Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nope, You Haven’t Been Hacked By Google and Apple’s COVID-19 App

Nope, You Haven’t Been Hacked By Google and Apple’s COVID-19 App

Google and Apple have recently started an initiative with local governments to try and help prevent the increased spread of COVID-19. Basically, this app would notify people if there were positive COVID-19 test results in their area. While this does bring up some major privacy concerns, we wanted to discuss something else today: the prevalence of false warnings that have already been forced onto mobile devices. Let’s dig in.

There’s been a consistent pattern that has emerged with popular software applications: a major update or other change is made, and uproar on social media ensues.

Just look at what happened when the Android platform’s Facebook application began requesting access to the user’s smartphone camera several years ago now. While this was required so that Facebook’s newly released native photo-taking capabilities could be embraced, there was still a lot said about it on social media.

Don’t get us wrong—many of the changes made in technology can be concerning, especially where it involves a user’s privacy. However, there is usually a ton of misinformation muddying the waters. Again, we’re not saying that you can always trust giant tech companies and their data collection policies… quite the opposite, in fact. You’re right to feel concerned at times and should be exercising the control over their collection of your data that you have a right to.

Having said that, we couldn’t help but notice an extreme response to the news of Apple and Google’s new COVID-19 contact tracing application framework.

So, Did Google or Apple Install a COVID-19 Tracking App on My Phone?

Nope.

Neither Google or Apple added an application to your mobile device without your knowledge or consent. What Google and Apple did was collaborate to develop an application framework, which can now be used by app developers as they create COVID-19 tracking apps.

However, due to sensationalism on social media, a lot of people are concerned. Just look at this post that has been making the rounds on Facebook:

“**VERY IMPORTANT ALERT!***

A COVID-19 sensor has been secretly installed into every phone. Apparently, when everyone was having “phone disruption” over the weekend, they were adding COVID-19 Tracker [SIC] to our phones!

If you have an Android phone, go under settings, then look for google settings and you will find it installed there.

If you are using an iPhone, go under settings, privacy, then health. It is there but not yet functional.

The App can notify you if you’ve been near someone who has been reported having COVID-19.”

There’s a lot of misleading information to unpack here. First, neither Google nor Apple secretly installed a new “sensor” (especially since we’re talking about a software update, not a hardware update).

This software update was simply a setting to enable the COVID-19 Exposure Notification system that the two platforms are preparing. When this system has its official applications developed, users will not only have to install the application and activate it, but also confirm that they want to participate with Google or Apple.

So, this update simply provides a unified framework for local governments and the health industry to use as they create their COVID-19 applications, while offering users the choice of whether they want to participate.

So No, This is NOT a COVID-19 Tracking App

Seriously, unless you consciously selected the option to “Install,” your mobile device isn’t going to start tracking you and those close to you to identify anyone with COVID-19. In fact, if you follow that Facebook post’s instructions to your settings, you’ll see that you have to A: install a participating application or B: finish setting up a participating application before your notifications can even be activated.

In a rare joint statement from Apple and Google, they go on record to say, “What we’ve built is not an app—rather public agencies will incorporate the API into their own apps that people install.”

To clarify further, an API is an Application Programming Interface. Think of it as the foundation of an application. By teaming up, Apple and Google have laid the foundation for others to build their own applications upon.

As a bonus, this also makes it easier for people to opt out. Unfortunately, if too many people decide not to use the system, it may not be reliable enough to work at all.

What Do We Know About these Tracking Apps?

Well, the system itself is extremely new, so responsibility for the official applications will fall to state and local governments.

The platform that Google and Apple co-developed is built to be decentralized, which will help to make it more secure. Basically, when a user opts to use one of these apps, their phone is assigned a random ID and it is then shared with other phones within the range of a Bluetooth connection. Each phone then stores an anonymous roster of the other IDs it has been in proximity to.

So, when someone is diagnosed with COVID-19, they would then manually share that with the contact tracing app. Then, with their permission, all the IDs that their phone has stored over the prior two weeks would be uploaded and those users would be sent a notification of their potential exposure. Your location isn’t shared, nobody’s identity is shared, not even Google or Apple will get this information. In addition to all this, that random ID is changed every 10 to 20 minutes, and the apps are not allowed to use your location or to track it in the background.

As a result, these apps are safe to use with complete anonymity, and to avoid opting in, you just wouldn’t install any COVID-19 tracking apps, official or not.

Uninstalling the COVID-19 Exposure Notification

Okay, since we know that some will want to ask this question, we felt we needed to address it.

In short, you shouldn’t because it isn’t an app, it is an API. As such, it can’t just be uninstalled. It is now part of the Android and iOS operating systems and is pushed to devices through security updates.

If you were to do some Internet snooping, you could find some walkthroughs on the Internet that take you through how to roll back your phone and other such processes, but that only leaves your device exposed to other threats. Again, there is nothing to uninstall, and neglecting future security updates is a terrible idea.

The API is nothing to worry about. It is nothing more than a setting, and one that is deactivated by default. If you really are worried, both Apple and Google have confirmed that not installing, or uninstalling, a COVID-19 Exposure Notification app is enough to avoid participation.

And again, since we can’t stress this enough:

DO NOT FOLLOW ANY INSTRUCTIONS ONLINE THAT WALK YOU THROUGH ROLLING BACK YOUR PHONE AND OPTING OUT OF SECURITY UPDATES. 

If you are that serious about your privacy, it just doesn’t make sense to expose that privacy to greater risk.

In our professional opinion, understanding the technology used to create the COVID-19 Exposure Notification system, every effort has been made to ensure the security and anonymity of its users. Keep in mind, there are also healthcare regulations to comply with as well, and our clients will know how stringent they are where data privacy is concerned.

The decision whether or not to use the COVID-19 Exposure Notification system falls to you, but you can rest assured that both Google and Apple have done everything right to keep their system safe, private, and secure.

Please, to learn more about these technologies, don’t hesitate to give us a call.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Internet Microsoft Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications IT Support Smartphones Communication Business Continuity Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Windows Phishing Ransomware Data Backup Outsourced IT Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Chrome Tech Term Virtualization Gadgets Social Media Saving Money Holiday Microsoft Office Managed IT Services Automation Managed Service Computers Facebook Artificial Intelligence Cybercrime Operating System Hacking Internet of Things Wi-Fi BYOD Mobile Device Management Health Networking IT Support Spam Covid-19 Office 365 Telephone Systems Alert Information Technology Remote Information Managed Service Provider Mobility BDR Recovery Bandwidth Employer-Employee Relationship Router Social Engineering Remote Monitoring Law Enforcement App Mobile Computing History Data Breach Password Application Money Human Resources Encryption Applications Big Data Government Data Storage Patch Management Private Cloud Office Tips Managed IT Training VPN Apps Blockchain Paperless Office How To Remote Computing Mobile Office Voice over Internet Protocol Avoiding Downtime Vulnerability Flexibility Windows 7 Word Marketing WiFi Wireless IT solutions Servers Entertainment Bring Your Own Device Website Budget Data Management Work/Life Balance Gmail Settings Data Security Two-factor Authentication Google Drive Mouse HaaS Infrastructure Vendor User Error Managed Services Meetings Display Conferencing Scam Risk Management Employee/Employer Relationship Hacker Data Protection Save Time RMM The Internet of Things Vendor Management Lithium-ion battery USB Cleaning Firewall End of Support Software as a Service Telephone System Staff Physical Security Education Machine Learning Virtual Reality Apple Safety Connectivity Remote Work HIPAA Sports Social Redundancy Keyboard Database Best Practice YouTube Virus Wearable Technology Augmented Reality Remote Workers Black Market Retail Hard Drives Fraud Unified Threat Management Business Intelligence Processor Instant Messaging Excel Computer Accessories Remote Worker Robot Document Management Audit Worker IT Management Cryptocurrency Solid State Drive Hard Drive Biometrics Wireless Technology Downtime How to Virtual Desktop Botnet IT Plan Data storage Comparison Printer DDoS Computing Automobile Bluetooth SharePoint Unsupported Software CES Computing Infrastructure Charger Business Technology Content Management Going Green Digital Signage Compliance Customer Service Access Control OneNote IT Consultant Environment Computer Care Virtual Assistant Current Events Authentication Telephony Battery Fax Server Samsung Shadow IT Humor Legal Procurement Net Neutrality Workplace Strategy SaaS Value Internet Exlporer Update Help Desk Printing Spam Blocking Electronic Medical Records Network Congestion PDF Google Docs eWaste Hiring/Firing Identity Theft Managed Services Provider Proactive IT Emergency Monitoring Tip of the week MSP Video Games Batteries webinar Accountants Digitize Shortcut Public Cloud Thought Leadership Employer Employee Relationship Credit Cards Windows 8.1 Professional Services Microchip Worker Commute Experience Password Management Windows Server 2008 R2 Cost Management Assessment Password Manager Multi-Factor Security Customer relationships Windows Server 2008 Scalability Social Networking Business Owner IT Assessment Twitter User Manufacturing PowerPoint Windows Media Player Email Best Practices Tools Search Engine NIST Television Business Mangement NarrowBand Security Cameras Trending Computer Tips Running Cable Search Managed IT Service Smart Tech OneDrive Addiction iPhone Managing Stress Biometric Security Memory Amazon Virtual CIO Peripheral Public Computer Recycling Transportation Cameras Digital Security Cameras Regulations Wiring Using Data Practices Copiers Computer Fan Cache Files 5G Rootkit Amazon Web Services Quick Tip Safe Mode Criminal Chromecast Smartwatch Science Benefits Ergonomics GDPR Workers Hosted Computing Development FENG Wireless Internet Colocation OLED Online Shopping Uninterrupted Power Supply PCI DSS File Sharing Virtual Machine IBM Monitor Employee Smart Technology Specifications Printer Server 2FA Distributed Denial of Service Flash Camera Fiber Optics Customer Relationship Management Inventory Messaging Wire Cabling Analyitcs Evernote Policy Software Tips Hypervisor Programming Supercomputer Travel Reputation Millennials Streaming Media Dark mode Sync Printers Trend Micro Emails Content SMS Smart Office Default App Wireless Charging Tech Support Procedure Antivirus Techology Saving Time Laptop Netflix Customers Google Search Windows 8 Two Factor Authentication Workforce dark theme Virtual Private Network Shopping Audiobook AI IT service Root Cause Analysis IT Infrastructure Cables Music FinTech HBO Knowledge Touchpad Bing Nanotechnology Tablet Telecommuting Skype Project Management Social Network Politics Domains Data loss Advertising Investment Cortana Troubleshooting Employees Outlook Employee/Employer Relationships Leadership Digital Signature Consultant Maintenance ISP Notifications Analytics Windows 365 IaaS Start Menu Warranty Video Conferencing Screen Mirroring HVAC ROI Bloatware Loyalty Google Apps Shortcuts Books Sales Frequently Asked Questions Bitcoin Analysis Best Available Personal Windows 10s Devices Relocation WIndows 7 Cryptomining Tablets Point of Sale Mobile Administrator Supply Chain Management Cast Enterprise Content Management Entrepreneur

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code