Explore chapters and articles related to this topic
Privacy risk in contact tracing systems
Published in Behaviour & Information Technology, 2023
Janine L. Spears, Ali Padyab
Security weaknesses in an app user’s device (e.g. unpatched operating system; outdated security software; etc.) may render both the user and his or her proximity contacts’ devices open to attack. For example, the BlueBorne vulnerability in Bluetooth enables an adversary to spread malware to vulnerable phones and tablets located within the vicinity of an infected device, e.g. simply by walking in the vicinity (Armis 2020).