Challenges
Jump to navigation
Jump to search
This platform is all about inviting contributions. This section identifies a number of concrete challenges to focus the efforts. Contributions are encouraged on the list itself and on the solutions to the challenges.
Contents
- 1 Challenge: What are sufficient measures to avoid repurposing of data and function creep in a trust-based model?
- 2 Challenge: How might we use geolocation data for detecting potential environmental transmission without revealing the identity of the subject before their consent?
- 3 Challenge: How might we match the (virtual) contact graphs of autonomous contact tracing and human contact tracing without revealing the identity of the subjects before their consent?
- 4 Challenge: How might we assert the status of an individual who needs to self-quarantine towards the instances that need to provide active or passive support in a solution where the identity of the subject is occulted by design?
- 5 Challenge: How might we combine the Apple/Google Exposure Notification Framework with other solutions to obtain a wider coverage of the overall system while leveraging the BlueTooth improvements linked to the framework?