User contributions
9 September 2020
Item:Q4962
wbsetclaim-create:2||1: Wikidata item ID (P103): Q230051
+342
Item:Q4962
wbsetdescription-add:1|en: ranking app site
+75
Item:Q4962
wbsetlabel-add:1|en: Alexa Internet
+73
7 September 2020
Item:Q4397
wbsetclaim-create:2||1: instance of (P3): immunity passport (Q4512)
+418
Item:Q4418
wbsetclaim-create:2||1: concerns (P110): geolocation data (Q539)
+403
Item:Q4418
wbsetclaim-create:2||1: concerns (P110): Bluetooth Low Energy (Q4406)
+405
Item:Q4418
wbsetclaim-update:2||1|2: official website (P15): https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application
+9
Item:Q4418
wbsetclaim-update:2||1|1: official website (P15): https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application
+277
Item:Q4418
wbsetclaim-create:2||1: official website (P15): https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application
+391
Item:Q4418
wbsetclaim-update:2||1|1: comment (P126): Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner.
+436
Item:Q4418
wbsetclaim-create:2||1: comment (P126): Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner.
+704
4 September 2020
Item:Q4958
wbsetclaim-create:2||1: see also (P12): Analysis of SwissCovid (Q4749)
+420
Item:Q4749
wbsetclaim-create:2||1: see also (P12): Lessons from SwissCovid (Q4958)
+420
Item:Q4749
wbsetclaim-create:2||1: author (P121): Martin Vuagnoux (Q4960)
+405
Item:Q4749
wbsetclaim-create:2||1: author (P121): Serge Vaudenay (Q4959)
+422
Item:Q4749
wbsetclaim-update:2||1: official website (P15): https://infoscience.epfl.ch/record/278048/files/swisscovid.pdf
+10
Item:Q4873
wbsetclaim-create:2||1: author (P121): Serge Vaudenay (Q4959)
+422
Item:Q4608
wbsetclaim-create:2||1: author (P121): Serge Vaudenay (Q4959)
+422
Item:Q4958
wbsetclaim-create:2||1: author (P121): Martin Vuagnoux (Q4960)
+405
Item:Q4958
wbsetclaim-create:2||1: author (P121): Serge Vaudenay (Q4959)
+422
Item:Q4958
wbsetclaim-create:2||1: concerns (P110): Google/Apple contact tracing protocol (Q4737)
+405
Item:Q4960
wbeditentity-create:2|en: Martin Vuagnoux, Swiss cryptographer
Item:Q4959
wbsetclaim-create:2||1: Wikidata item ID (P103): Q3479573
+343
Item:Q4959
wbsetclaim-create:2||1: instance of (P3): human (Q355)
+416
Item:Q4959
wbeditentity-create:2|en: Serge Vaudenay, French cryptographer
Item:Q4958
wbsetclaim-create:2||1: concerns (P110): SwissCovid (Q4518)
+405
Item:Q4958
wbsetclaim-create:2||1: concerns (P110): Contact tracing (Q4209)
+405
Item:Q4958
wbsetclaim-create:2||1: concerns (P110): Coronadata (Q4138)
+405
Item:Q4958
wbsetclaim-create:2||1: concerns (P110): Bluetooth Low Energy (Q4406)
+422
Item:Q4958
wbsetclaim-create:2||1: date (P100): 31 August 2020
+513
Item:Q4958
wbsetclaim-create:2||1: official website (P15): https://lasec.epfl.ch/people/vaudenay/swisscovid/lessons-from-swisscovid.pdf
+410
Item:Q4958
wbeditentity-create-item:0|: #quickstatements; #temporary_batch_1599201076654
3 September 2020
Item:Q4957
wbsetclaim-create:2||1: concerns (P110): Coronadata (Q4138)
+405
Item:Q4608
wbsetclaim-create:2||1: date (P100): May 2020
+513
Item:Q4608
wbsetdescription-set:1|en: scholarly article published by Serge Vaudenay on May 2020
Item:Q4957
wbsetclaim-create:2||1: date (P100): 3 September 2020
+513
Item:Q4957
wbsetclaim-create:2||1: concerns (P110): Bluetooth Low Energy (Q4406)
+422
Item:Q4957
wbsetclaim-create:2||1: official website (P15): https://hackaday.com/2020/09/03/covid-tracing-framework-privacy-busted-by-bluetooth/
+418
Item:Q4957
wbsetclaim-create:2||1: instance of (P3): news item (Q1206)
+403
Item:Q4957
wbsetclaim-create:2||1: instance of (P3): blog post (Q1795)
+418
Item:Q4957
wbeditentity-create:2|en: Covid-tracing Framework Privacy Busted By Bluetooth, blogpost published in September 2020
2 September 2020
Item:Q4845
wbsetclaim-create:2||1: Apple app ID (P365): 1519479652
+346
Item:Q4845
wbsetclaim-create:2||1: Exodus Privacy report URL (P48): https://reports.exodus-privacy.eu.org/fr/reports/search/fct.inesctec.stayaway/
+412
Item:Q4845
wbsetclaim-create:2||1: Android app ID (P41): fct.inesctec.stayaway
+355
31 August 2020
Item:Q141
wbsetdescription-set:1|en: French adtech company
+7
Item:Q1269
wbsetdescription-add:1|en: French adtech company
+80
Item:Q1269
wbsetlabel-set:1|en: Smart AdServer
+1
Item:Q4956
wbsetclaim-create:2||1: concerns (P110): Smart AdServer (Q1269)
+405
Item:Q4956
wbsetclaim-create:2||1: concerns (P110): Adobe (Q903)
+403
Item:Q4956
wbsetclaim-create:2||1: concerns (P110): Outbrain (Q1492)
+405