{"entities":{"Q4429":{"pageid":27540,"ns":120,"title":"Item:Q4429","lastrevid":85327,"modified":"2020-04-06T14:25:47Z","type":"item","id":"Q4429","labels":{"en":{"language":"en","value":"How PEPP-PT, a solution aiming at fighting COVID-19 through privacy-preserving proximity tracing, works"}},"descriptions":{"en":{"language":"en","value":"blogpost published on April 5,2020"}},"aliases":{},"claims":{"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":1206,"id":"Q1206"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4429$b5836152-4f9d-c23b-b228-5cdfd957947d","rank":"normal"}],"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"https://link-and-think.blogspot.com/2020/04/how-pepp-pt-solution-aiming-at-fighting.html?m=1","type":"string"},"datatype":"url"},"type":"statement","id":"Q4429$b40210c0-40f8-2828-7c2b-e482d09c4b0e","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4138,"id":"Q4138"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4429$099b0c5c-413b-39eb-c7f9-05fc4ec9f4e0","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4209,"id":"Q4209"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4429$ee40b042-48c4-efe7-f4cd-3a7d4b7b2f8f","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4399,"id":"Q4399"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4429$01444fca-40de-8fa7-1817-685af1637a2d","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2020-04-05T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4429$986dc5b4-4f5b-8419-3547-bbb306f792a2","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"Upon installation, the app generates a key, which is a 32-bit random SK0 number, and registers with a central server with an ID different from SK0 and used by the server only to contact all registered apps for periodic updates related to infected people. Each app renews its key every day, calculating a new 32-bit random number SKt + 1 using a predefined hash function H1 having SKt as its argument.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4429$20dd899f-4ed9-20e0-b1d4-47a0e80c0979","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"This element of distributing SKt of devices owned by an infected person is a weak point with respect to privacy. In fact, when an app receives an SKt of an infected person,  the corresponding EphIDs, could discover the identity of the person, because it can relate different EphIDs, which are otherwise unrelated, to the same original SKt.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4429$cde7845e-4b66-e805-acf6-f22d27267ca0","rank":"normal"}]},"sitelinks":{}}}}