Google is Developing a Coronavirus Tracking App

Google and Apple are working together to defeat the coronavirus, introducing the coronavirus tracking app, a new set of tools that could soon reach most mobile phones worldwide.

The new technology, highlighted in white papers on Friday released by Google and Apple, relies on Bluetooth wireless radio technology to help mobile phones connect each other, potentially warning users about people who have meet coronavirus contaminated.

Google and Apple are expected to release these tools soon in May so that public health authorities can use the touch tracking technology. The companies then intend to integrate them directly into iOS and Android apps to help more people connect to them in the coming months.

“Through close cooperation and collaboration with developers, governments, and public health providers, we hope to harness the power of technology to help countries around the world slow the spread of COVID‑19 and accelerate the return of everyday life,” Google and Apple said in a joint statement.

The efforts of Google and Apple is the latest by the tech companies to minimize the effects of the novel coronavirus. The pandemic has prompted almost all Americans to take cover to help control the spread of the virus and reduce the burden on hospitals.

Apple CEO Tim Cook said in a tweet that the new initiative “respects transparency and consent.” ON FRIDAY, Google CEO Sundar Pichai spoke about the project on Twitter and said the two companies “are committed to working together on these efforts.”

Major technology companies in specific have been working on coronavirus projects since it first hit. Verily, Google’s parent company Alphabet’s life sciences launched a website last month that provides information about virus testing to people in California. Established in conjunction with the White House, the site helps people fill in symptoms and complete an online screener.

Google announced last month that it is investing more than $800 million to help small companies and crisis responders fighting against the pandemic coronavirus. Both Google and Apple have also started to produce and distribute safety equipment for health care professionals.

Now, with this latest coronavirus tracking app, Silicon Valley’s biggest competitors are aiming to help develop an app that will help us recover a sense of normalcy. At the same time, we await a vaccine or other ways to combat the virus.

Both companies have said in a joint statement that “All of us at Google and Apple believe there has never been a more important moment to work together to solve one of the world’s most pressing problems.”

Contact tracing Support

Google and Apple’s technology is intended to support contact tracking, which has traditionally been a manual procedure in which healthcare professionals manually dig through a patient’s history to find out what they were close to and may have been exposed to infection.

Possibly, apps could speed up this process. People identified as having coronavirus in an app on their phone may then send warnings wirelessly to everyone they come into contact with, possibly causing people to take extra precautions or self-quarantine to slow down further virus transmission.

Another similar project is an MIT-led initiative called PACT (Private Automated contact tracing) using a similar method to the one used by Google and Apple. With it, healthcare approved infected people could upload their phone’s digital IDs, and others could search the database to see if there is a correlation with any of their phone’s registered IDs. Many touch monitoring apps have also been developed to deal with the pandemic, including COVID-19 Watch and Pan-European Privacy-Preserving Proximity Tracing.

State and local governments also seem to warm up to these proposals. But there are many possible questions about privacy still exist. The American Civil Liberties Union cautioned earlier this week in a report that contact tracing apps could lead to increased government scrutiny, mainly if data is not kept safe. The organization also mentioned that GPS and Bluetooth signals could often be unreliable or untrustworthy, further muddling the efficacy of such apps.

The Private Automated contact tracing team is aware of the obstacles, starting with getting Android and Apple phones to communicate securely, said Ron Rivest, a leading PACT and cryptography expert renowned for helping to develop the groundbreaking and commonly used RSA encryption technologies. With Bluetooth, it can be hard to measure range, and the results differ depending on the smartphone’s orientation.

“People can trust these systems only if they protect privacy, remain voluntary, and store data on the computer of a person, not a centralized server,” said Jennifer Granick, an ACLU supervisory and cybersecurity lawyer. And, she added, many of these issues don’t even involve broader problems, such as supporting people who don’t have access to new devices that could drive those initiatives.

To know if the technology of Google and Apple is accurate, we would have to wait until both companies start sharing it publicly. However, the Electronic Frontier Foundation’s online privacy campaign acknowledged that both companies emphasized the people’s consent and secure data as part of the initiative. “We appreciate that Apple and Google have made a commitment to protecting privacy,” said Kurt Opsahl, deputy executive director and lead lawyer at the EFF.

Recent Posts

How to Trade in Path of Exile 2: A Beginner’s Guide

Trading is a fundamental aspect of Path of Exile 2, enhancing your gaming experience by allowing you to acquire desired items and currency. This...

Mastering PoE Trade: A Comprehensive Guide to Trading Success

Trading in Path of Exile (PoE) can be overwhelming for new players, especially without an official auction house. With a player-driven marketplace, PoE requires...

Travis Touch Plus Voice Translator Device: User Manual

Introduction In today’s interconnected world, breaking down language barriers is essential. The Travis Touch Plus Voice Translator is an advanced portable device designed to...

MUAMA Enence Voice Translator: Complete User Manual

In today’s globalized world, the ability to communicate across language barriers is more essential than ever. The MUAMA Enence Voice Translator has emerged as...

Seven Easy Fixes To Protect Your Android phone Privacy

As Android phones become more integrated into our daily routines, they store an increasing amount of personal information, making privacy concerns a significant issue....

Your Mobile Phone Ringtones Influence On Others

Mobile phone ringtones are often more than just notifications. They have the power to shape our social interactions, public image, and overall environment. What...

Best Flagship Smartphones of 2025: A Comprehensive Guide

The smartphone market is expected to reach new heights in 2025. With cutting-edge technology, stunning displays, and improved AI systems, the best flagship smartphones...

More from Author

Read Now

The 6 Best Gaming Laptops to Buy

Gaming laptops provide powerful performance, portability, and versatility. Whether you’re a casual gamer or a professional eSports competitor, choosing the right gaming laptops to buy can make a world of difference. In this article, we will explore six of the top gaming laptops available today, detailing their...

What is Deepfake? What is It and How does It Work?

What is Deepfake? Deepfake uses artificial intelligence (AI) to manipulate media—images, videos, or audio—to make them appear real, though they are entirely fabricated. The term combines "deep learning" and "fake," highlighting the AI techniques used to create such content. This technology has rapidly advanced, making it increasingly...

Impacts of Quantum Cybersecurity on Digital Protection

Quantum computing is transforming data processing, creating both opportunities and risks for cybersecurity. The Quantum Cybersecurity Impact describes how quantum technologies could both strengthen and challenge existing cybersecurity frameworks. This article delves into the implications of quantum computing on digital security, exploring its potential threats and examining...

How MDM plays a vital role in Healthcare Technology?

In the ever-evolving healthcare sector, accurate data management is more critical than ever. With the increase in digital health systems, the need for robust systems to manage and streamline data has led to the widespread adoption of Master Data Management (MDM). MDM in healthcare technology ensures that...

Revolutionizing Security: The Role of Identity Verification with AI in Modern Systems

Identity verification with AI is changing the way organizations authenticate individuals. Traditional methods of verification, such as passwords or security questions, are increasingly vulnerable to hacking and fraud. AI-powered solutions use advanced algorithms, biometric data, and machine learning models. These technologies offer higher security and efficiency. AI...

Website Speed Optimization: Tools and Techniques

Website speed optimization refers to the process of improving the load time of a website. A fast website ensures that users have a smooth experience, increasing engagement and retention. Speed optimization involves technical improvements and tools that help your website load faster, improving both user experience and...

Top Integral Mobile Apps for Productivity

In today’s fast-paced world, mobile apps play a critical role in how we live, work, and connect with others. Among the vast array of apps available, some are considered essential tools, or integral mobile apps, for both productivity and entertainment. These apps seamlessly integrate into our daily...

Empowering Women in the Shipping Industry

The shipping industry has been traditionally male-dominated, but women are gradually making their presence felt. While progress has been made, the industry still faces significant challenges when it comes to gender equality. Women bring diverse perspectives and fresh ideas, which are essential for growth and innovation. For...

How to Protect SaaS Data Security Effectively?

As the adoption of Software-as-a-Service (SaaS) solutions grows, so does the need for robust data security measures. SaaS platforms often store sensitive data such as customer information, financial records, and intellectual property. Ensuring the safety of this data is critical for maintaining customer trust, complying with regulations,...

How to Scale Your SaaS Business: Tips from Industry Experts

Scaling a Software-as-a-Service (SaaS) business is a challenging yet rewarding journey. It requires not only a deep understanding of your market and product but also strategic planning and the implementation of efficient systems. Whether you're a startup or an established SaaS company, the principles of scaling are...

SaaS Customer Success: Best Practices for Retention and Growth

In today’s fast-paced Software-as-a-Service (SaaS) environment, customer success is more than just a support function. It is a vital strategy for retaining customers, ensuring satisfaction, and driving growth. SaaS companies that prioritize customer success are able to foster long-term relationships with their customers, reducing churn while expanding...

Discord App: How To Solve The Discord Login Problem on Mobile Phones and Different Browsers

If the Discord App has been causing login issues for you, you're not alone. Many users struggle to access their accounts. If you’ve been experiencing login issues with the Discord App, you’re not alone. Many users face difficulties when trying to access their accounts. Luckily, most login...