Difference between revisions of "Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask. (Q4414)"
Jump to navigation
Jump to search
(Created claim: date (P100): 2 April 202) |
(Changed [en] description: blogpost published on April 2,2020) |
||||||||||||||||||||||||||
| (5 intermediate revisions by the same user not shown) | |||||||||||||||||||||||||||
| description / en | description / en | ||||||||||||||||||||||||||
| - | + | blogpost published on April 2,2020 | |||||||||||||||||||||||||
| Property / instance of | Property / instance of | ||||||||||||||||||||||||||
| - | + | ||||||||||||||||||||||||||
| Property / date | Property / date | ||||||||||||||||||||||||||
| - |
| + | 2 April 2020
| ||||||||||||||||||||||||
| Property / quote | |||||||||||||||||||||||||||
| + | In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial. | ||||||||||||||||||||||||||
| Property / quote: In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial. / rank | |||||||||||||||||||||||||||
| + | Normal rank | ||||||||||||||||||||||||||
| Property / concerns | |||||||||||||||||||||||||||
| + | |||||||||||||||||||||||||||
| Property / concerns: Coronadata / rank | |||||||||||||||||||||||||||
| + | Normal rank | ||||||||||||||||||||||||||
| Property / concerns | |||||||||||||||||||||||||||
| + | |||||||||||||||||||||||||||
| Property / concerns: Coronaprivacy / rank | |||||||||||||||||||||||||||
| + | Normal rank | ||||||||||||||||||||||||||
Latest revision as of 20:12, 2 April 2020
blogpost published on April 2,2020
| Language | Label | Description | Also known as |
|---|---|---|---|
| English |
Evaluating COVID-19 contact tracing apps? Here are 8 privacy questions we think you should ask.
|
blogpost published on April 2,2020
|
Statements
2 April 2020
0 references
In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial.
0 references