Difference between revisions of "Aarogya Setu (Q4418)"

From Wikibase Personal data
Jump to navigation Jump to search
 
(16 intermediate revisions by the same user not shown)
Property / official website
- 
Property / official website: https://play.google.com/store/apps/details?id=nic.goi.aarogyasetu / rank
-
Normal rank
 
Property / official website
- 
Property / official website: https://apps.apple.com/in/app/aarogyasetu/id1505825357 / rank
-
Normal rank
 
Property / official website
 +
Property / official website: https://github.com/nic-delhi/AarogyaSetu_Android / rank
 +
Normal rank
Property / official website
 +
Property / official website: https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application / rank
 +
Normal rank
Property / official website: https://openforge.gov.in/plugins/git/aarogyasetuos/ios-mobile-application / qualifier
 +
comment: code for ios
Property / concerns
 +
Property / concerns: Bluetooth Low Energy / rank
 +
Normal rank
Property / concerns
 +
Property / concerns: geolocation data / rank
 +
Normal rank
Property / Android app ID
 +
nic.goi.aarogyasetu
Property / Android app ID: nic.goi.aarogyasetu / rank
 +
Normal rank
Property / Android app ID: nic.goi.aarogyasetu / qualifier
 +
Property / Apple app ID
 +
Property / Apple app ID: 1505825357 / rank
 +
Normal rank
Property / comment
 +
2020/05/29 . download: 100 M / 1.3 Billion people living in India
Property / comment: 2020/05/29 . download: 100 M / 1.3 Billion people living in India / rank
 +
Normal rank
Property / comment
 +
Trojan detected
Property / comment: Trojan detected / rank
 +
Normal rank
Property / comment: Trojan detected / qualifier
 +
Property / comment
 +
Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner.
Property / comment: Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner. / rank
 +
Normal rank
Property / comment: Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner. / reference
 +

Latest revision as of 20:39, 7 September 2020

Indian mobile app developed by the Government of India for contact tracing
Language Label Description Also known as
English
Aarogya Setu
Indian mobile app developed by the Government of India for contact tracing

    Statements

    0 references
    0 references
    0 references
    0 references
    0 references
    2020/05/29 . download: 100 M / 1.3 Billion people living in India
    0 references
    Some external malicious actors have developed a malicious application called ArogyaSetu.apk that they allegedly sent to Indian defense personnel through WhatsApp from the United Kingdom (UK). When this malicious software is installed on a user’s device, it extracts sensitive information about defense forces and sends it to the originator without the knowledge of the device owner.

    Identifiers