{"id":34397,"date":"2020-04-14T15:55:00","date_gmt":"2020-04-14T15:55:00","guid":{"rendered":"http:\/\/b284d6b3-0f18-4a29-a454-fe6e2c6cc79c"},"modified":"2020-04-14T15:55:00","modified_gmt":"2020-04-14T15:55:00","slug":"coronavirus-contact-tracing-apps-what-are-the-privacy-concerns","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/","title":{"rendered":"Coronavirus contact tracing apps: What are the privacy concerns?"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2019\/04\/04\/e9651428-9856-47d6-a908-f573952951d6\/thumbnail\/770x578\/94f57f8ead88a55314a959d702d0f4a1\/istock-1040307986.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>As the challenge of containing the coronavirus outbreak continues, governments around the world are looking to technology and smartphone apps to help trace the spread of the pandemic, in an effort to reduce the number of people who fall ill with COVID-19.<\/p>\n<p>But while the efforts may be a key tool for governments because they could potentially slow coronavirus outbreaks, there are also concerns that gathering information about people&#8217;s geo-location and other personal data to aid management of the pandemic risks infringes on our individual privacy more than ever before.<\/p>\n<p>There are a number of technologies in development which may help track the virus. For example Apple and Google recently <a href=\"https:\/\/www.zdnet.com\/article\/apple-google-team-up-to-develop-covid-19-contact-tracing-technology\/\">revealed a joint initiative to develop contact tracing technology<\/a> for government health agencies. Using Bluetooth, contact tracing applications are designed to identify potential COVID-19 hotspots \u2013 and alert people if they&#8217;ve been in close contact with someone known to be displaying coronavirus symptoms. The idea is that if people know they might have the virus, they&#8217;ll take the appropriate action and isolate before potentially spreading it to others.<\/p>\n<p>The UK government has also confirmed that the National Health Service is working technology firms to develop a voluntary contract-tracing app to help control the spread of coronavirus.<\/p>\n<p>&#8220;If you become unwell with the symptoms of coronavirus, you can securely tell this new NHS app,&#8221; said Matt Hancock, secretary of state for health and social care, speaking at Number 10&#8217;s daily coronavirus press conference, &#8220;and the app will then send an alert anonymously to other app users that you&#8217;ve been in significant contact with over the past few days, even before you had symptoms, so that they know and can act accordingly,&#8221; he added.<\/p>\n<p>Hancock explained that all data involved would only be used for NHS care and research and would be &#8220;handled according to the highest ethical and security standards&#8221; &#8211; and not held any longer than required.<\/p>\n<p>However, security experts and privacy campaigners have voiced concerns about the use of contact tracing as a means of controlling the outbreak.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>&#8220;Personally I feel conflicted. I recognise the overwhelming force of the public-health arguments for a centralised system, but I also have 25 years&#8217; experience of the NHS being incompetent at developing systems and repeatedly breaking their privacy promises when they do manage to collect some data of value to somebody else,&#8221; Professor Ross Anderson, professor of security engineering at the University of Cambridge <a href=\"https:\/\/www.lightbluetouchpaper.org\/2020\/04\/12\/contact-tracing-in-the-real-world\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">wrote in a blog post<\/a>.<\/p>\n<p><strong>SEE:&nbsp;<a href=\"https:\/\/www.zdnet.com\/topic\/sensord-enterprise-iot-ml-and-big-data\/\">Sensor&#8217;d enterprise: IoT, ML, and big data<\/a>&nbsp;(ZDNet special report) |&nbsp;<a href=\"https:\/\/www.techrepublic.com\/resource-library\/whitepapers\/special-report-iot-and-the-sensor-d-enterprise-free-pdf\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Download the report as a PDF<\/a>&nbsp;(TechRepublic)<\/strong><\/p>\n<p>&#8220;This is why I&#8217;m really uneasy about collecting lots of lightly-anonymised data in a system that becomes integrated into a whole-of-government response to the pandemic. We might never get rid of it,&#8221; he said.<\/p>\n<p>One potential problem here is that even if data is anonymised, it&#8217;s not impossible to analyse the information and trace it back to an individual.<\/p>\n<p>Not only could this reveal if someone has suffered from the virus \u2013 potentially something they wouldn&#8217;t want to share with the outside world \u2013 but location tracking could detail of where people go, how long for and who they interact with in a way which could be considered active surveillance.<\/p>\n<p>&#8220;We are looking at technology that needs to be able to track your exact geographic location and the individuals you interact with in real time. This is significantly intrudes into people&#8217;s fundamental human right to a private life that is not monitored or controlled by the state,&#8221; said Camilla Winlo, director of data protection and privacy consultancy DQM GRC.<\/p>\n<p>&#8220;There is always a need to balance a state&#8217;s duty to protect its citizens with its duty to protect other freedoms, such as freedom of association, freedom of speech and the right to a private life \u2013 and tools that normalise intrusion into these areas change that balance,&#8221; she added.<\/p>\n<p>There are also concerns that intrusion could become normal; especially if the crisis goes on for a longer period of time and people become used to being monitored. That could potentially mean that some governments could be reluctant to give up the powers they&#8217;re currently acquiring.<\/p>\n<p>&#8220;While the public health value of looser privacy restrictions is clearly apparent, so are the risks,&#8221; said Logan Finucan, senior manager of data and trust at Access Partnership, a global public policy firm specialising in technology.<\/p>\n<p>&#8220;Once provided with extraordinary access, governments don&#8217;t often want to give up new tools and authorities, creating the possibility for a new normal.&nbsp; Over time, there is a potential risk that law enforcement or surveillance authorities will seek to tap into such fonts of information.&#8221;<\/p>\n<p><strong>SEE:&nbsp;<a href=\"https:\/\/www.zdnet.com\/topic\/coronavirus-business-and-technology-in-a-pandemic#link=%7B%22linkText%22:%22%3Cstrong%3ECoronavirus:%20Business%20and%20technology%20in%20a%20pandemic%3C\/strong%3E%22,%22target%22:%22%22,%22href%22:%22https:\/\/www.zdnet.com\/topic\/coronavirus-business-and-technology-in-a-pandemic%22,%22role%22:%22standard%22,%22absolute%22:%22%22%7D\">Coronavirus: Business and technology in a pandemic<\/a><\/strong><\/p>\n<p>Currently, the UK government&#8217;s idea of using an app to monitor contact tracing is voluntary and while it could help those who use it to stay safe, it does create potential problems \u2013 particularly the app doesn&#8217;t contain security measures to prevent it being abused. There&#8217;s no obvious way to stop if being misused by pranksters or by those wishing to create fear by pretending to have the virus when they don&#8217;t.&nbsp;<\/p>\n<p>Then there&#8217;s also the potential for the technology companies which are helping to develop the applications not being fully transparent on how they&#8217;re collecting and using data: trust in big tech companies is not exactly high.<\/p>\n<p>However, with the use of technology, applications and surveillance currently in the limelight because of coronavirus, there&#8217;s the potential benefit \u2013 outside of halting coronavirus \u2013 to have a true debate over privacy verses convenience.<\/p>\n<p>&#8220;It&#8217;s extremely promising to see so much discussion around privacy and the amount of thought given to the impacts of Privacy by Design. This has been a unique opportunity for organisations to clearly see and experience the extra work involved in using technology that doesn&#8217;t have privacy enabled by default,&#8221; said Winlo.<\/p>\n<p>&#8220;It&#8217;s an opportunity for more people to see the advantages of technology and the potential it offers. But the risks it brings are also very real, and it could take months before we realise where they crystallised and who was affected by them,&#8221; she added.<\/p>\n<p><strong>READ MORE ON CYBERSECURITY<\/strong><\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Special smartphone apps could help to reduce the spread of COVID-19, but such moves could also have profound implications for individual privacy in the long term.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34398,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-34397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coronavirus contact tracing apps: What are the privacy concerns? 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coronavirus contact tracing apps: What are the privacy concerns? 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-14T15:55:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Coronavirus contact tracing apps: What are the privacy concerns?\",\"datePublished\":\"2020-04-14T15:55:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/\"},\"wordCount\":1056,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/\",\"name\":\"Coronavirus contact tracing apps: What are the privacy concerns? 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg\",\"datePublished\":\"2020-04-14T15:55:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Coronavirus contact tracing apps: What are the privacy concerns?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coronavirus contact tracing apps: What are the privacy concerns? 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/","og_locale":"en_US","og_type":"article","og_title":"Coronavirus contact tracing apps: What are the privacy concerns? 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-14T15:55:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Coronavirus contact tracing apps: What are the privacy concerns?","datePublished":"2020-04-14T15:55:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/"},"wordCount":1056,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/","url":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/","name":"Coronavirus contact tracing apps: What are the privacy concerns? 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg","datePublished":"2020-04-14T15:55:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/coronavirus-contact-tracing-apps-what-are-the-privacy-concerns\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Coronavirus contact tracing apps: What are the privacy concerns?"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34397"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34398"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}