Privacy has already ended, just another push folks.
Answer: Turn off Bluetooth, Location Tracker
Apple and Google debut Bluetooth-based contact-tracing platform to combat Covid-19…and end privacy?
Apple and Google have unveiled an app – soon to be built into their mobile operating systems – that will trace users’ contacts to fight Covid-19. They insist it will be ‘opt-in’ and respect privacy, but we’ve heard that before.
The tech giants announced they were working together on a Bluetooth-based contact-tracing app on Friday. The platform will debut as an API – a tool programmers can use to integrate the functionality into their own apps – next month, the companies said, and will eventually be built into the iOS and Android operating systems themselves.
The app will work by sharing identifying information between nearby phones across a Bluetooth connection and notifying users when they have come into contact with an infected person, or one who later turns out to be infected. Its servers have a 14-day ‘memory’ of devices that have crossed paths.
Both companies took pains to reassure the public that the identity and location of users will not be shared, insisting that the app works on proximity to other phones only rather than independent geographic position. Data decryption would occur locally, on the user’s phone, they explained.
“Privacy, transparency and consent are of utmost importance in this effort,” the corporations said in a joint statement, pledging to “publish information about our work for others to analyze” and work with “interested stakeholders” to expand the app’s functionality.
While both companies repeatedly insisted that the tech will be “opt-in” and respect users’ privacy and security, its eventual integration into the very operating systems that run the phones used by the vast majority of smartphone users is likely to concern privacy advocates. While Apple has framed itself as the ‘responsible’ Big Tech behemoth with regard to privacy, information-hungry Google is notorious for running every morsel of data it can get its hands on through thickets of algorithms and apologizing for intrusions later, if at all.