Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nope, You Haven’t Been Hacked By Google and Apple’s COVID-19 App

Nope, You Haven’t Been Hacked By Google and Apple’s COVID-19 App

Google and Apple have recently started an initiative with local governments to try and help prevent the increased spread of COVID-19. Basically, this app would notify people if there were positive COVID-19 test results in their area. While this does bring up some major privacy concerns, we wanted to discuss something else today: the prevalence of false warnings that have already been forced onto mobile devices. Let’s dig in.

There’s been a consistent pattern that has emerged with popular software applications: a major update or other change is made, and uproar on social media ensues.

Just look at what happened when the Android platform’s Facebook application began requesting access to the user’s smartphone camera several years ago now. While this was required so that Facebook’s newly released native photo-taking capabilities could be embraced, there was still a lot said about it on social media.

Don’t get us wrong—many of the changes made in technology can be concerning, especially where it involves a user’s privacy. However, there is usually a ton of misinformation muddying the waters. Again, we’re not saying that you can always trust giant tech companies and their data collection policies… quite the opposite, in fact. You’re right to feel concerned at times and should be exercising the control over their collection of your data that you have a right to.

Having said that, we couldn’t help but notice an extreme response to the news of Apple and Google’s new COVID-19 contact tracing application framework.

So, Did Google or Apple Install a COVID-19 Tracking App on My Phone?

Nope.

Neither Google or Apple added an application to your mobile device without your knowledge or consent. What Google and Apple did was collaborate to develop an application framework, which can now be used by app developers as they create COVID-19 tracking apps.

However, due to sensationalism on social media, a lot of people are concerned. Just look at this post that has been making the rounds on Facebook:

“**VERY IMPORTANT ALERT!***

A COVID-19 sensor has been secretly installed into every phone. Apparently, when everyone was having “phone disruption” over the weekend, they were adding COVID-19 Tracker [SIC] to our phones!

If you have an Android phone, go under settings, then look for google settings and you will find it installed there.

If you are using an iPhone, go under settings, privacy, then health. It is there but not yet functional.

The App can notify you if you’ve been near someone who has been reported having COVID-19.”

There’s a lot of misleading information to unpack here. First, neither Google nor Apple secretly installed a new “sensor” (especially since we’re talking about a software update, not a hardware update).

This software update was simply a setting to enable the COVID-19 Exposure Notification system that the two platforms are preparing. When this system has its official applications developed, users will not only have to install the application and activate it, but also confirm that they want to participate with Google or Apple.

So, this update simply provides a unified framework for local governments and the health industry to use as they create their COVID-19 applications, while offering users the choice of whether they want to participate.

So No, This is NOT a COVID-19 Tracking App

Seriously, unless you consciously selected the option to “Install,” your mobile device isn’t going to start tracking you and those close to you to identify anyone with COVID-19. In fact, if you follow that Facebook post’s instructions to your settings, you’ll see that you have to A: install a participating application or B: finish setting up a participating application before your notifications can even be activated.

In a rare joint statement from Apple and Google, they go on record to say, “What we’ve built is not an app—rather public agencies will incorporate the API into their own apps that people install.”

To clarify further, an API is an Application Programming Interface. Think of it as the foundation of an application. By teaming up, Apple and Google have laid the foundation for others to build their own applications upon.

As a bonus, this also makes it easier for people to opt out. Unfortunately, if too many people decide not to use the system, it may not be reliable enough to work at all.

What Do We Know About these Tracking Apps?

Well, the system itself is extremely new, so responsibility for the official applications will fall to state and local governments.

The platform that Google and Apple co-developed is built to be decentralized, which will help to make it more secure. Basically, when a user opts to use one of these apps, their phone is assigned a random ID and it is then shared with other phones within the range of a Bluetooth connection. Each phone then stores an anonymous roster of the other IDs it has been in proximity to.

So, when someone is diagnosed with COVID-19, they would then manually share that with the contact tracing app. Then, with their permission, all the IDs that their phone has stored over the prior two weeks would be uploaded and those users would be sent a notification of their potential exposure. Your location isn’t shared, nobody’s identity is shared, not even Google or Apple will get this information. In addition to all this, that random ID is changed every 10 to 20 minutes, and the apps are not allowed to use your location or to track it in the background.

As a result, these apps are safe to use with complete anonymity, and to avoid opting in, you just wouldn’t install any COVID-19 tracking apps, official or not.

Uninstalling the COVID-19 Exposure Notification

Okay, since we know that some will want to ask this question, we felt we needed to address it.

In short, you shouldn’t because it isn’t an app, it is an API. As such, it can’t just be uninstalled. It is now part of the Android and iOS operating systems and is pushed to devices through security updates.

If you were to do some Internet snooping, you could find some walkthroughs on the Internet that take you through how to roll back your phone and other such processes, but that only leaves your device exposed to other threats. Again, there is nothing to uninstall, and neglecting future security updates is a terrible idea.

The API is nothing to worry about. It is nothing more than a setting, and one that is deactivated by default. If you really are worried, both Apple and Google have confirmed that not installing, or uninstalling, a COVID-19 Exposure Notification app is enough to avoid participation.

And again, since we can’t stress this enough:

DO NOT FOLLOW ANY INSTRUCTIONS ONLINE THAT WALK YOU THROUGH ROLLING BACK YOUR PHONE AND OPTING OUT OF SECURITY UPDATES. 

If you are that serious about your privacy, it just doesn’t make sense to expose that privacy to greater risk.

In our professional opinion, understanding the technology used to create the COVID-19 Exposure Notification system, every effort has been made to ensure the security and anonymity of its users. Keep in mind, there are also healthcare regulations to comply with as well, and our clients will know how stringent they are where data privacy is concerned.

The decision whether or not to use the COVID-19 Exposure Notification system falls to you, but you can rest assured that both Google and Apple have done everything right to keep their system safe, private, and secure.

Please, to learn more about these technologies, don’t hesitate to give us a call.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 24 January 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Quick Tips Cybersecurity Business Management Users Windows Upgrade Phishing Managed IT Services Data Backup Outsourced IT Ransomware Windows 10 Office Server Cloud Computing Save Money Data Recovery Windows 10 Passwords Virtualization Gadgets Tech Term Saving Money Holiday Chrome Social Media Managed Service Managed IT Services Automation Microsoft Office Cybercrime Computers Artificial Intelligence Operating System Facebook Internet of Things Health BYOD Wi-Fi Mobile Device Management Networking IT Support Hacking Alert Remote Spam Office 365 Covid-19 Telephone Systems Managed Service Provider Information Technology Information Recovery Employer-Employee Relationship BDR Bandwidth Social Engineering Mobility Router Law Enforcement Data Breach Human Resources Mobile Computing Application Remote Monitoring Password Money Encryption App History Applications Big Data Private Cloud Remote Computing Managed IT Mobile Office How To Apps Office Tips Training Blockchain Data Storage Patch Management Paperless Office Government VPN Flexibility Marketing Servers Infrastructure Two-factor Authentication Voice over Internet Protocol WiFi IT solutions Entertainment Website Mouse Budget HaaS Data Security Bring Your Own Device Data Management Work/Life Balance Google Drive Wireless Vulnerability Gmail Windows 7 Word Avoiding Downtime Settings Firewall Vendor Management Virtual Reality Save Time Apple Social USB Cleaning User Error Data Protection Vendor Meetings Managed Services Display End of Support Physical Security Risk Management Education Hacker Safety Employee/Employer Relationship HIPAA Sports Conferencing RMM The Internet of Things Redundancy Lithium-ion battery Telephone System Keyboard Staff Software as a Service Scam Machine Learning Connectivity Remote Work Botnet Digital Signage Computer Accessories Fax Server IT Plan Google Docs Identity Theft Document Management SaaS Solid State Drive Unsupported Software Wireless Technology Downtime Procurement How to Workplace Strategy Charger Net Neutrality Printer Augmented Reality Bluetooth Fraud Data storage Compliance Help Desk Network Congestion Automobile OneNote Computer Care Printing eWaste Remote Worker Current Events Telephony Cryptocurrency Computing Infrastructure Samsung Managed Services Provider Going Green IT Consultant Value Database Wearable Technology Humor Retail Hard Drives Comparison Spam Blocking Electronic Medical Records Remote Workers Battery Instant Messaging Robot CES Excel Shadow IT Processor Legal Biometrics Hiring/Firing Business Technology Virtual Desktop Content Management Internet Exlporer Hard Drive Access Control DDoS Virtual Assistant PDF Authentication Computing SharePoint Business Intelligence Proactive IT Audit Best Practice Worker Virus Customer Service IT Management Update YouTube Unified Threat Management Environment Black Market Google Apps Computer Fan Dark mode Rootkit Trend Micro Antivirus HVAC Business Owner Default App Analysis Windows 8 NarrowBand SMS Managing Stress Workers Procedure Benefits Saving Time Administrator IT service Devices Search iPhone FENG dark theme Shopping Google Search Cameras Enterprise Content Management IT Infrastructure MSP Accountants Tablet IBM AI FinTech Smart Technology Microchip Bing Domains Thought Leadership Flash Credit Cards Password Management Password Manager Files Social Network Investment IaaS Maintenance Software Tips Multi-Factor Security Chromecast Supercomputer Emails Employees Employee/Employer Relationships Search Engine Twitter Bloatware Sync NIST Business Mangement Colocation Windows 365 Uninterrupted Power Supply ISP Printer Server ROI Smart Tech Tablets Trending Video Conferencing Amazon Monitor Netflix Sales Two Factor Authentication Bitcoin Shortcuts Addiction Entrepreneur Recycling Root Cause Analysis Point of Sale Personal Cryptomining Music Wiring Shortcut Practices HBO Knowledge Supply Chain Management Amazon Web Services Reputation Monitoring Streaming Media Batteries Cache Cost Management Skype Safe Mode Content Social Networking Criminal Data loss Windows 8.1 Tech Support Digitize Troubleshooting Windows Server 2008 R2 GDPR Hosted Computing Techology Outlook Laptop Leadership Online Shopping Customers Customer relationships Wireless Internet Start Menu Running Cable File Sharing Audiobook Screen Mirroring Email Best Practices Loyalty IT Assessment Manufacturing Books Camera Inventory Memory Frequently Asked Questions Specifications Touchpad Mobile Evernote Windows 10s Computer Tips Managed IT Service Consultant Security Cameras Wire Analytics Politics Advertising Cast Virtual CIO Travel OneDrive Biometric Security webinar Peripheral Emergency Printers Tip of the week Millennials Professional Services Wireless Charging Public Cloud Digital Security Cameras Notifications Employer Employee Relationship Using Data Best Available Smart Office 5G Science Assessment Copiers WIndows 7 Quick Tip Virtual Private Network Windows Server 2008 Workforce Tools Cables Relocation Ergonomics Smartwatch OLED Distributed Denial of Service Customer Relationship Management Television Development PCI DSS Virtual Machine Project Management Nanotechnology Video Games Analyitcs Telecommuting Programming Cortana 2FA Fiber Optics Employee Worker Commute Cabling PowerPoint Experience Windows Media Player Digital Signature Public Computer Messaging User Policy Transportation Hypervisor Warranty Scalability Regulations

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code