How to Run Puppet 7 Server on Rocky Li...
How Do You Protect Yourself From A Swatting Attack? - Trending News Buzz
The internet has become a vast network of information that people use to access all kinds of things. From downloading games to researching health care, the internet is filled with valuable informati...

IP Rotating Proxy Onsale


First month free with coupon code FREE30