Difference between revisions of "Centralised autonomous contact tracing using Bluetooth proximity"

From Appiaplus
Jump to navigation Jump to search
 
Line 1: Line 1:
= Type of Solution =
+
= Type of solution =
   
 
Autonomous contact tracing (person-to-person proximity)
 
Autonomous contact tracing (person-to-person proximity)
Line 5: Line 5:
 
= Examples =
 
= Examples =
   
  +
* UK
* DP-3T based solutions
 
  +
* Singapore
* Apple-Google based solutions
 
  +
* France
  +
* Australia
  +
   
 
= Main Characteristics =
 
= Main Characteristics =
   
  +
* Exchanges temporary identifiers during encounters
* Makes use of fully random pseudonyms not linkable to a user or group of users or his/their devices
 
  +
* Makes use of pseudonyms linked to a device or optionally a user
* Decentral data storage of all ephemeral encounter identifiers on user’s devices
 
  +
* Centralized data storage of all observed encounter identifiers by trusted third party
 
* Bluetooth proximity detection between devices equipped with an app that supports that same protocol
 
* Bluetooth proximity detection between devices equipped with an app that supports that same protocol
 
* Out-of-band attribution of ‘infection confirmation’ code by a government approved healthcare instance
 
* Out-of-band attribution of ‘infection confirmation’ code by a government approved healthcare instance
* Backend service to temporary collect, store and distribute the ephemeral data from confirmed infected users
 
   
 
= Outcome Coverage =
 
= Outcome Coverage =
Line 27: Line 30:
 
| '''Enabling Research'''
 
| '''Enabling Research'''
 
|-
 
|-
| Possible for general guidelines
+
| Possible
 
| Encounters
 
| Encounters
 
| No
 
| No
  +
| Possible
| No
 
  +
| Possible
| No
 
  +
| Interoperability possible
| No
 
  +
| Possible
| No
 
 
|}
 
|}
   
Line 39: Line 42:
   
 
{| class="wikitable"
 
{| class="wikitable"
|width="30%"| '''Effectiveness Factor'''
+
| width="30%" | '''Effectiveness Factor'''
|width="50%"| '''Assessment'''
+
| width="50%" | '''Assessment'''
 
|-
 
|-
 
| Accuracy of information
 
| Accuracy of information
 
|
 
|
* Circumstances for false positives and false negatives in encounter detection have been described (see [https://docs.google.com/document/d/1BdxCTwcxbM5-tpvXA3mdrY7qm7U1ZDJDh3nlcetdUyU/edit?usp=sharing Solution Component - BlueTooth]). The impact on the effectiveness is not quantified. [Apple/Google] foresee risk levels to avoid false positives.
+
* Circumstances for false positives and false negatives in encounter detection have been described (see [https://docs.google.com/document/d/1BdxCTwcxbM5-tpvXA3mdrY7qm7U1ZDJDh3nlcetdUyU/edit?usp=sharing Solution Component - BlueTooth]). The impact on the effectiveness is not quantified.
 
* Bluetooth only is not enough to assess the criticality of the encounter. Were people face-to-face, wearing face masks, having physical contact, …?
 
* Bluetooth only is not enough to assess the criticality of the encounter. Were people face-to-face, wearing face masks, having physical contact, …?
* Bluetooth as a distance indicator has limitations. [DP3T] Has gone through calibration of Bluetooth proximity to improve the accuracy
+
* Bluetooth as a distance indicator has limitations.
  +
* Calibration could definitely help with the accuracy of the BLE proximity estimations (but is no silver bullet)
 
* See also: [https://docs.google.com/document/d/1BdxCTwcxbM5-tpvXA3mdrY7qm7U1ZDJDh3nlcetdUyU/edit?usp=sharing Solution Component - BlueTooth]
 
* See also: [https://docs.google.com/document/d/1BdxCTwcxbM5-tpvXA3mdrY7qm7U1ZDJDh3nlcetdUyU/edit?usp=sharing Solution Component - BlueTooth]
 
* A mechanism is foreseen to have health authorities issue the confirmation of an infection
 
* A mechanism is foreseen to have health authorities issue the confirmation of an infection
  +
* Calibration could definitely help with the accuracy of the BLE proximity estimations (but is no silver bullet)
 
|-
 
|-
 
| Speed of the process
 
| Speed of the process
 
|
 
|
 
* After confirmation of infection, first degree contacts can immediately be informed
 
* After confirmation of infection, first degree contacts can immediately be informed
  +
* Possible to model (and inform) up to 5th degree contacts
* [Apple/Google] 2nd degree contacts could be possible as well
 
* The absence of coordination with other actions necessary to test and effectively isolate or quarantine the subject might negatively impact the speed of the total process
+
* The possibility to coordinate with other actions can further reduce the time between confirmation or suspicion of infection and affective isolation or quarantining.
 
|-
 
|-
 
| Adaptability of the solution
 
| Adaptability of the solution
 
|
 
|
* The algorithm for deducing the criticality of the health exposure is located on the devices, requiring updates and/or remote configuration
+
* The algorithm for deducing the criticality of the health exposure is central, hence easy to update.
 
|-
 
|-
 
|
 
|
Line 68: Line 73:
 
* Only encounters are detected (no visits, no health status beyond infection status, no movements
 
* Only encounters are detected (no visits, no health status beyond infection status, no movements
 
* Proximity tracking only covers person-to-person transmission. Environmental transmission is not covered.
 
* Proximity tracking only covers person-to-person transmission. Environmental transmission is not covered.
  +
* Contacts up to the 5th degree can be detected.
* First degree contacts can immediately be informed
 
  +
* There is not necessarily a filtering of the users being included in the contact graph (eg based on their risk profile)
* [Apple/Google] 2nd degree contacts could be detected as well
 
* Non-users are not included in the contact graph, encounters below the threshold are not included
+
* Non-users are not included in the contact graph.
 
* Presymptomatic and asymptomatic cases are covered.
 
* Presymptomatic and asymptomatic cases are covered.
 
|-
 
|-
 
| Support of isolation and quarantining
 
| Support of isolation and quarantining
 
|
 
|
* Quarantining is triggered through a notification only. Actual quarantining and access to testing might be hampered by the isolation of the system from healthcare authorities
+
* Quarantining is triggered through a notification sent out by a trusted healthcare authority that links with other supporting instances
* Individuals who are advised to quarantine have no official warrant to claim leave of absence (e.g. with their employer)
+
* Individuals who are advised to quarantine by authorized healthcare instances can be supported socially and economically (e.g. proof of absence for their employer)
 
|-
 
|-
 
| Targeted measures
 
| Targeted measures
 
|
 
|
  +
* The collected data can be used for creating insights that can lead to targeted measures
* It is not the purpose of this kind of solution to contribute to targeted measures, except for targeted communication to the users based on their individual data.
 
 
|-
 
|-
 
|
 
|
Line 88: Line 93:
 
* Contact tracers
 
* Contact tracers
 
|
 
|
  +
* HCT can benefit from the data gathered via ACT and can alleviate their resources
* Double work between HCT and ACT is unavoidable, as all identified contact graphs are anonymized
 
 
|-
 
|-
 
| Interoperability
 
| Interoperability
 
|
 
|
  +
* With strict user consent, data can be made available for epidemiological research
* The solution is not meant to interoperate with other systems (see outcome coverage)
 
  +
* Research and modeling is possible on aggregated and/or filtered data sets while the pandemic lasts
* No data is made available for use in other subdomains of the problem domain.
 
  +
* The use of a shared identifier enables many use cases
 
|-
 
|-
 
| Acceptable side-effects
 
| Acceptable side-effects
 
|
 
|
  +
* This cannot be stated in general. It is possible to implement this kind of solution with protection against unauthorised insight in the health status of the user through observation or coercion. But lack of attention for this aspect can be harmful.
* A lot of attention has been given to avoid the infection status of the users to be deduced from the behaviour of the app, especially the communication patterns.
 
  +
* Abuse of data is not impossible.
 
|-
 
|-
 
| Adoption and population coverage
 
| Adoption and population coverage
 
|
 
|
  +
* The adoption rate could be hampered by the inherent distrust of uncertainty that comes with having to trust a central instance with valuable information
* Solutions require the installation and onboarding of apps available through the app stores of Apple and Google.
 
* The Apple/Google solution requires an update of the Operating System
 
* Depending on the OS requirements of the solution, older hardware might be incompatible.
 
* The adoption rate could be impacted by the isolation of the system from the rest of the healthcare system
 
* The backing of this solution by Apple, Google and privacy experts and activists probably have a positive impact on the take up of this solution.
 
* Interoperability between users of different implementations of the same protocol is foreseen
 
* Austria, Estonia, Finland, Germany, Italy, Portugal and Switzerland have announced a roadmap to enable their Apple/google based solutions to interoperate, regardless of the (decentral) protocol adopted by each country. (see Apple-style contact tracing agreed by seven European countries - 9to5Mac - https://9to5mac.com/2020/05/07/apple-style-contact-tracing/)
 
 
|-
 
|-
 
| Feasibility and elapsed time (Experience, Initial TTM, Scaling)
 
| Feasibility and elapsed time (Experience, Initial TTM, Scaling)
 
|
 
|
 
* The Bluetooth technology was not designed with this type of application in mind. Shortcomings include energy consumption and limitations in the support in Android and iOS.
 
* The Bluetooth technology was not designed with this type of application in mind. Shortcomings include energy consumption and limitations in the support in Android and iOS.
  +
* The improvements projected by Apple and Google for their Exposure Notification Framework is not available for apps with centralisation of data, so fallbacks are needed (see [https://docs.google.com/document/d/1BdxCTwcxbM5-tpvXA3mdrY7qm7U1ZDJDh3nlcetdUyU/edit?usp=sharing Solution Component - Bluetooth]), none of which have proven to be satisfactory.
* The Apple/Google initiative removes some limitations (while imposing limitations on the interoperability with other parts of the full process)
 
 
|-
 
|-
 
| Technical dependability of the solution
 
| Technical dependability of the solution
 
|
 
|
  +
* If implemented with early centralisation of data (as opposed to uploading when an infection is confirmed) the working of the solution is not dependent on the availability of the user devices.
* The backtracking of a contact graph can be interrupted by one device being unavailable (offline, locked)
 
 
|-
 
|-
 
| Evidence
 
| Evidence
 
|
 
|
  +
* Where this kind of solution has been used, uptake has been below expectations (e.g. Singapore) in number of downloads. It is not clear what the actual usage rate is.
* There is no precedent in using this kind of solution.
 
  +
* It is unclear what impact the use of the solution had.
 
|}
 
|}
  +
   
 
= Requirements coverage - Privacy and Security =
 
= Requirements coverage - Privacy and Security =
   
 
{| class="wikitable"
 
{| class="wikitable"
|width="30%"| '''Privacy Factor'''
+
| width="30%" | '''Privacy Factor'''
|width="50%"| '''Assessment'''
+
| width="50%" | '''Assessment'''
 
|-
 
|-
 
|
 
|
Line 133: Line 136:
 
* GDPR compliance
 
* GDPR compliance
 
|
 
|
  +
Compliance is possible, but is case-specific.
Likely
 
  +
Debate possible about the proportionality of the data collection: data of all users are processed regardless of their being infected or potentially affected. One can argue that this comes with the benefit of reduction of the elapsed time between a potentially risky encounter and a warning.
DP3T has published a DPIA
 
 
|-
 
|-
 
|
 
|
Line 150: Line 153:
 
* No support for law and policy enforcement
 
* No support for law and policy enforcement
 
* No commercial exploitation
 
* No commercial exploitation
  +
| Alignment is possible, but is case-specific.
|
 
Compatible, with special attention given to multiple factors:
 
* Temporary solution
 
* Strictly limited purpose
 
* Principle of least privilege
 
* Way back through graceful dismantling (in DP3T), depending on Apple/Google intervention in the Apple/Google solution
 
* DP3T has offered full transparency
 
* Consent-based
 
* Voluntary installation
 
* Data is not accessed by anyone, so no access for enforcement purposes, commercial exploitation
 
* Strict limitation of retention period
 
*
 
 
|-
 
|-
 
|
 
|
Line 170: Line 162:
 
* The remaining surface attack must be secured
 
* The remaining surface attack must be secured
 
* Transparency and scrutiny on the security measures
 
* Transparency and scrutiny on the security measures
  +
| Not applicable
| The DP3T solution has opened up for public scrutiny on its compliance with these requirements.
 
 
|-
 
|-
 
|
 
|
Line 185: Line 177:
 
* Shortest possible retention period, preferably rolling
 
* Shortest possible retention period, preferably rolling
 
* Applying data minimisation, limit the data centralised
 
* Applying data minimisation, limit the data centralised
  +
| Compliance is possible, but is case-specific.
| Not Applicable
 
 
|}
 
|}
   
 
= Trade-off Analysis =
 
= Trade-off Analysis =
 
Most technical decisions in this solution favor privacy over effectiveness, and especially the effectiveness of the whole system.
 
   
 
Bluetooth only:
 
Bluetooth only:
   
  +
* Avoids the privacy challenges linked to gathering location data
* limits the transmission routes to proximity
 
  +
* Limits the transmission routes to person-to-person only
   
No shared identifier and no data sharing:
+
Shared identifier and centralisation of data:
   
* Renders linking to other data impossible, hampering the interoperability and efficient use of resources.
+
* Allows linking to other data, allowing interoperability and efficient use of resources
  +
* Rules out the use of Apple/Google Exposure Notification Framework and foregoes the Bluetooth improvements
  +
* Requires more privacy and security safeguards in order to comply with the augmented requirements
   
  +
Not being able to use the Apple/Google Exposure Notification Framework:
Prohibition of combination with location data:
 
   
  +
* Forces suboptimal Bluetooth functioning and resulting battery drain, which in turn might lead to a poorer adoption rate. (see [https://docs.google.com/document/d/1BdxCTwcxbM5-tpvXA3mdrY7qm7U1ZDJDh3nlcetdUyU/edit?usp=sharing Solution Component - Bluetooth])
* Renders combination of multiple function in a single app impossible (if the Apple/Google framework is used)
 
* Renders the addition of location context (eg being inside or outside) for interpretation of transmission risks impossible
 
   
 
= Discussion and open topics =
 
= Discussion and open topics =
Line 209: Line 201:
 
== Discussion, including ethical considerations ==
 
== Discussion, including ethical considerations ==
   
  +
The interoperability and adaptability that is enabled by this solution increases its value towards the other parties essential to the effectiveness of the overall system (human contact tracers, healthcare providers, social security, analysts and researchers and in turn policy makers).
When looked at from a strict scope of autonomous proximity tracking, these solutions hit a good trade-off between privacy and effectiveness thanks to their strict anonymisation and data minimisation. When looked at from the perspective of the full landscape, it is however sub-optimal. Its isolation towards other parties (like human contact tracing centers, social security, researchers, policy makers, etc) can cause adverse effects. It might increase the burden on contact tracers who might detect the same infected person through both HCT and ACT procedures and the compliance with quarantining advice might be hampered by the lack of coordination with social security agents.
 
   
  +
This increases the beneficence of the solution, possibly in proportion to the increased privacy footprint. This proportionality is subject to the compliance with the specific requirements for trust-based solutions, which is a high bar to meet and can only be assessed case by case.
From a beneficence point-of-view, the solutions bring more speed and more coverage than human contact tracing. However, by trying to avoid maleficence (primarily by wanting to avoid any trust in a data custodian) it might introduce inefficiencies in the system as a whole.
 
  +
  +
A trusted third party needs to be identified, empowered and shielded from forces that do not adhere to the core of the purpose set forth. Once found, the general public will need to be convinced of those guarantees as well, a tough challenge in any situation.
   
 
== Open Topics ==
 
== Open Topics ==
   
  +
Do the benefits of a shared identifier, which enables many use cases for epidemiologists and other researchers and in turn policy makers, outweigh the inherent privacy concerns?
* How can the information be used to target test capacity (affected individuals should be tested according to the protocols)
 
  +
* What happens when a user gets a quarantine notification? Will they contact their GP? Will the GP contact the contact tracers? There is no way for the contact tracers to link the case to a known index case.
 
  +
Is there value in 2nd and higher degrees of contact mapping?
* The interaction between the Apple/Google initiative (Exposure Notification Framework) and DP-3T remains unclear on some aspects. The Google/Apple Framework solves the cross-operating-system interoperability issues, mainly addressing the limitations around BLE usage in the background on iOS. It is unclear however whether this can be used without adhering to the remainder of the Apple/Google solution, which DP-3T does not need.
 
  +
** A/G handle the security & encryption functionality
 
  +
Without any notion of location information, it is possible to use the available information be direct test capacity (affected individuals should be tested according to the protocols)
** A/G provide a framework to calculate risk scores for encounters with infected contacts (which DP-3T does not)
 
  +
** A/G have made the guarantee (and have the power to do it) that they will dismantle the system when the pandemic has been mitigated, calls will be made per country/district when this will be the case
 
  +
How well will the hybrid BLE approach for contact tracing work (especially compared to the Apple-Google protocol)?
* DP-3T states that they wish to adopt the Apple/Google Exposure Notification framework, however it is unclear if that would completely replace the DP-3T implementation as the only element that sets them apart from A/G is the availability of a back-end, which can also be implemented together with the A/G framework independent of the DP-3T specification.
 
  +
** DP-3T states that they want to use the wireprotocol set out by A/G, however our current understanding is that A/G will only allow app builders to use the high level framework (Mobile API) to make use of the exposure notification protocol, which would lock DP-3T out of reusing any underlying components for their solution.
 
  +
How can the trust in the third party be guaranteed and how can we give credible assurances to the users that there is no way their data would fall in the hands of institutions outside of the scope of the battle against the pandemic?
  +
  +
And even if such guarantees could be provided, in theory and in practice, creating that perception with the end-users is yet another challenge that needs to be tackled.
  +
  +
   
 
= Navigation =
 
= Navigation =
   
* [[Decentralized autonomous contact tracing using Bluetooth proximity|Next: Decentralized autonomous contact tracing using Bluetooth proximity]]
+
* [[Human contact tracing|Next: Human contact tracing]]
  +
* [[Centralised autonomous contact tracing using Bluetooth proximity|Previous: Centralised autonomous contact tracing using Bluetooth proximity]]
* [[List of solutions|Previous: List of solutions]]
 
 
* [[Overview|Back to overview]]
 
* [[Overview|Back to overview]]
   

Latest revision as of 12:25, 21 May 2020

Type of solution

Autonomous contact tracing (person-to-person proximity)

Examples

  • UK
  • Singapore
  • France
  • Australia


Main Characteristics

  • Exchanges temporary identifiers during encounters
  • Makes use of pseudonyms linked to a device or optionally a user
  • Centralized data storage of all observed encounter identifiers by trusted third party
  • Bluetooth proximity detection between devices equipped with an app that supports that same protocol
  • Out-of-band attribution of ‘infection confirmation’ code by a government approved healthcare instance

Outcome Coverage

Informing Citizens Transmission Tracing Supporting healthcare provisioning Informing Policy Making and monitoring effectiveness Optimising resource allocation Organising Quarantining Enabling Research
Possible Encounters No Possible Possible Interoperability possible Possible

Requirements coverage - effectiveness

Effectiveness Factor Assessment
Accuracy of information
  • Circumstances for false positives and false negatives in encounter detection have been described (see Solution Component - BlueTooth). The impact on the effectiveness is not quantified.
  • Bluetooth only is not enough to assess the criticality of the encounter. Were people face-to-face, wearing face masks, having physical contact, …?
  • Bluetooth as a distance indicator has limitations.
  • Calibration could definitely help with the accuracy of the BLE proximity estimations (but is no silver bullet)
  • See also: Solution Component - BlueTooth
  • A mechanism is foreseen to have health authorities issue the confirmation of an infection
  • Calibration could definitely help with the accuracy of the BLE proximity estimations (but is no silver bullet)
Speed of the process
  • After confirmation of infection, first degree contacts can immediately be informed
  • Possible to model (and inform) up to 5th degree contacts
  • The possibility to coordinate with other actions can further reduce the time between confirmation or suspicion of infection and affective isolation or quarantining.
Adaptability of the solution
  • The algorithm for deducing the criticality of the health exposure is central, hence easy to update.

Insights in transmission routes

  • Person-to-person, environmental
  • Presymptomatic
  • Asymptomatic
  • Only encounters are detected (no visits, no health status beyond infection status, no movements
  • Proximity tracking only covers person-to-person transmission. Environmental transmission is not covered.
  • Contacts up to the 5th degree can be detected.
  • There is not necessarily a filtering of the users being included in the contact graph (eg based on their risk profile)
  • Non-users are not included in the contact graph.
  • Presymptomatic and asymptomatic cases are covered.
Support of isolation and quarantining
  • Quarantining is triggered through a notification sent out by a trusted healthcare authority that links with other supporting instances
  • Individuals who are advised to quarantine by authorized healthcare instances can be supported socially and economically (e.g. proof of absence for their employer)
Targeted measures
  • The collected data can be used for creating insights that can lead to targeted measures

Efficient use of resources

  • Triage
  • Testing
  • Contact tracers
  • HCT can benefit from the data gathered via ACT and can alleviate their resources
Interoperability
  • With strict user consent, data can be made available for epidemiological research
  • Research and modeling is possible on aggregated and/or filtered data sets while the pandemic lasts
  • The use of a shared identifier enables many use cases
Acceptable side-effects
  • This cannot be stated in general. It is possible to implement this kind of solution with protection against unauthorised insight in the health status of the user through observation or coercion. But lack of attention for this aspect can be harmful.
  • Abuse of data is not impossible.
Adoption and population coverage
  • The adoption rate could be hampered by the inherent distrust of uncertainty that comes with having to trust a central instance with valuable information
Feasibility and elapsed time (Experience, Initial TTM, Scaling)
  • The Bluetooth technology was not designed with this type of application in mind. Shortcomings include energy consumption and limitations in the support in Android and iOS.
  • The improvements projected by Apple and Google for their Exposure Notification Framework is not available for apps with centralisation of data, so fallbacks are needed (see Solution Component - Bluetooth), none of which have proven to be satisfactory.
Technical dependability of the solution
  • If implemented with early centralisation of data (as opposed to uploading when an infection is confirmed) the working of the solution is not dependent on the availability of the user devices.
Evidence
  • Where this kind of solution has been used, uptake has been below expectations (e.g. Singapore) in number of downloads. It is not clear what the actual usage rate is.
  • It is unclear what impact the use of the solution had.


Requirements coverage - Privacy and Security

Privacy Factor Assessment

Minimal Requirements

  • GDPR compliance

Compliance is possible, but is case-specific. Debate possible about the proportionality of the data collection: data of all users are processed regardless of their being infected or potentially affected. One can argue that this comes with the benefit of reduction of the elapsed time between a potentially risky encounter and a warning.

Augmented Requirements

  • Adhere to the joint civil society statement: “States use of digital surveillance technologies to fight pandemic must respect human rights” (see Joint Civil Society Statement)
  • Solution is temporary
  • Purposes are limited to responding to the pandemic and phasing out the restrictive measures
  • Principle of least privilege
  • The way back to normality is known
  • Full Transparency (code, data, algorithms)
  • Granular user consent, regardless of the legal base
  • No mandatory use by citizens
  • No access to data except for public health authorities, subject to consent
  • Strictly limited retention period
  • No support for law and policy enforcement
  • No commercial exploitation
Alignment is possible, but is case-specific.

Zero-Trust model specific requirements

  • No trust must be expected from any party besides the developer
  • The solution must only transfer and centralise truly anonymous data
  • The anonymous nature of the data must be transparent and under scrutiny
  • The remaining surface attack must be secured
  • Transparency and scrutiny on the security measures
Not applicable

Trust-based specific requirements

  • Proper governance and oversight on the Trusted Party to strictly limit the processing to the stated purpose
  • Vetting of the personnel having access to the data
  • Applying the Principle of Least Privilege among the personnel of the data processor
  • Code of conduct for the personnel, actively enforced
  • Strict application of encryption in transit and at rest until the latest possible moment before processing
  • Reducing the attack surface to a minimum and securing it
  • Systematically distrusting any party not under direct control of the Trusted Party (like infrastructure providers)
  • Transparency and scrutiny on the security measures
  • Pseudonymisation without storage of re-personalisation data
  • Shortest possible retention period, preferably rolling
  • Applying data minimisation, limit the data centralised
Compliance is possible, but is case-specific.

Trade-off Analysis

Bluetooth only:

  • Avoids the privacy challenges linked to gathering location data
  • Limits the transmission routes to person-to-person only

Shared identifier and centralisation of data:

  • Allows linking to other data, allowing interoperability and efficient use of resources
  • Rules out the use of Apple/Google Exposure Notification Framework and foregoes the Bluetooth improvements
  • Requires more privacy and security safeguards in order to comply with the augmented requirements

Not being able to use the Apple/Google Exposure Notification Framework:

  • Forces suboptimal Bluetooth functioning and resulting battery drain, which in turn might lead to a poorer adoption rate. (see Solution Component - Bluetooth)

Discussion and open topics

Discussion, including ethical considerations

The interoperability and adaptability that is enabled by this solution increases its value towards the other parties essential to the effectiveness of the overall system (human contact tracers, healthcare providers, social security, analysts and researchers and in turn policy makers).

This increases the beneficence of the solution, possibly in proportion to the increased privacy footprint. This proportionality is subject to the compliance with the specific requirements for trust-based solutions, which is a high bar to meet and can only be assessed case by case.

A trusted third party needs to be identified, empowered and shielded from forces that do not adhere to the core of the purpose set forth. Once found, the general public will need to be convinced of those guarantees as well, a tough challenge in any situation.

Open Topics

Do the benefits of a shared identifier, which enables many use cases for epidemiologists and other researchers and in turn policy makers, outweigh the inherent privacy concerns?

Is there value in 2nd and higher degrees of contact mapping?

Without any notion of location information, it is possible to use the available information be direct test capacity (affected individuals should be tested according to the protocols)

How well will the hybrid BLE approach for contact tracing work (especially compared to the Apple-Google protocol)?

How can the trust in the third party be guaranteed and how can we give credible assurances to the users that there is no way their data would fall in the hands of institutions outside of the scope of the battle against the pandemic?

And even if such guarantees could be provided, in theory and in practice, creating that perception with the end-users is yet another challenge that needs to be tackled.


Navigation