Get Started Today!  (415) 295-4898

croom new

415 IT Blog

Google and Apple Pushed a COVID-19 Exposure Notification Setting to Your Phone. Here is Everything You Need to Know

Google and Apple Pushed a COVID-19 Exposure Notification Setting to Your Phone. Here is Everything You Need to Know

Many users are noticing or just starting to hear about Google and Apple’s initiative to work with local governments to provide an easy way to help users prevent getting infected with COVID-19. The idea is that, if a local or state government wanted to build an app for users that would tell them if people nearby have been tested positive for COVID-19, they would get a notification on their phone. 

This, of course, raises many questions and concerns about privacy, but a lot of people are being warned that this has been forced onto their phones already, and that just simply isn’t the case. Let’s take a look.

Every so often, an update or change to some major software that everyone uses causes a big stir on social media. For example, several years ago when the Facebook app on Android requested access to use your smartphone’s camera, some people on social media had a lot to say about it. As it turns out, Facebook lets you take pictures directly from the app, so of course you would need to give Facebook permission to your camera if you wanted to use it for that.

A lot of these shifts in technology and privacy are concerning, but they often get mixed in with a lot of misinformation. We’re not saying you shouldn’t be concerned over the giant tech companies and the data that they collect on you every day - you should, and typically do, have some control over what is gathered. The point is, we’re seeing a very similar reaction to Apple and Google’s recent COVID-19 contact tracing app framework.

Did Google or Apple Install a COVID-19 Tracking App on My Phone?

No. They didn’t. Not technically. Google and Apple worked together to build a framework that app developers can use for apps that track COVID-19 cases. They didn’t sneak a COVID-19 app onto your phone without your consent. 

Why are folks worried? A big part is due to social media sensationalism. We’ve seen some posts going around Facebook that read like this example:

**VERY IMPORTANT ALERT!***
A COVID-19 sensor has been secretly installed into every phone.
Apparently, when everyone was having “phone disruption” over the weekend, they were adding COVID-19 Tracker [SIC] to our phones!

If you have an Android phone, go under settings, then look for google settings and you will find it installed there.

If you are using an iPhone, go under settings, privacy, then health. It is there but not yet functional.

The App can notify you if you’ve been near someone who has been reported having COVID-19.

The post above is pretty misleading. There is no new “sensor” that Google or Apple secretly installed. Instead, during recent security updates, the two companies added a setting to enable the use of Google and Apple’s COVID-19 Exposure Notification system. This means that when official apps are developed, you not only need to install the app and set it up, but you also have to opt in to tell either Google or Apple that you want to participate.

This update is essentially two things - it gives local governments and the health industry in general the ability to use a secure, singular framework to build COVID-19 apps on, and it gives users the choice whether or not they want to opt in at all.

Just to Be Clear, This Isn’t a COVID-19 Tracking App

I can’t reiterate this enough, unless you installed something, your Android or iPhone isn’t just going to start tracking you and your friends and family to see if you have COVID-19. If you go into your settings as mentioned in the above Facebook post, you’ll see that you either need to install or finish setting up a participating app before the notifications can even be turned on. 

In a joint statement from Apple and Google (which doesn’t happen very often!), they state that “What we’ve built is not an app - rather public agencies will incorporate the API into their own apps that people install.”

To explain this, an API stands for Application Programming Interface. Basically, Google and Apple have laid some groundwork that these apps can use. It also makes it much easier for users to opt in and out.

Ironically, the system won’t work if users don’t adopt it - if half of all users decide they won’t use the COVID-19 notification system, the system might not be reliable enough to work for those that do use it.

What Do We Know About the COVID-19 Tracking Apps?

The system is still in its infancy, and it’s really up to state and local governments to deploy the official apps themselves. The platform that Google and Apple have built allow it to be decentralized and secure.

To put it simply, when you opt in and use one of these apps, a random ID is generated and exchanged between your phone and nearby phones within Bluetooth range. These random, anonymous IDs are stored on your phone. Basically, your phone keeps a tally of other phones it has been near.

If someone is diagnosed with COVID-19 and manually shares that information with one of the official contact tracing apps, all of the random IDs your phone has collected over the past 14 days are uploaded (with your permission) and the users of those IDs are notified that they may have been exposed. The system doesn’t track your location, or share other users’ identities within the app, or even with Google or Apple. On top of that, the random ID that your phone generates is changed every 10 to 20 minutes. According to Google, the apps are not allowed to use your phone’s location or track your location in the background.

In other words, it is safe, anonymous, and if you don’t want to opt in, you simply shouldn’t install any official (or unofficial) COVID-19 tracking apps.

How to Uninstall the Apple/Google COVID-19 Exposure Notification

Since this question is undoubtedly going to come up, we figured we’d answer it here. As mentioned, because this API isn’t actually an app, you can’t uninstall it. It’s built into Android and iOS’s operating systems and pushed through recent security updates.

There are walkthroughs on the Internet that will walk users through rolling back their phone or other risky procedures, but that only puts your phone at risk for other threats. There is nothing to uninstall, and rolling back your phone and preventing future security updates from ever getting installed is a very bad idea.

You don’t need to worry about the API being there. It’s just a setting, and by default, you are opted out. If you are worried about it, both Apple and Google state that by simply not installing a COVID-19 Exposure Notification app, or uninstalling one if you did install one, is all it takes to not participate.

DO NOT FOLLOW ANY INSTRUCTIONS ONLINE THAT WALK YOU THROUGH ROLLING BACK YOUR PHONE AND OPTING OUT OF SECURITY UPDATES. 

If you are that serious about your privacy, you are only putting your privacy and data at more risk.

After reading and understanding the technology behind the COVID-19 Exposure Notification system, it does sound like they are taking every step to make the system secure and anonymous. After all, it does need to comply with healthcare regulations, which many of our clients know are very strict when it comes to data privacy.

The decision to opt in or out of the COVID-19 Exposure Notification system is yours and yours alone, but Google and Apple appear to be doing all the right things to ensure that the system is safe and secure, without violating anyone’s privacy.

What’s the Benefit of Content Filtering?
How to Avoid the Influence of a Phishing Scam
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, September 21 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://web.415it.com/

Mobile? Grab this Article

QR Code

Tag Cloud

Security Tip of the Week Productivity Technology Best Practices Business Computing Data Data Backup IT Support Network Security Privacy Hosted Solutions Cloud IT Services Data Recovery Efficiency Internet Email Software Business Managed IT Services Malware Outsourced IT Innovation Small Business Tech Term Collaboration Cybersecurity Google Hackers Business Management Cloud Computing Upgrade Hardware Phishing User Tips Computer Windows 10 Microsoft Business Continuity Mobile Devices Managed Service Smartphone Mobile Device Workplace Tips VoIp Communication Android Quick Tips Disaster Recovery Managed Service Provider Ransomware Paperless Office Backup Smartphones Encryption Communications Covid-19 Remote Work Server Browser Data Management Office 365 Business Technology Saving Money BDR Remote Monitoring Managed IT Network Healthcare Social Media Internet of Things Compliance Holiday Passwords Wi-Fi Document Management Windows 7 Users Artificial Intelligence Vulnerability Blockchain Facebook Managed IT services Help Desk Chrome Miscellaneous Laptops Microsoft Office Government Data Security Save Money Applications Two-factor Authentication Health Virtualization Redundancy Scam Information Employer-Employee Relationship Processor Tip of the week Analytics Office Vendor Management Bandwidth Avoiding Downtime Automation Antivirus Project Management Maintenance Infrastructure VPN RMM Software as a Service Website Company Culture Proactive Meetings Mobility IoT Files Access Control Regulations Virtual Private Network Windows Hard Drive IT Management Gadgets Employee-Employer Relationship Storage Customer Relationship Management Router OneDrive Training BYOD Mobile Office Data Loss Machine Learning Apps Risk Management Alert Cooperation Time Management Co-Managed IT Money Net Neutrality Recycling Password Unified Threat Management Tablet Networking Monitoring Internet Exlporer Search Dark Web Augmented Reality Remote Worker Smart Technology File Management Financial Computing Remote Monitoring and Management Operating System Management Server Management Payment Cards Data Storage File Sharing Electronic Health Records Employees Information Technology Consulting Downtime Mobile Security Assessment Word Social Network Instant Messaging Flexibility Patch Management Data Breach Unified Communications Network Management Managed Services HIPAA Utility Computing Professional Services Bring Your Own Device Managed Services Provider Consultation Remote Workers The Internet of Things Gmail Backup and Disaster Recovery Touchscreen Manufacturing Hacking Vendor Tech Support Read Only Security Cameras Black Friday Virtual Assistant Bitcoin G Suite Techology Asset Tracking Holidays Batteries Smart Tech Point of Sale Outsource IT Tech Terms Mouse Language GDPR Mobile MSP Finance Technology Laws Outsourcing Wireless Internet Big Data Conferencing Remote Break Fix Transportation Heating/Cooling Active Directory Development IT Human Error Permissions Trending Smart Devices IT Technicians Cost Management Emergency Multi-Factor Security Peripheral Printing Cyber Monday Staff Wasting Time Current Events Motherboard Chromebook Outlook Disaster Resistance CIO applications Statistics Connectivity Printer E-Commerce Laptop Theft Computing Infrastructure Optimization Authentication Microsoft Excel Cookies Cables Unified Threat Management Video Conferencing Electronic Medical Records Employer/Employee Relationships Apple Migration eWaste Banking Servers Windows Server Proactive IT OneNote Business Telephone Permission Google Calendar Fraud Hard Disk Drives Sensors PCI DSS Database Vulnerabilities Shortcut Bluetooth Features Remote Working Alerts Notes Recovery Managing Stress Virtual Machines Authorization Nanotechnology Wires Biometric Travel Proactive Maintenance Solid State Drive Chatbots Lenovo Politics Virtual Reality User Management IT Consulting How To IT Assessment Test Solid State Drives Mirgation Samsung Private Cloud Firewall Voice over Internet Protocol Projects Mobile Computing Value of Managed Services Wearable Technology Star Wars SharePoint Budget Procurement Comparison Licensing PowerPoint Display Spam Enterprise Content Management WPA3 Credit Cards Websites App Mail Merge User Error Gamification Technology Tips Cybercrime Cyber security Identity Theft Enterprise Resource Planning Superfish Data Warehousing Teamwork Digitize Legislation Options Telephone Cache Bookmarks CRM ROI Distributed Denial of Service Return on Investment Geography Downloads Cyberattacks Social Specifications Social Networking Fleet Tracking Computers Zero-Day Threat Shared resources SaaS Going Green Screen Reader Address WiFi Mobile Device Management Digital Payment Hotspot Database Management Identity Windows Server 2008 Customer Service Operations Shadow IT Wireless 5G Mobile VoIP Remote Computing Favorites Content Filtering Managed IT Service Settings Personal Information Modem High-Speed Internet Printers Education Twitter CEO Students Marketing Daniel Stevens Regulation

Latest Blog

Did you know that, as of July 2020, 69 percent of global desktop Internet users utilized Google Chrome as their browser of choice? With such a large market share, the security associated with Google Chrome is important to keep in mind. To help increase some of this awareness...

Latest News

We are proud to announce that 415 IT and our CEO, Daniel Stevens, were recently featured by CIO Applications. We discussed how and why we serve our clients, as well as some sneak peeks for our future. Read our interview by visiting:  https:...