Difference between revisions of "Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask. (Q4414)"

From Wikibase Personal data
Jump to navigation Jump to search
(‎Created a new Item: #quickstatements; #temporary_batch_1585857994214)
 
(‎Changed [en] description: blogpost published on April 2,2020)
 
(7 intermediate revisions by the same user not shown)
description / endescription / en
-
blog post published on April 2,2020
+
blogpost published on April 2,2020
Property / instance ofProperty / instance of
-+
Property / official website
 +
Property / official website: https://cpg.doc.ic.ac.uk/blog/evaluating-contact-tracing-apps-here-are-8-privacy-questions-we-think-you-should-ask/ / rank
 +
Normal rank
Property / date
 +
2 April 2020
Timestamp+2020-04-02T00:00:00Z
Timezone+00:00
CalendarGregorian
Precision1 day
Before0
After0
Property / date: 2 April 2020 / rank
 +
Normal rank
Property / quote
 +
In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial.
Property / quote: In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial. / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: Coronadata / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: Coronaprivacy / rank
 +
Normal rank

Latest revision as of 20:12, 2 April 2020

blogpost published on April 2,2020
Language Label Description Also known as
English
Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask.
blogpost published on April 2,2020

    Statements

    2 April 2020
    0 references
    In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial.
    0 references
    0 references
    0 references