41 lines
2.2 KiB
Markdown
41 lines
2.2 KiB
Markdown
# Original NHSx app vs Post-may Apple/Google API-based app
|
|
|
|
* NHSx app builds a database of significant contacts (<2 metres for at least 15 mins) who can be alerted if the user reports symptoms (presumably a positive test, too) (from [independent](https://www.independent.co.uk/news/uk/home-news/coronavirus-app-nhs-contact-tracing-cyber-attack-hack-a9500401.html))
|
|
* Users could be notified of false positive if this was found out later
|
|
* NHSx uses a centralised model (FIXME: Find decent source and explanation!)
|
|
* A centralised server figures out the matching process
|
|
* Phone has a unique key thats sent to other devices that come in contact
|
|
* If the user logs positive, device tells server their key is positive
|
|
* Other device asks NHS server if any device keys it's received are positive (**here, the server checks for matches**)
|
|
* If the key is found to have logged positive, the user is alerted
|
|
* The server knowing if your key has come into contact with someone could pose a risk of tracking by gov/hackers
|
|
* Could make tracking outbreaks on a national scale easier
|
|
* App connected to NHS account
|
|
* Battery-saving features on phones (especially iPhones) could pose a challenge to keeping the service running 24/7 on the device
|
|
* Even if not, Apple claimed NHSx solution would be less power-efficient
|
|
|
|
* Apple/Google uses a semi-decentralized model (good ass diagram [here](https://www.bbc.co.uk/news/technology-52263244))
|
|
* Uses BLE to reduce power usage
|
|
* No NHS account, name or details need to be given
|
|
* When two phones meet, a unique key is created and exhanged between them
|
|
* When one logs a positive, the user agrees to upload the key to a central database
|
|
* All other phones regularly download the central database, and then check (**matches are searched for on-device**) for any keys they have received from other devices
|
|
* If the key is in the db, the user is alerted, but the central server does not know about the match.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
### Similar between the two
|
|
|
|
* Risk of high false-positives/Self-certification being used maliciously
|
|
* This was more of a concern when the apps were in development, as conveninent testing (LFD) was not easily available so self-cert was the most likely way to log "positive" on the app
|
|
|