{"id":34576,"date":"2020-04-23T06:30:00","date_gmt":"2020-04-23T06:30:00","guid":{"rendered":"http:\/\/9cfb0bf3-5abc-4db4-9605-09ac802ed48d"},"modified":"2020-04-23T06:30:00","modified_gmt":"2020-04-23T06:30:00","slug":"questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/","title":{"rendered":"Questions that still need to be asked as governments tap tech to contain coronavirus"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/r\/2020\/02\/26\/4789c612-1629-4729-8328-3865532a8dc9\/thumbnail\/770x578\/c41cf0ade842b4effda1f0bddae3c98a\/coronavirus.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>If you want more security, you&#8217;ll have to lose some privacy. That&#8217;s the oft-cited tradeoff that has become more apparent amidst the COVID-19 pandemic, as more governments worldwide turn to contact tracing apps and other movement monitoring technologies to aid efforts in containing the virus.&nbsp;<\/p>\n<p>Most in this region have accepted there has to be some compromise on their personal privacy in return for the wellbeing of the wider population. It&#8217;s about c<em>ommunity before self<\/em> and this common belief has largely enabled governments such as those in Singapore, Taiwan, and South Korea to implement movement monitoring policies, amongst others such as <a href=\"https:\/\/www.straitstimes.com\/singapore\/coronavirus-nparks-enlists-drones-to-monitor-crowds-at-bukit-timah-nature-reserve\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">drones<\/a>, with little protest.&nbsp;<\/p>\n<p>That&#8217;s not to say there hasn&#8217;t been any grumblings and murmurs about whether the government as taken the pandemic opportunity to step up its surveillance, even here in Singapore where its citizens have been commonly described as obedient and submissive.<\/p>\n<p>Over the past few years, fuelled by an increased in terrorism activities in the region, CCTVs began popping up over the past few years at train stations, apartment blocks, and other public spaces across Singapore. While some amongst my friends appreciated the added sense of security the heightened surveillance was presumed to offer, others lamented the loss of privacy.<\/p>\n<p>Therein lies the struggle, again, to balance security and privacy. But these are unprecedented times, some may argue, and that means we need to let go of some our concerns. Even Singapore&#8217;s Prime Minister Lee Hsien Loong suggested that much.<\/p>\n<p>In a televised address Tuesday evening when he announced an extension and tightening of the country&#8217;s social-distancing measures,&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=lhr9RsUTUE0\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Lee said<\/a>&nbsp;the use of ICT was critical in facilitating more efficient contact tracing. The <a href=\"https:\/\/www.zdnet.com\/article\/singapore-introduces-contact-tracing-app-to-slow-coronavirus-spread\/\" target=\"_blank\" rel=\"noopener noreferrer\">government&#8217;s TraceTogether app<\/a> was designed specifically for this purpose and that more apps currently were in development to further aid such efforts, he noted, but did not provide details on what these might be.&nbsp;<\/p>\n<p>&#8220;For these apps to work, we need everyone&#8217;s cooperation to install and use them like what the South Koreans have done,&#8221; he said. &#8220;There will be some privacy concerns, but we will have to weigh these against the benefits of being able to exit from the circuit breaker and stay open, safely. We are making progress but we have not yet succeeded, by a long way.&#8221;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>Singapore had rolled out stricter measures that forced non-essential businesses to shut or have all of their employees work from home, while food and beverage operators to provide only takeaway or delivery options. This &#8220;circuit breaker&#8221; period, originally scheduled to end on May 4, was extended to June 1 and with more stringent measures in place including the shutting of more retail services previously allowed to operate, such as standalone dessert and beverages outlets, hair salons, and pet stores.&nbsp;<\/p>\n<p>This move followed a sharp spike in infected COVID-19 cases over the past couple of weeks, pushing the local number past 10,100, with migrant workers living in dormitories accounting for the majority of recent infections. The death toll currently stands at 12.<\/p>\n<h3>Not just a question of privacy<\/h3>\n<p>However, getting people to download TraceTogether or any contact-tracing apps isn&#8217;t simply a question of privacy. There are cybersecurity issues to address as well.&nbsp;<\/p>\n<p>Because <a href=\"https:\/\/www.zdnet.com\/article\/how-apple-and-google-coronavirus-contact-tracing-will-work\/\" target=\"_blank\" rel=\"noopener noreferrer\">these apps<\/a>, including TraceTogether, use Bluetooth signals to detect others in close proximity, it may leave the smartphone vulnerable to threats such as <a href=\"https:\/\/www.zdnet.com\/article\/bluesnarfing-tools-spreading-quickly-3039146427\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bluesnarfing attacks<\/a>. Just in February, <a href=\"https:\/\/www.zdnet.com\/article\/google-fixes-no-user-interaction-bug-in-androids-bluetooth-component\/\" target=\"_blank\" rel=\"noopener noreferrer\">Google released a patch<\/a> to plug a critical security flaw in Android&#8217;s Bluetooth component that, if left unfixed, could be exploited without any user interaction and used to create self-spreading Bluetooth worms.<\/p>\n<p>More alarmingly, a proposed mobile app to help the Netherlands track COVID-19 already was found to have&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/proposed-government-coronavirus-app-falls-at-the-first-hurdle-due-to-data-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">leaked user data<\/a> earlier this week. The shortlisted mobile app&#8217;s source code was published and analysed by developers who uncovered user data&#8211;originating from another app&#8211;in the source files, including full names, email addresses, and hashed user passwords.<\/p>\n<p>To its credit, Singapore&#8217;s government agency behind TraceTogether has made significant efforts to&#8211;presumably&#8211;ease privacy concerns about the app. GovTech published a host of information including its <a href=\"https:\/\/www.tech.gov.sg\/media\/technews\/tracetogether-behind-the-scenes-look-at-its-development-process\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">development work<\/a>, technical details about the contact-tracing app and its <a href=\"https:\/\/www.tech.gov.sg\/media\/technews\/six-things-about-opentrace\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">source codes, which have been made available online<\/a>. It also addressed potential <a href=\"https:\/\/www.tech.gov.sg\/media\/technews\/geeky-myth-busting-facts-you-need-to-know-about-tracetogether\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">misconceptions about the purpose of the app<\/a>, stressing that TraceTogether would not collect any location data and the government would not be able to locate the user&#8217;s whereabouts with the app.<\/p>\n<p>To date, more than 1 million&#8211;or one in five&#8211;residents in Singapore have downloaded the app, according to GovTech.&nbsp;<\/p>\n<p>But while the government agency clearly has tried to address any concerns about privacy, there still are questions that need to be addressed.&nbsp;<\/p>\n<p>For one, GovTech said the <a href=\"https:\/\/www.tech.gov.sg\/media\/technews\/six-things-about-opentrace\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">TraceTogether was developed &#8220;in an eight-week sprint&#8221;<\/a>. How much time within this two-month period was dedicated to testing, specifically, for potential vulnerabilities? While years old, do existing Bluesnarfing and Bluejacking tools still have the ability the exploit the Bluetooth component in mobile phones?<\/p>\n<p>There also are issues related to data management and audits that should be looked at. For instance, what is the recourse for users who suffered a breach after hackers exploited the Bluetooth function, which was turned on to enable the TraceTogether app?<\/p>\n<p>Also, does the data fall under Singapore&#8217;s Personal Data Protection Act or is it excluded since the public sector does not fall under the purview of the legislation? If it is the latter, what does it mean in terms of data management and privacy since the details of the public sector&#8217;s own data protection guidelines have never been made public?&nbsp;<\/p>\n<p>For instance, what happens to all the user data after it has been used to aid in contact tracing efforts? Is there an audit trail to ensure the data is removed completely after it is no longer needed?<\/p>\n<p>In its <a href=\"https:\/\/www.tracetogether.gov.sg\/common\/privacystatement\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">privacy statement<\/a>, GovTech notes that users will be prompted to disable TraceTogether&#8217;s functionality, but makes no mention of whether the Health Ministry&#8211;which will have access to the users&#8217; data&#8211;will permanently delete the information once it is used for contact tracing purposes.&nbsp;<\/p>\n<p>The privacy statement, though, does offer an email address that users can refer to should they wish to revoke consent for the Health Ministry to use their TraceTogether data. Following which, the user&#8217;s mobile number and device User ID will be removed from the ministry&#8217;s server.&nbsp;<\/p>\n<p>Singapore&#8217;s public sector in recent years has had a <a href=\"https:\/\/www.zdnet.com\/article\/singapore-government-pledges-to-improve-data-security-with-new-measures\/\" target=\"_blank\" rel=\"noopener noreferrer\">less-than-stellar track record in cybersecurity<\/a>, so it will need to invest more effort in assuring public trust and confidence in its ICT initiatives.&nbsp;<\/p>\n<p>There are proponents who say the emphasis should be on educating users to take steps to safeguard their own cyber wellbeing and hygiene. Sure, self-awareness and user education are just as important in any cybersecurity strategy, but app developers and tech vendors have just an important role to play in ensuring their products are safe for use, right off the shelf.&nbsp;<\/p>\n<p>The recent Zoom security debacle, for instance, had prompted some to argue that the security features already were there and the onus was on the users to know how to enable them. While that may be true, with so many instances of security breaches including in <a href=\"https:\/\/www.zdnet.com\/article\/singapore-allows-schools-to-resume-zoom-use-for-home-based-learning\/\" target=\"_blank\" rel=\"noopener noreferrer\">Singapore<\/a> and Zoom stepping up to <a href=\"https:\/\/www.zdnet.com\/article\/zoom-were-freezing-all-new-features-to-sort-out-security-and-privacy\/\" target=\"_blank\" rel=\"noopener noreferrer\">acknowledge it fell short<\/a>, this episode demonstrates the need for critical security features to be automated or configured such that users are prompted to enable the settings before they are able to proceed to access the function.<\/p>\n<p>it&#8217;s about security by design and automated controls so it takes the guesswork out of the user&#8217;s hands, especially if it involves critical cybersecurity components, and mitigates the <a href=\"https:\/\/www.zdnet.com\/article\/singapore-government-must-realise-human-error-also-a-security-breach\/\" target=\"_blank\" rel=\"noopener noreferrer\">risk of human error<\/a>.&nbsp;<\/p>\n<p>That may mean contact-tracing apps such as TraceTogether should come coupled with security features that can detect attempts to breach a smartphone via the Bluetooth function.&nbsp;<\/p>\n<p>Such efforts will go a longer way in easing security and privacy concerns about the use of these apps.&nbsp;<\/p>\n<h3>RELATED COVERAGE<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some compromise in personal privacy has been deemed necessary in countries such as Singapore, Taiwan, and South Korea that have turned to technology to aid in contact tracing and movement monitoring, but there are questions citizens should still ask to protect their cyber wellbeing.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34577,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-34576","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Questions that still need to be asked as governments tap tech to contain coronavirus 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Questions that still need to be asked as governments tap tech to contain coronavirus 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-23T06:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Questions that still need to be asked as governments tap tech to contain coronavirus\",\"datePublished\":\"2020-04-23T06:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/\"},\"wordCount\":1353,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/\",\"name\":\"Questions that still need to be asked as governments tap tech to contain coronavirus 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg\",\"datePublished\":\"2020-04-23T06:30:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Questions that still need to be asked as governments tap tech to contain coronavirus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Questions that still need to be asked as governments tap tech to contain coronavirus 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/","og_locale":"en_US","og_type":"article","og_title":"Questions that still need to be asked as governments tap tech to contain coronavirus 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-23T06:30:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Questions that still need to be asked as governments tap tech to contain coronavirus","datePublished":"2020-04-23T06:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/"},"wordCount":1353,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/","url":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/","name":"Questions that still need to be asked as governments tap tech to contain coronavirus 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg","datePublished":"2020-04-23T06:30:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/questions-that-still-need-to-be-asked-as-governments-tap-tech-to-contain-coronavirus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Questions that still need to be asked as governments tap tech to contain coronavirus"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34576","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34576"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34576\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34577"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}