Open tasks
Thanks for your willingness to help out with managing this huge information need. This page lists the information we know is still missing from the feature comparisons of applications and devices and protocols. You can access the same information in a more visual (and probably more convenient) way inside those matrices: missing information is represented by a blue button with a question mark.
This is a textual mapping of those same data gaps, ordered by effort. Each effort is listed with a hyperlinked set of missing data points. Please **[[register an account>>doc:XWiki.Registration]]** if you have not done so yet (feel free to use a pseudonym), and use the links below to add any missing information about the respective apps, devices or protocols you know of.
We very much appreciate it if you provide a proper reference (in the form of a web address) in the reference field below each new data point you enter, so others can easily verify your findings. Thanks for your help!
Protocols
DP-3T
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
TCN
- Protocol Version
- Protocol Whitepaper
- Formal verifications of the protocol
- Authors
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
Apple-Google
- Formal verifications of the protocol
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Logo
ROBERT-1-0
- Protocol Version
- Protocol Whitepaper
- Formal verifications of the protocol
- Authors
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
DP-3T
- Protocol Version
- Protocol Whitepaper
- Formal verifications of the protocol
- Authors
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
DESIRE
- Protocol Version
- Protocol Whitepaper
- Formal verifications of the protocol
- Authors
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
BlueTrace
- Formal verifications of the protocol
- Co-location cannot be inferred
- Source Integrity
- Broadcast Origin Integrity
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- Use of constant time cryptography only
- References
- Records (estimated) contact duration
- Logo
ROBERT
- Formal verifications of the protocol
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Logo
DESIRE
- Formal verifications of the protocol
- No Passive Tracking
- Use of constant time cryptography only
- References
- Logo
TCN
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
Apple-Google
- Protocol Whitepaper
- Formal verifications of the protocol
- Authors
- Co-location cannot be inferred
- References
- Private temporary ID
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- Resistance against replay and ghosting attacks
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
BlueTrace
- Protocol Whitepaper
- Formal verifications of the protocol
- Authors
- Co-location cannot be inferred
- References
- References
- Forward Secrecy
- References
- Backward Secrecy
- References
- No externally observable effects
- References
- Source Integrity
- References
- Broadcast Origin Integrity
- References
- References
- No Passive Tracking
- References
- Can the length of a meetup between people be derived externally by combining exported data from multiple time slots
- References
- Reporter Privacy
- References
- Information Recipient Privacy
- References
- No linkability of keys
- References
- Use of constant time cryptography only
- References
- User-configurable automated pruning
- References
- Server Trust requirements
- Records (estimated) contact duration
- References
- Home page
- Logo
Projects
COVID19 Notificatie app
- Version
- Organisations
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
StopCovid
- Epidemiological evidence
- (Software) Patents
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Known Vulnerabilities
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Required OS permissions
- References
- Use of OS permissions
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- References
- Selective data upload/Data redaction
- References
- Uploads Phone Number
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Adequate protection against exposure of the IP Address of users
- References
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
ProteGO
- Organisations
- Source code Repository
- Other primary sources of information
- Dataflow description
- Logo
- Epidemiological evidence
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- References
- Use of device specific identifiers
- References
- References
- Required OS permissions
- References
- Use of OS permissions
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- References
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
CoronaMelder
- Epidemiological evidence
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Protection for minors and incompetents
- References
- References
- References
- References
- References
- References
- References
- Relevant technical publications
- Privacy-friendly Assistive Technology
- References
Simmel BlueTrace
- Dataflow description
- Epidemiological evidence
- Proprietary components
- (Software) Patents
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Use of OS permissions
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- References
- References
- References
- Activation Via Insecure Media
- References
- References
- Relevant legal publications
- Relevant technical publications
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- References
- Back-end technology in use
Corona-Warn-App
- Version
- Organisations
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
CovidAlert
- Version
- Organisations
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
StopCovid
- Version
- Organisations
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
Corona-Warn-App
- References
- Epidemiological evidence
- Proprietary components
- (Software) Patents
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- References
- References
- Use of device specific identifiers
- References
- References
- Required OS permissions
- References
- Use of OS permissions
- References
- References
- References
- Explicit consent required for data sync
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- Relevant legal publications
- Relevant technical publications
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- References
- Data Hosting
- Back-end technology in use
CoronaMelder
- Epidemiological evidence
- (Software) Patents
- Strongly Encrypted Local Storage
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Protection for minors and incompetents
- References
- References
- References
- References
- References
- References
- References
- References
- Relevant technical publications
- References
CovidSafe
- Version
- Organisations
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
Immuni
- Version
- Organisations
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
Simmel
- Version
- Source code Repository
- Open Source
- References
- Other primary sources of information
- Dataflow description
- Logo
- Based on a tracing standard
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- Strongly Encrypted Local Storage
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Availability not restricted to Traceable Account Holders
- References
- Does Not Require Third Party Account(s)
- References
- Use of device specific identifiers
- References
- No Telemetry / Tracking
- References
- Required OS permissions
- References
- Use of OS permissions
- Stores Geolocation History
- References
- Time-constrained operation (will cease to work by itself at a given end date)
- References
- Plausible Deniability
- References
- Explicit consent required for data sync
- References
- Bluetooth Anonymity
- References
- BroadCasts Wifi MAC Address
- References
- Broadcasts Static Bluetooth ID
- References
- Shares only anonymous attributes
- References
- Selective data upload/Data redaction
- References
- Does the application expose the social graph of individuals?
- References
- Potential exposure of the user addres book or recent contacts
- References
- Uploads Identity
- References
- Uploads Phone Number
- References
- Activation Via Insecure Media
- References
- Uploads Geolocation History
- References
- Uploads Wifi MAC Address
- References
- Uploads Bluetooth ID
- References
- Adequate protection against exposure of the IP Address of users
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- Privacy-friendly Assistive Technology
- References
- Data Hosting
- Back-end technology in use
COVIDSafe
- References
- Epidemiological evidence
- Open Source licenses
- Proprietary components
- (Software) Patents
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Third party Security Analysis
- Known Vulnerabilities
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- References
- References
- Use of device specific identifiers
- References
- References
- Required OS permissions
- References
- Use of OS permissions
- References
- References
- References
- Explicit consent required for data sync
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- Relevant legal publications
- Relevant technical publications
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- References
- Data Hosting
- Back-end technology in use
ProteGO Safe
- Other primary sources of information
- Dataflow description
- Epidemiological evidence
- Proprietary components
- (Software) Patents
- App Store
- Dependencies
- Build environment
- Reproducible builds
- References
- Update transparency
- References
- TUF update security
- References
- Dedicated Threat Model
- Known Vulnerabilities
- References
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- References
- References
- Use of device specific identifiers
- References
- References
- Required OS permissions
- References
- Use of OS permissions
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- References
- Relevant legal publications
- Relevant technical publications
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)
- References
- Data Hosting
- Back-end technology in use
Immuni
- Epidemiological evidence
- Proprietary components
- (Software) Patents
- Update transparency
- References
- TUF update security
- Recenty system security flaws. Is the application dependent on system level software that has had critical vulnerabilities in the last 12 months)?
- Data Privacy Impact Assessment
- Third party reports on privacy considerations
- Protection for minors and incompetents
- Complete Runtime Control of the Hardware
- References
- Plausible Deniability
- References
- Relevant legal publications
- Relevant technical publications
- Multi-Lingual
- References
- Accessibility Certification reports (Web Content accessibility guidelines or equivalent)