COVID‑19 contact tracing – how it works and what risks it poses.

Not all tracking apps are equally safe in terms of personal data protection.

REUTERS

REUTERS

Experts with the international developer of antivirus software ESET have told about the way COVID-19 spread tracking applications work and what potential threats to personal data they bear.

"[M]ore than 30 countries have, or are planning to release, apps designed to contact trace or geo fence their users, for the purposes of limiting and managing the spread of COVID-19," the report says.

"The majority of apps available are government sponsored and use a variety of different methods to fulfill their purpose, such as Bluetooth vs. GPS, centralized vs. decentralized, and not all are sensitive to maintaining the privacy of the user," authors report.

There are two main methods being used to glean the physical proximity of users. The first is the global positioning system (GPS): this uses satellite-based radio-navigation to approximate the individual’s location and the location of other app users. The second, more prominent, solution uses Bluetooth and signal strength to identify other app users’ proximity, allowing the devices to exchange handshakes rather than track actual location. There are some solutions that use a mix of both Bluetooth and GPS and some even use network-based location tracking, but these methods have significant location-tracking privacy issues and are fortunately limited to only a few developments.

When a contact-tracing app comes into contact with another device running the same app there is a handshake and an exchange of keys. These keys are typically continually changing and are generated on a time basis and unique to the device. When device A meets device B, they share keys based on a predetermined distance and time requirement, for example within 2 meters for 15 minutes. The device either holds on to the keys or passes them to a central server; when users confirm they may be positive for infection then all the keys they have generated are added to a cloud system. All other devices will collect these on a frequent basis to see if there is a match with keys that have been collected or alternatively this match will be processed in the cloud. If there is a match, then those users are warned that they have been in contact with another device that is now reporting positive; they have no clue which device.

Read alsoUkraine cancels observation for foreigners with negative COVID-19 results after border crossing

If the user is identifiable and all data is held and processed centrally, then there is clearly a privacy issue; if, however, the user is not identifiable and the central cloud is only processing for matches, this could be more efficient than asking the local device to do this processing, especially if the end device is limited on resources … which could be the case in some areas of the world. This approach also gives the centralized system the ability to identify potential false positives, where some malicious users say they are infected, yet in reality they are not and are just attempting to create chaos for users, companies and society in general. Using complex algorithms to identify false positives in a decentralized approach is less realistic due to resource limitations.

A benefit of partial centralization is that the portion of centralized data that is being processed could be used to inform scientists how the population as a whole moves around and to quickly identify hotspots to enable medical resources to be allocated. If, for example, a ZIP code is requested at the time of installation, then data scientists may be able to predict disease spread. This is unlikely to enable the user to be identified, as a single ZIP code is used by hundreds or thousands of people; it does narrow the potential to identify an individual, but it may offer an acceptable compromise on privacy.

Even the solutions that claim to be the most privacy sensitive are open to abuse: take the extreme scenario where video surveillance is used in conjunction with capturing Bluetooth signals emitted from devices and capturing the keys that are being exchanged. Combined with facial recognition technology and the location of the device at a known time could mean the user is identifiable. While this may seem extreme it demonstrates that no one system offers a privacy guarantee.

Related news

Johnson and Johnson Nasal Spray Approved For Those At Risk Of Suicide.

Johnson & Johnson's Spravato has been approved as the first antidepressant for actively suicidal people, as doctors are becoming increasingly concerned about Covid-19's effect on the mental health of...

Elon Musk Is Having A Fantastic Year. Here's Why

Whether you find him admirable or obnoxious, Elon Musk is having a fantastic year. SpaceX, the company he founded in 2002, blasted two American astronauts to the International Space Station in late...

China Will Not Accept US «Theft» Of TikTok: Report

China will not accept the "theft" of a Chinese technology company and is able to respond to Washington's move to push ByteDance to sell short-video app TikTok's U.S. operations to Microsoft, the China...

1 3

At least 13 dead, 1,000 displaced as heavy rain floods South Korea.

Days of heavy rain caused floods in South Korea that have forced more than 1,000 people from their homes, killing at least 13 with another 13 missing, authorities said on Tuesday.

1 1

Australian state to impose fines, deploy military to enforce coronavirus measures.

Victoria earlier this week imposed a night curfew, tightened restrictions on people's daily movements and ordered large parts of the local economy to close to slow the spread of coronavirus.

By continuing to browse World News (UAZMI), you acknowledge that you have read the Terms of Use and agree to the use of cookies