Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Nope, You Haven’t Been Hacked By Google and Apple’s COVID-19 App

Nope, You Haven’t Been Hacked By Google and Apple’s COVID-19 App

Google and Apple have recently started an initiative with local governments to try and help prevent the increased spread of COVID-19. Basically, this app would notify people if there were positive COVID-19 test results in their area. While this does bring up some major privacy concerns, we wanted to discuss something else today: the prevalence of false warnings that have already been forced onto mobile devices. Let’s dig in.

There’s been a consistent pattern that has emerged with popular software applications: a major update or other change is made, and uproar on social media ensues.

Just look at what happened when the Android platform’s Facebook application began requesting access to the user’s smartphone camera several years ago now. While this was required so that Facebook’s newly released native photo-taking capabilities could be embraced, there was still a lot said about it on social media.

Don’t get us wrong—many of the changes made in technology can be concerning, especially where it involves a user’s privacy. However, there is usually a ton of misinformation muddying the waters. Again, we’re not saying that you can always trust giant tech companies and their data collection policies… quite the opposite, in fact. You’re right to feel concerned at times and should be exercising the control over their collection of your data that you have a right to.

Having said that, we couldn’t help but notice an extreme response to the news of Apple and Google’s new COVID-19 contact tracing application framework.

So, Did Google or Apple Install a COVID-19 Tracking App on My Phone?

Nope.

Neither Google or Apple added an application to your mobile device without your knowledge or consent. What Google and Apple did was collaborate to develop an application framework, which can now be used by app developers as they create COVID-19 tracking apps.

However, due to sensationalism on social media, a lot of people are concerned. Just look at this post that has been making the rounds on Facebook:

“**VERY IMPORTANT ALERT!***

A COVID-19 sensor has been secretly installed into every phone. Apparently, when everyone was having “phone disruption” over the weekend, they were adding COVID-19 Tracker [SIC] to our phones!

If you have an Android phone, go under settings, then look for google settings and you will find it installed there.

If you are using an iPhone, go under settings, privacy, then health. It is there but not yet functional.

The App can notify you if you’ve been near someone who has been reported having COVID-19.”

There’s a lot of misleading information to unpack here. First, neither Google nor Apple secretly installed a new “sensor” (especially since we’re talking about a software update, not a hardware update).

This software update was simply a setting to enable the COVID-19 Exposure Notification system that the two platforms are preparing. When this system has its official applications developed, users will not only have to install the application and activate it, but also confirm that they want to participate with Google or Apple.

So, this update simply provides a unified framework for local governments and the health industry to use as they create their COVID-19 applications, while offering users the choice of whether they want to participate.

So No, This is NOT a COVID-19 Tracking App

Seriously, unless you consciously selected the option to “Install,” your mobile device isn’t going to start tracking you and those close to you to identify anyone with COVID-19. In fact, if you follow that Facebook post’s instructions to your settings, you’ll see that you have to A: install a participating application or B: finish setting up a participating application before your notifications can even be activated.

In a rare joint statement from Apple and Google, they go on record to say, “What we’ve built is not an app—rather public agencies will incorporate the API into their own apps that people install.”

To clarify further, an API is an Application Programming Interface. Think of it as the foundation of an application. By teaming up, Apple and Google have laid the foundation for others to build their own applications upon.

As a bonus, this also makes it easier for people to opt out. Unfortunately, if too many people decide not to use the system, it may not be reliable enough to work at all.

What Do We Know About these Tracking Apps?

Well, the system itself is extremely new, so responsibility for the official applications will fall to state and local governments.

The platform that Google and Apple co-developed is built to be decentralized, which will help to make it more secure. Basically, when a user opts to use one of these apps, their phone is assigned a random ID and it is then shared with other phones within the range of a Bluetooth connection. Each phone then stores an anonymous roster of the other IDs it has been in proximity to.

So, when someone is diagnosed with COVID-19, they would then manually share that with the contact tracing app. Then, with their permission, all the IDs that their phone has stored over the prior two weeks would be uploaded and those users would be sent a notification of their potential exposure. Your location isn’t shared, nobody’s identity is shared, not even Google or Apple will get this information. In addition to all this, that random ID is changed every 10 to 20 minutes, and the apps are not allowed to use your location or to track it in the background.

As a result, these apps are safe to use with complete anonymity, and to avoid opting in, you just wouldn’t install any COVID-19 tracking apps, official or not.

Uninstalling the COVID-19 Exposure Notification

Okay, since we know that some will want to ask this question, we felt we needed to address it.

In short, you shouldn’t because it isn’t an app, it is an API. As such, it can’t just be uninstalled. It is now part of the Android and iOS operating systems and is pushed to devices through security updates.

If you were to do some Internet snooping, you could find some walkthroughs on the Internet that take you through how to roll back your phone and other such processes, but that only leaves your device exposed to other threats. Again, there is nothing to uninstall, and neglecting future security updates is a terrible idea.

The API is nothing to worry about. It is nothing more than a setting, and one that is deactivated by default. If you really are worried, both Apple and Google have confirmed that not installing, or uninstalling, a COVID-19 Exposure Notification app is enough to avoid participation.

And again, since we can’t stress this enough:

DO NOT FOLLOW ANY INSTRUCTIONS ONLINE THAT WALK YOU THROUGH ROLLING BACK YOUR PHONE AND OPTING OUT OF SECURITY UPDATES. 

If you are that serious about your privacy, it just doesn’t make sense to expose that privacy to greater risk.

In our professional opinion, understanding the technology used to create the COVID-19 Exposure Notification system, every effort has been made to ensure the security and anonymity of its users. Keep in mind, there are also healthcare regulations to comply with as well, and our clients will know how stringent they are where data privacy is concerned.

The decision whether or not to use the COVID-19 Exposure Notification system falls to you, but you can rest assured that both Google and Apple have done everything right to keep their system safe, private, and secure.

Please, to learn more about these technologies, don’t hesitate to give us a call.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 02 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Communication Business Continuity Smartphones IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Collaboration Productivity Quick Tips Cybersecurity Business Management Users Managed IT Services Upgrade Windows Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Saving Money Holiday Social Media Tech Term Chrome Gadgets Virtualization Automation Managed Service Managed IT Services Microsoft Office Facebook Cybercrime Operating System Artificial Intelligence Computers BYOD Mobile Device Management Networking IT Support Health Hacking Internet of Things Wi-Fi Covid-19 Information Technology Information Managed Service Provider Remote Spam Alert Office 365 Telephone Systems Bandwidth Recovery Employer-Employee Relationship Router Social Engineering BDR Mobility App Password History Data Breach Money Application Encryption Applications Human Resources Big Data Law Enforcement Remote Monitoring Mobile Computing Office Tips Blockchain Apps Training Paperless Office VPN How To Remote Computing Government Mobile Office Private Cloud Data Storage Patch Management Managed IT Work/Life Balance IT solutions Wireless Entertainment Website Budget Servers Gmail Settings Google Drive Data Security Infrastructure Two-factor Authentication Voice over Internet Protocol Avoiding Downtime Mouse HaaS Flexibility Vulnerability Marketing WiFi Bring Your Own Device Windows 7 Data Management Word Cleaning The Internet of Things USB Lithium-ion battery Employee/Employer Relationship Staff Software as a Service Vendor Management Telephone System End of Support RMM Machine Learning Education Physical Security Connectivity Remote Work Safety Firewall Sports HIPAA Redundancy Virtual Reality Keyboard Apple Social User Error Data Protection Meetings Save Time Conferencing Vendor Scam Managed Services Risk Management Display Hacker Printer Access Control IT Management Computing Infrastructure Bluetooth Going Green Processor DDoS Virtual Assistant Botnet Authentication IT Plan SharePoint Hard Drive Battery Shadow IT Unsupported Software IT Consultant Legal Update Charger Computing Customer Service Internet Exlporer Environment Compliance Humor OneNote Google Docs Computer Care Fax Server PDF Identity Theft Current Events Telephony Digital Signage Samsung SaaS Proactive IT Best Practice Augmented Reality Value Network Congestion YouTube Fraud Spam Blocking Electronic Medical Records eWaste Black Market Procurement Remote Worker Net Neutrality Workplace Strategy Hiring/Firing Cryptocurrency Help Desk Document Management Virus Printing Solid State Drive Wireless Technology How to Wearable Technology Downtime Unified Threat Management Computer Accessories Retail Hard Drives Comparison Managed Services Provider Instant Messaging Excel CES Data storage Robot Database Business Intelligence Automobile Biometrics Content Management Audit Worker Remote Workers Virtual Desktop Business Technology IT Assessment Printers Manufacturing Millennials Public Computer Email Best Practices Transportation Smart Office Regulations Wireless Charging Security Cameras Science Computer Fan Rootkit Computer Tips Reputation Managed IT Service Streaming Media Printer Server OneDrive Tech Support Virtual Private Network Biometric Security Workforce Content Virtual CIO Benefits Techology Peripheral Laptop Cables Workers FENG Digital Security Cameras Distributed Denial of Service Customers Using Data Customer Relationship Management Copiers Project Management 5G Analyitcs Nanotechnology Telecommuting IBM Audiobook Smart Technology Quick Tip Touchpad Programming Flash Cortana Smartwatch Digital Signature Ergonomics Advertising Development Warranty OLED Software Tips Supercomputer Politics Google Apps Emails PCI DSS Antivirus Virtual Machine HVAC Sync Notifications Employee Windows 8 Analysis 2FA Fiber Optics Messaging IT service Administrator Cabling Devices Netflix Two Factor Authentication Policy Hypervisor Enterprise Content Management MSP Tablet Accountants Root Cause Analysis Consultant Dark mode Relocation Trend Micro Music Analytics SMS Domains Microchip Default App Thought Leadership HBO Credit Cards Knowledge Password Manager Video Games Procedure Saving Time Password Management Skype Maintenance Google Search Data loss Multi-Factor Security Worker Commute Best Available dark theme IaaS Shopping Troubleshooting AI Search Engine IT Infrastructure Bloatware Twitter Outlook Leadership Experience WIndows 7 Business Mangement Scalability FinTech NIST Start Menu Bing Tablets Smart Tech Screen Mirroring Trending Loyalty Business Owner Social Network Books NarrowBand Investment Entrepreneur Addiction Frequently Asked Questions Amazon Recycling Windows 10s Search Employees Employee/Employer Relationships Mobile Shortcut Wiring ISP Practices Cast Windows 365 iPhone User Emergency PowerPoint Video Conferencing Windows Media Player ROI Cost Management Cache Tip of the week Amazon Web Services webinar Criminal Public Cloud Employer Employee Relationship Sales Bitcoin Social Networking Safe Mode Professional Services Shortcuts Personal GDPR Cryptomining Hosted Computing Assessment Point of Sale Files Managing Stress Supply Chain Management Chromecast Wireless Internet Windows Server 2008 Online Shopping Monitoring Running Cable Batteries File Sharing Tools Cameras Digitize Uninterrupted Power Supply Camera Memory Inventory Specifications Television Windows 8.1 Colocation Windows Server 2008 R2 Wire Evernote Travel Customer relationships Monitor

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code