{"entities":{"Q4775":{"pageid":27894,"ns":120,"title":"Item:Q4775","lastrevid":88783,"modified":"2020-07-06T07:20:22Z","type":"item","id":"Q4775","labels":{"en":{"language":"en","value":"Mind the GAP: Security & Privacy Risks of Contact Tracing Apps"}},"descriptions":{"en":{"language":"en","value":"journal article from 'arXiv:2006.05914 [cs]' published in June 2020"}},"aliases":{},"claims":{"P3":[{"mainsnak":{"snaktype":"value","property":"P3","datavalue":{"value":{"entity-type":"item","numeric-id":210,"id":"Q210"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$0FECCEB6-7A39-4AD7-A2BD-C8BD8B169447","rank":"normal"}],"P15":[{"mainsnak":{"snaktype":"value","property":"P15","datavalue":{"value":"http://arxiv.org/abs/2006.05914","type":"string"},"datatype":"url"},"type":"statement","id":"Q4775$85106B16-C4CC-4E4A-A36F-6AD0328E7376","rank":"normal"}],"P110":[{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4209,"id":"Q4209"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$3bdb4535-456c-8016-f9a0-b0669963790b","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4138,"id":"Q4138"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$63154812-46e9-04f4-966e-0026ba66f666","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4737,"id":"Q4737"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$622df5fb-4d6f-641e-070d-98f0e004b06d","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4518,"id":"Q4518"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$542c8963-4adb-86bf-6461-b1dacb09d1a5","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4489,"id":"Q4489"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$a0b44f94-4010-288f-65ba-8917892d281a","rank":"normal"},{"mainsnak":{"snaktype":"value","property":"P110","datavalue":{"value":{"entity-type":"item","numeric-id":4639,"id":"Q4639"},"type":"wikibase-entityid"},"datatype":"wikibase-item"},"type":"statement","id":"Q4775$49fcd8ec-4e31-41a2-d18b-9dab3bcc7620","rank":"normal"}],"P203":[{"mainsnak":{"snaktype":"value","property":"P203","datavalue":{"value":"For example, by placing a Bluetooth LE sensor close to a camera with facial recognition functionality, it is in principle possible to directly associate the proximity identifier beaconed over Bluetooth LE (and thus the used pseudonym) with an identifiable person to entirely de-anonymize the person in question.","type":"string"},"datatype":"string"},"type":"statement","id":"Q4775$58a35020-4237-a693-2253-5f797df07ef8","rank":"normal"}],"P100":[{"mainsnak":{"snaktype":"value","property":"P100","datavalue":{"value":{"time":"+2020-06-10T00:00:00Z","timezone":0,"before":0,"after":0,"precision":11,"calendarmodel":"http://www.wikidata.org/entity/Q1985727"},"type":"time"},"datatype":"time"},"type":"statement","id":"Q4775$626932e9-4a29-02e1-ac5e-93ae38738386","rank":"normal"}]},"sitelinks":{}}}}