Difference between revisions of "Aarogya Setu (Q4418)"
Jump to navigation
Jump to search
(Changed claim: Android app ID (P41): nic.goi.aarogyasetu) |
(Created claim: concerns (P110): geolocation data (Q539)) |
||
(11 intermediate revisions by the same user not shown) | |||
Property / official website | |||
- | |||
Property / official website: https://play.google.com/store/apps/details?id=nic.goi.aarogyasetu / rank | |||
- | |||
Property / official website | |||
+ | |||
Property / official website: https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application / rank | |||
+ | Normal rank | ||
Property / official website: https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application / qualifier | |||
+ | comment: code for ios | ||
Property / concerns | |||
+ | |||
Property / concerns: Bluetooth Low Energy / rank | |||
+ | Normal rank | ||
Property / concerns | |||
+ | |||
Property / concerns: geolocation data / rank | |||
+ | Normal rank | ||
Property / comment | |||
+ | 2020/05/29 . download: 100 M / 1.3 Billion people living in India | ||
Property / comment: 2020/05/29 . download: 100 M / 1.3 Billion people living in India / rank | |||
+ | Normal rank | ||
Property / comment | |||
+ | Trojan detected | ||
Property / comment: Trojan detected / rank | |||
+ | Normal rank | ||
Property / comment: Trojan detected / qualifier | |||
+ | |||
Property / comment | |||
+ | Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner. | ||
Property / comment: Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner. / rank | |||
+ | Normal rank | ||
Property / comment: Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner. / reference | |||
+ |
Latest revision as of 20:39, 7 September 2020
Indian mobile app developed by the Government of India for contact tracing
Language | Label | Description | Also known as |
---|---|---|---|
English |
Aarogya Setu
|
Indian mobile app developed by the Government of India for contact tracing
|
Statements
Expertise by Subhashis Banerjee, Professor of Computer Science and Engineering at IIT Delhi
0 references
0 references
2020/05/29 . download: 100 M / 1.3 Billion people living in India
0 references
Trojan detected
0 references
Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner.
Identifiers
nic.goi.aarogyasetu
0 references