Next Article in Journal
From Black Boxes to Glass Boxes: Explainable AI for Trustworthy Deepfake Forensics
Previous Article in Journal
Universally Composable Traceable Ring Signature with Verifiable Random Function in Logarithmic Size
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights

by
Sidra Anwar
* and
Jonathan Anderson
Department of Computer Engineering, Memorial University of Newfoundland, St John’s, NL A1C 5S7, Canada
*
Author to whom correspondence should be addressed.
Cryptography 2025, 9(4), 60; https://doi.org/10.3390/cryptography9040060
Submission received: 13 August 2025 / Revised: 17 September 2025 / Accepted: 17 September 2025 / Published: 24 September 2025
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)

Abstract

Digital contact-tracing (CT) systems differ in how they process risk and expose data, and the centralized–decentralized dichotomy obscures these choices. We propose a modular six-model classification and evaluate 18 platforms across 12 countries (July 2020–April 2021) using a 24-indicator rubric spanning privacy, security, functionality, and governance. Methods include double-coding with Cohen’s κ for inter-rater agreement and a 1000-draw weight-sensitivity check; assumptions and adversaries are stated in a concise threat model. Results: No single model dominates; Bulletin Board and Custodian consistently form the top tier on privacy goals, while Fully Centralized eases verification/notification workflows. Timelines show rapid GAEN uptake and near-contemporaneous open-source releases, with one late outlier. Contributions: (i) A practical, generalizable classification that makes compute-locus and data addressability explicit; (ii) a transparent indicator rubric with an evidence index enabling traceable scoring; and (iii) empirically grounded guidance aligning deployments with goals G1–G3 (PII secrecy, notification authenticity, unlinkability). Limitations include reliance on public documentation and architecture-level (not mechanized) verification; future work targets formal proofs and expanded double-coding. The framework and findings generalize beyond COVID-19 to privacy-preserving digital-health workflows.

Graphical Abstract

1. Introduction

Coronavirus disease 2019 (COVID-19) has strained public health frameworks in their efforts to contain the spread of infectious diseases. This strain is partly due to the novel nature of the virus and partly due to its peculiar characteristics of rapid transmission [1,2]. Virus outbreaks have led to lockdowns, quarantines, strict social distancing, and proximity tracing [3,4]. Contact tracing (CT) is a vital measure to minimize the spread, but workers must be hired, trained, and deployed to manually research and trace infected cases [5]. For instance, the United States started with a workforce of more than 37,000 contact tracers in place, with an additional 31,000 in reserve, and still fell short by 100,000 people [6]. Therefore, officials have sought to build and augment mobile contact-tracing tools [7]. Contact tracing approaches may gather Personally Identifiable Information (PII), making some users reluctant to use these solutions [8]. By contrast, privacy-preserving contact tracing motivates participation and increases the effectiveness of disease control [9,10,11].
As COVID-19 spread, smartphone-based solutions such as proximity tracing were proposed to break transmission chains [12]. Proximity records identify contacts that may require testing or self-isolation [13,14]. However, privacy concerns and vulnerabilities are attached to these tools, and we classified these issues into four categories. First, the privacy of personal devices, such as smartphones, is vulnerable to attacks such as theft or coercion, where a user may be forced or persuaded to reveal their PII [15,16]. Second, contact advertisement messages, such as aliases exchanged between devices, are likely to occur on cell phones and are present in all architectures. Third, users’ PII can be stolen and misused from healthcare servers, exposing sensitive social proximity data [16,17]. Both centralized and decentralized systems are vulnerable to (partial) visualization of proximity estimation [18]. Finally, through side-channel attacks, an adversary may detect that an alert has been generated or that a person has gone into quarantine, potentially preventing the exposed person from receiving critical notifications [19]. Thus, cyberattacks may lead to partially or fully deanonymized PIIs, depending on the architecture and the amount of information stored or transmitted via side channels.
Architectural design choices in digital contact-tracing (CT) systems shape privacy, security, and public adoption. The common centralized–decentralized split signals only one decision and misses finer differences in data flow, control, and exposure risk [20]. We therefore introduce a modular six-model framework that makes these differences explicit. To guide our investigation, we focus on the following research questions:
  • How do architectural design choices in digital contact-tracing platforms shape privacy (e.g., PII exposure and unlinkability), security (e.g., verification/notification authenticity), and observed adoption and evolution over time?
  • Does a modular six-model classification provide a more informative and actionable understanding of contact-tracing architectures than the traditional centralized–decentralized split, enabling consistent comparison across deployments and clearer guidance for design and policy?
Although the analysis focuses on COVID-19 deployments, the framework is scalable beyond COVID-19, offering a structured lens for privacy-preserving digital-health workflows (e.g., tuberculosis, influenza, future biosecurity responses). We examined 18 platforms using a 24-indicator rubric across privacy, security, functionality, and governance, interpreted under a concise threat model and aligned with CDC assessment criteria. Results include comparative model scores, inter-rater agreement, weight-sensitivity checks, and adoption timelines.
Contributions: This work (i) introduces a privacy-driven six-model classification along two orthogonal axes, locus of risk processing and data addressability; (ii) provides a transparent 24-indicator rubric across privacy, security, functionality, and governance, with an indicator → evidence catalog for auditability; (iii) establishes reproducibility through two-rater coding and Cohen’s κ , and robustness via a 1000-draw weight-sensitivity analysis; (iv) maps architectural choices to security goals G1–G3 (PII secrecy, notification authenticity, unlinkability) to clarify trade-offs; and (v) synthesizes adoption and operational constraints that help explain observed shifts toward privacy-preserving designs.

2. Related Work

Research on digital contact tracing (DCT) spans architectures/protocols, privacy–security and governance, adoption determinants, and operational evaluations. Architecturally, deployments have been framed as centralized, decentralized, or hybrids [21], with later work arguing that this dichotomy hides important design variation; socio-technical frameworks emphasize criteria across citizens, technology, and governance and encourage privacy-preserving designs in the Google/Apple Exposure Notification (GAEN)/DP-3T family [22,23,24]. Beyond GAEN/DP-3T, protocol refinements continue; for example, DP-ACT supports both active and passive participants without reverting to centralization [25].
Privacy and governance studies document challenges in anonymization, lawful processing, and data rights across jurisdictions [26], alongside calls for interoperability and data standards to enable effective cross-system operation [27]. Ethical analyses warn that public-sector data collection can enable profiling if not constrained by purpose, minimization, and transparency [28,29].
Adoption is shaped by perceived benefits, trust, and ease-of-use; privacy concerns alone are not uniformly predictive once other factors are controlled [30]. Cultural context and attitudes toward surveillance moderate acceptance [22,24], with QR/BT-based approaches more accepted in some Asian settings than in the US/EU, irrespective of protocol choice [31]. Recent work also shows preferences vary with governance and data-use terms [32], and qualitative studies highlight communication clarity, digital literacy, and transparency as persistent barriers [33,34].
Operational evaluations reveal end-to-end constraints: measured delays from positive test to notification and low contact-notification coverage point to cascade bottlenecks [35], while large-scale analyses estimate population-level impact (e.g., NHS app) [36]. Design choices such as notification-window length trade off epidemiological effect and adherence [37], and system audits identify recurring “points of failure” to address for real-world effectiveness [38]. These findings motivate our six-model classification and 24-indicator evaluation of privacy (G1/G3), authenticity/timeliness (G2), functionality, and governance.

3. Methodology

We created a comprehensive inventory of contact tracing (CT) platforms deployed by 20 countries, including those utilizing the globally adopted Google Exposure Notification (GAEN) API, starting in July 2020. Our search methodology combined manual exploration via the Google search engine and app listings in the Play Store, accessed from both Canada and Pakistan, to ensure broader geographic visibility. We used a set of consistent keywords, including “contact tracing,” “COVID-19,” and “coronavirus app/platform,” paired with country-specific queries (e.g., “coronavirus contact tracing app in USA”) to maximize the identification of localized platforms.
Platforms were included in the evaluation if they met at least one of the following criteria: over 10,000 downloads, availability of open-source code, existence of a technical white paper or report, or coverage in peer-reviewed literature. We continued this process through recursive exploration, following recommendation links, official documentation trails, and developer-provided resources, until no additional qualifying CT platforms were discoverable under our inclusion parameters.
Functional analysis began by installing the applications on Apple iPhone 11 (Apple Inc., Cupertino, CA, USA; iOS 13.5–13.6) and Apple iPhone 12 (Apple Inc., Cupertino, CA, USA; iOS 14.2–14.5), as well as on Google Pixel 3 (Google LLC, Mountain View, CA, USA; Android 10 and Android 11), that allowed cross-border access, permitting direct testing and behavioral inspection. For region-locked or sunset platforms, we relied on documentation and public technical records to understand their functionality. We conducted a detailed review of each platform’s architectural and security components using source code (when available), white papers, reports, and scholarly analyses. Each platform was then evaluated based on five core security dimensions: (i) system architecture, (ii) communication and security protocols, (iii) cryptographic implementation, (iv) user identity management approach, and (v) backend integration with healthcare servers and government systems, as illustrated in Figures 1–6.
To capture the dynamic nature of these platforms, we repeated the review at three points: July 2020 (immediately after early national launches and the public release of the GAEN API on 20 May 2020), November 2020 (after mid-course pivots and hardening updates, including U.S. state-level migrations), and April 2021 (when first-generation CT apps had largely stabilized). We focus on this window because most deployments were actively installable, maintained, and publicly documented during this period; major architectural shifts occurred within 3–6 months of initial release; and comparable evidence (policies, code, DPIAs) was available across jurisdictions. Beyond mid-2021, many apps entered maintenance or sunset, and later changes were sparse or administrative, which would confound an architecture-level comparison. A final set of 18 platforms from 12 countries was compiled from the union of these three review phases (Table 1). In addition to structural and functional evaluations, we performed privacy, computational, and contextual analyses, drawing on the CDC’s digital contact-tracing assessment criteria and our systematized parameters, which are aligned with our architectural subsets. This allowed us to score, compare, and map each platform’s operational model against existing CT architectures. Longer-term adoption and evolution signals through December 2022 are summarized in Section 7 to contextualize, but not re-score, the core evaluation.

3.1. Scoring Transparency, Reliability, and Robustness

  • Indicator set: We operationalized the evaluation into 24 indicators grouped under four pillars: Privacy (P1–P6), Security (S1–S6), Functionality (F1–F6), and Governance (G1–G6). Each indicator has a short rubric with three levels: 1 = present/explicit, 0.5 = partial/conditional/unclear, 0 = absent/contradicted. The complete indicator → evidence catalog (codes, definitions, and what qualifies for 1/0.5/0) appears in Appendix A. Indicators and scores are interpreted under the assumptions and adversaries defined in Section 3.2. Specifically, P1 operationalizes G1 (PII secrecy on public channels), P2 operationalizes G3 (unlinkability of rotating tokens), and S1/S4 operationalize G2 (authenticity of case verification and notifications).
  • Scoring procedure: For each platform, raters assigned a value in {0, 0.5, 1} per indicator based on publicly documented evidence (e.g., protocol/architecture documents, privacy policies, DPIAs, verification workflows, and, where applicable, open-source repositories or external audits [6,7,39,40,41,42,43,44,46,48,49,50,51,52,53,55,56,57,58,59,60,61]). Missing or ambiguous evidence was scored 0.5 rather than left blank to preserve comparability.
  • Aggregation: Pillar scores are simple arithmetic means over indicators within the pillar; the model/platform overall score is the unweighted mean over all 24 indicators:
    S p i l l a r = 1 F p s u m f   i n   F p s f , S o v e r a l l = 1 24 s u m f = 1 24 s f
  • Notations: Symbols are defined in Appendix B, Table A8; we use κ for Cohen’s kappa, s f 0 , 0.5 , 1 for indicator scores, and w D i r i c h l e t 1 , , 1 for sensitivity weights.
  • Rater protocol (inter-rater reliability): To test reproducibility, two independent ratings were produced for six representative platforms, one per architectural model in this study (Fully Centralized, Subset Data, Bulletin Board, Indexed Data, Dedicated Servers, Custodian). Each rater coded all 24 indicators for each platform using the rubric in Table A1. We computed Cohen’s κ per indicator and report macro-averages by pillar.
  • Model-level scores (unweighted): Averaging the two raters and then averaging platforms per model yielded model-level scores, presented in Figure 7.
  • Sensitivity to indicator weights: To assess robustness to alternative priorities, we drew 1000 random weight vectors w from a symmetric D i r i c h l e t 1 , , 1 over the 24 indicators, recomputed weighted platform scores, s u m f w f s f and re-ranked models by the means of their platforms.
  • Reproducibility artifacts: We provided Table A1 (rubric), Table A5 and Table A6 (rater matrices), and Appendix B (notation/procedures). These artifacts enable exact replication of all numbers reported here.
  • Limitations: Our Scoring reflects publicly documented behavior and artifacts, which vary by jurisdiction and time; the inter-rater study covers six representative platforms (model-level inference). Baseline aggregation is unweighted to avoid hidden priorities; we mitigate subjectivity with the 1000-draw sensitivity analysis. We do not present formal cryptographic proofs, code audits, or user-level trials; these are listed as future work with explicit goals/adversaries.

3.2. Security Assumptions and Threat Model

  • Assets: PII; rotating proximity tokens (e.g., RPIs/seeds); diagnosis verification codes; integrity of exposure notifications.
  • Adversaries: (A1) active network attacker (Dolev–Yao) on public channels; (A2) malicious user attempting bogus uploads or re-identification; (A3) honest-but-curious backend that follows protocols but seeks extra inferences.
  • Assumptions: App–server links use modern TLS; platform crypto uses OS-attested key storage and documented primitives; diagnosis codes are bound to lab workflows; ephemeral identifiers rotate as specified; consent gates uploads; no side-channel, baseband, or physical-layer attacks; the adversary does not break standard cryptography.
  • Goals: (G1) PII secrecy on public channels; (G2) authenticity of case verification and notifications; (G3) unlinkability of rotating tokens at scale; (G4) data minimization and bounded retention.
  • Scope: We evaluate architecture-level protections and governance controls. Formal mechanized proofs, device compromise beyond the user handset, global cross-app fusion, and side-channel/timing attacks are out of scope and noted in Discussion/Limitations.

4. Contact Tracing Platform Corpus and Mapping

We analyzed 18 digital contact-tracing platforms (May 2020–April 2021) across 12 countries and for each platform we, identified its protocol family (e.g., GAEN/DP-3T/other), assigned it to one of our six architectural models (based on compute locus and data addressability), and linked scores to primary evidence (official policy/Privacy Notice, technical spec/protocol, repository, DPIA or audit). Where cross-border installation was not possible, we relied on these official artifacts. Table 1 lists the corpus, Platform, Country/Scope, Protocol family, and Assigned model, and serves as the bridge to the comparative results reported in Section 6. Concise per-platform functional notes are provided in Appendix C (Platform Notes).

5. Capabilities and Attributes Analysis

Following an in-depth examination of individual tools, we conducted a quality assessment using the evaluation criteria set by the US Centers for Disease Control and Prevention (CDC). Additionally, we performed an ad hoc analysis focusing on security risks and potential attacks, along with general security guidelines relevant to contact-tracing (CT) platforms.

5.1. CDC Criteria

CDC has defined a set of preliminary criteria for the Minimum and Preferred characteristics of digital contact tracing tools, demonstrating the quality-based differences between these systems [62]. Their goal is to support health authorities in resolving COVID-19 contact-tracing workflow bottlenecks and in deploying a regulation-compliant digital CT infrastructure. These metrics are drawn from preliminary research and targeted discussions with contact tracing and informatics experts across the county, state, and federal governments, national public health associations, academic consortia, and nongovernmental organizations [62]. Table 2 illustrates the quality assessment of our centralized and decentralized contact-tracing apps/frameworks developed based on the CDC’s evaluation criteria. The main evaluation parameters were Patient Identification, Contact Elicitation, Contact Notification, User Involvement, Availability, Trustworthiness, Platform support, Data Interoperability, Privacy, Technical support, Vendor Experience, Contact Follow-up, Customizability and Localization. Each platform performs differently according to its preferences and resources; however, the general definition of these parameters is as follows:
  • Patient Identification: The platform enables the user to report their validated test status, relevant demographic data, data facilitating the connection with supportive services, and the best means of communication.
  • Contact Elicitation: Enables the manual import of proximity data.
  • Contact Notification: Enables automated notification to community contacts as per proximity, keeping the patient anonymous.
  • User Involvement: Awareness spread; motivation created and confidence built.
  • Availability: Rapidly deployable or successfully in use by jurisdictions.
  • Trustworthiness: is Open source.
  • Platform support: Supports cross-platform functionality, caching and offline data entry.
  • Data Interoperability: Secure Data transfer over secondary channels (by PHAs).
  • Privacy: Authorized data access only.
  • Technical support: Develops/vendors provide technical support.
  • Vendor Experience: Working experience in a healthcare setting.
  • Contact Follow-up: Immediate exposure assessment and relevant notifications to contacts and PHAs.
  • Customizability and Localization: Allow some level of customization and choice of language.
Table 2. Capabilities and attributes by architecture. At-a-glance differences in compute locus, data addressability, and verification/notification path, interpreted under Section 3.2 threat model (G1–G3).
Table 2. Capabilities and attributes by architecture. At-a-glance differences in compute locus, data addressability, and verification/notification path, interpreted under Section 3.2 threat model (G1–G3).
ToolsP.I.C.I.C.N.U.I.ATP.S.D.I.PT.S.V.E.C.F.CL
TraceTogether (OpenTrace)<<<<<<<<
Coronavirus Disease-19<<<<<<<<<<<
Health Code<<<<<<<<<<
CovidSafe<<<<<<<<
StopCovid<<<<<<<<
Aarogya Setu<<<<<<<<
GAEN APIs’s Apps<<
PACT East Coast <<
CovidSafe-PACT (West-coast)<<
SwissCoviD-DP-3T
DP-3T Unlinkable
CovidWatch-TCN<
Hamagen
COVID Safe Paths<
Notes: “✓” means yes while “✖” means No; “<“ denotes the Minimum criteria, whereas “✦” denotes achieving the Preferred Criteria [62].
The minimum and preferred criteria for the technical and general attributes of these tools are outlined below. Even if a platform achieves a partial expectation of a parameter, it is classified as meeting the minimum standard; otherwise, approximately or completely fulfilled criteria are regarded as reaching the preferred rank. For instance, comprehending its demonstration, “privacy,” the primary concern of all tracing applications, is under discussion. The minimum capabilities of these tools for privacy are expected to have the following characteristics [62]: transparently informing users of which data is collected, how it is used, how long it will be retained, implementing measures to prevent the introduction of false data, requiring the consent of both index patient and contact before using PII, encrypting data in transit and at rest, providing individuals access to their data and ability to revoke consent at any time, providing individuals with the ability to delete their data, providing publicly available independent security and privacy assessments that address issues of trustworthiness, for instance, using open architectures, open standards, providing open-source code, security, and privacy, and lastly, authorized data access only for PHAs and must be limited to a need-to-know basis. At the maximum preferred rate of characteristics, these apps should allow individuals to delete their own data.
Patient Identification (P.I.), Contact Elicitation (C.E.), Contact Notification (C.N.), User Involvement (U.I.), Availability (A.), Trustworthiness (T), Platform Support (P.S.), Data Interoperability (D.I.), Privacy (P), Technical Support (T.S.), Vendor Experience (V.E.), Contact Follow-up (C.F.), Customizability (C) and Localization (L).

5.2. Security Risks and Attacks

We assessed threats under the adversaries and goals defined in Section 3.2. Five recurring risks span the six models (details summarized in Table 3 and Table 4).
  • Single point of risk/attack (A3): Centralized storage or broad addressability increases blast radius unless bounded by minimization, retention, role separation, and audit.
  • Linkage: Correlating ephemeral identifiers with side information can re-identify users; unlinkability depends on rotation schedules and non-inverting indexes (G3).
  • Denial of service (DoS): Floods of well-formed but bogus beacons/uploads drain client/server resources; rate-limits and verification gates mitigate (G2).
  • Replay/relay: Re-broadcast of recently valid identifiers can trigger false matches; rotation and timestamp checks reduce impact (G2/G3).
  • Traffic analysis: Observing upload/download patterns can reveal status changes; padding, batching, and uniform fetch policies reduce inferences (G1/G3).
Model posture: Server-side matching (Fully Centralized/Subset) eases verification and notification integrity (G2) but raises addressability and linkage risk; device-side matching (Bulletin Board/Dedicated) strengthens PII secrecy and unlinkability (G1/G3) and relies on robust verification gates for G2. Custodian/Indexed balance queryability with separation of roles and careful index design. Table 3 and Table 4 consolidate threats and typical mitigations by model; Appendix D provides concise, cited examples.

5.3. CT Platforms’ Security Guidelines

We followed community guidance (e.g., secure mobile build/release practices and verification-code binding) and observed recurring pitfalls: debug features in production, over-persistent identifiers or characteristics, insufficient rotation/salting of indexes or tokens, and weak role separation in verification gateways. Concrete case notes and mitigations (e.g., disabling WebView debugging in release builds; prompt clearing of BLE characteristics; GAEN/DP-3T rotation hygiene; bounded retention; audit trails) are provided in Appendix D, with references to primary artifacts.

6. Proposed Frameworks

On our archived list of 18 platforms, we conducted CDC criteria assessment and ad hoc analysis to elicit privacy and security properties, in addition to their quality features and limitations. The conventional categorization of contact-tracing systems into centralized and decentralized approaches has proven inadequate when evaluating the effectiveness of these systems in meeting the specific resource and security requirements of healthcare jurisdictions. It is essential to recognize the diverse roles played by health authorities, central servers, and user devices in the contact-tracing workflow and the complex nature of data flow within these systems. This highlights the necessity for new criteria to assess the architectures of contact-tracing systems, moving beyond the traditional binary classification of centralized and decentralized systems. The limitations of these conventional classifications are evident when we consider the intricacies of workflows and the need to determine whether a customized design aligns with the unique health and computational constraints of different jurisdictions.
As examined, all protocols and platforms have different server roles, built-in protections, trust assumptions, privacy and security concerns, and measures taken. Considering these takeaways, all contact-tracing platforms were re-investigated within our proposed sub-architectural designs, CDC, and privacy criteria to bring out further differences, scores, and efficacy of the CT systems.

Our Models

  • Fully Centralized Model: The server manages the security keys, generates anonymous IDs, conducts contact risk analysis, and performs notification processes. Such architectures push the risk analysis and notification processes to the centralized server, and health authorities decide the rate of notifications provided by pandemic conditions. The central server plays a key role in carrying out staple functionalities such as storing encrypted PII, generating anonymous TempIDs, risk analysis, and notifications for close contacts. The server is found to be trustworthy in this architecture. Contact tracing applications, that is, TraceTogether (OpenTrace), Coronavirus Disease-19, Health Code, and CovidSafe, were examined as part of these architectures and are illustrated in Figure 1.
    In this role, the server starts the process by verifying the device through a telephone network. Once the device verification and user registration at the server end are completed, the server shares the encrypted pairs of tempIDs and timestamps (T). Now, the devices start contact tracing by sharing TempID, phone model, and transmitting power (TxP) with any other device in proximity to the same application installed. In addition to these values, the user’s PII is stored in the database of personal nodes. On the other hand, the server keeps the records of the user’s PII, T, TxP, and received signal strength indicator (RSSI). Whenever a user has symptoms of COVID-19, they will trigger Step 3 by sharing their unique TempID, TxP, and RSSI values with the server to perform a risk assessment that will further request the public health authority (e.g., hospital) to verify the patient information by sharing the user’s PII only. Hence, based on the hospital’s verification, the server will notify the user about a self-isolation or “no danger” message.
2.
Subset Data Model: Roles are divided between user devices and servers, and the central server undertakes risk analysis and notifications. It also differs in its level of privacy, based on the type of user data stored at the server end. The protocols also vary in the notification process, that is, how vulnerable users are notified. Users are also expected to check the status of EphIDs regularly with the server to determine if they are exposed to risk. The Robert and Desire protocols and StopCovid and Aarogya Setu applications are classified under a subset data model, as shown in Figure 2.
Unlike a fully centralized server, it does not approach the health authority to perform user verification and risk analysis. Instead, the hospital keeps updating the server’s database with an active patient list and deleting the data of cured patients from their end. Another privacy benefit is the privilege given to the user to manually delete their records from the central server once their quarantine is over.
3.
Custodian Data Model: Based on the Inria-EpiOne protocol, health authorities maintain a database of tokens corresponding to infected users. Here, the server cannot locate vulnerable users with the disease without colluding with healthcare authorities. Similarly, the healthcare provider is not allowed access to randomize contact tokens without colluding further with the server. Even if the server can link a user to specific tokens or seeds in its database, no further information can be drawn. This confines the limit of exposure to the event of collusion or database breach, in contrast to a fully compartmentalized or dedicated server model.
Similarly, in Figure 3, the device generates a random key Kt, computes Sidt (metadata, e.g., IP address) and Pidt (time, location), stores them, and uploads Kt to a central server that recomputes Sidt and Pidt in the same way. Again, Ridi is the real ID, for example, name, phone #, etc., and Rtest = Request for a medical test, while Widi = Warning ID about exposure.
4.
Dedicated Servers Model: This is a server architecture designed based on the ConTra Corona protocol. It features a strict separation of tasks under different servers, which are submission, matching, deduplication, notification, and warning servers. Without learning the signed and encrypted public identifiers, health authorities upload them to the server, which looks up the respective registered secret identities and encrypts a pseudonym. The warning server then decrypts this later. The deduplication and submission servers share a symmetrical key. On submission arrival, the submission server marks all individual entries with a random identifier, that is, the deduplication identifier, which is encrypted with the shared symmetric key. The deduplication server decrypts the deduplication identifier and maintains only a random ‘ S i d _ i ’ for each deduplication identifier. Then, it discards all deduplication identifiers and hands all the individuals ‘ S i d _ i ’ to the warning server that publishes them to the users for further verification by healthcare.
For every time period t, the device generates a random key Kt and computes Sidt (metadata, e.g., IP address) and Pidt (time, location), stores them, and uploads Kt to a central server that recomputes Sidt and Pidt in the same way. Here, Ridi is the real ID, for example, name, phone #, etc., and Rtest = Request for a medical test, while Widi = Warning ID about exposures, as shown in Figure 4.
5.
Bulletin Board Model: In this framework, all the major servers’ centralized roles are transferred to the devices, while the server acts simply as a bulletin board. In addition, it aims to keep users’ identities secret from the central server. Consequently, a server security breach in this architecture would result in less information leakage. The following contact tracing applications come under this category: GAEN APIs Apps, PACT East Coast, CovidSafe-PACT (West-coast), SwissCoviD-DP-3T, Hamagen, and COVID Safe Paths.
In addition to the locally stored seed data used to generate chirps, chirp data, including the received time, PII, location, and signal strength, are also stored at personal nodes. At any stage, if a user feels the symptoms of coronavirus, it voluntarily uploads its seeds and a time stamp with the central server. In this framework, the server only keeps the set of seeds and timestamps for infected users and shares them with all the devices that have come into proximity with infected users in the past few days. Regional healthcare authorities can broadcast to users directly with alerts. Overall, the risk verification and notification processes were performed at a personal node. In Figure 5, UId is the user identity information and T(tb = beginning time, te = expiry time).
6.
Indexed Data Model: This design responds to the claims of a decentralized model subjected to linkage and enumeration attacks. Previously, daily keys for infected users were available to all other devices in the network. The server needs to be careful to minimize the chances of false positives, although this drawback has been claimed to be overcome within this design. Additionally, the server can be used to store encrypted pseudonyms and authentication. For instance, unlike typical decentralized structures, only compact seed data (master key, expiry time, etc.) are uploaded to the server rather than the entire list. All seeds that belong to a case can be tested easily, as they are produced and bound to the same master key.
Health authorities trigger the process of contact tracing by verifying the illness that allows the user to upload encrypted information. The major difference is that the server does not share the infected users’ seeds directed toward endangered users; rather, the server shares the memory address where the infected seeds are stored at the server’s end. However, the user performs the risk verification process to provide the information that the monitor shares. Contact tracing platforms are believed to use this communication design, that is, CovidWatch–TCN, Pronto-C2, and DP-3T Unlinkable. As illustrated in Figure 6, UIdi is the user identity information, and T(tb = beginning time, te = expiry time).
Table 5 compares different server models and database nodes from contact-tracing platforms for the different sets of values stored at their ends. The data were examined to be interoperated in various ways in all architecture types to and in PHAs. For example, structured implementations allow manual data import from PHA information systems, whereas the majority of the forms use programmatic means of safe data transmission within information systems within jurisdictions. Contact elicitation is also a crucial feature of CTAs because it allows for the simultaneous importation of proximity and exposure data both manually and automatically, providing user consent. For instance, a fully centralized model allows PHAs to manually record and import data. In contrast, in the bulletin board model, either the patient’s self-reported data or once they have given consent, it starts to import automatically. However, they have the additional advantage of deleting data at the PHA end at any given time. Likewise, contact notification adds more value to the job as it generates exposure notifications based on the proximity data but keeps the patient’s ID anonymous. These notifications, their method of communication, duration, distance of proximity, and further healthcare actions, such as isolation and testing, followed by notifications, vary within both architectures. These are imposed in a fully centralized model while optional or broadcast pertinent community information in bulletin board systems.

7. Modular Review

7.1. Qualitative Re-Assessment

This study shows the significance of contact tracing platforms in controlling the spread of coronavirus. Our research is well defined in the subcategorization of the aforementioned traditional architectural designs and the evaluation of the unique roles of servers in different models. Although comparative computational analysis is performed on individual applications, users can differentiate the tools, but do not obtain any insights into which combination of approaches or models is better or suitable under specific healthcare, governmental, or public circumstances and preferences. Therefore, we evaluated modular approaches under the same CDC criteria and addressed both concerns by presenting the results in Table 6.
To the best of our knowledge, computational and attribute analyses have been evaluated to present a bulletin board model that outperforms the others. After performing this comparative analysis, we concluded that these criteria superficially touched on privacy concerns and that there is a dire need for privacy-centric re-assessment. Drawing on what we have learned thus far, we need to reexamine CT workflows based on privacy attributes.

7.2. Privacy Properties

As per the CDC’s preliminary criteria for the minimum and preferred characteristics of digital contact tracing tools [62], a qualitative analysis was performed on both individual platforms and on a modular basis. As per the risks and security reviews, general interpretations were provided in addition to security guidelines. Because this set of metrics barely addressed privacy concerns, combined with what we learned from our server models, we reexamined the CT workflows. This is based on more comprehensive and methodical privacy attributes to reveal further model differences, scores, and efficacies. Our privacy-centric re-assessment criteria are as follows:
Ranks (1–4): 4 indicates the highest capability/preference, while 1 is the lowest.
Yes/No: Yes (1), No (0)
PHAs Data Access: How much access do PHAs allow for patients’ PII and exposure to servers?
  • Complete
  • Need-basis
  • Pseudonyms
  • Nothing about data
PHAs Access Criteria: On what basis do PHAs allow access to patients’ PII and server exposures?
  • No-Consent
  • On-demand
  • Consent
  • Never
PHAs Data Longevity: How long do PHAs allow storing patients’ PII and exposure by servers?
  • Permanently
  • Until requested to delete
  • Few weeks
  • Two weeks
PHAs Data Request: Who can request PHAs to allow storing patients’ PII and exposure by servers?
  • Nobody
  • PHAs
  • User
  • Both/Either
Users’ risk of Anonymization: Based on users’ PII, exposures, and pseudonyms shared, can a user be vulnerable if servers are compromised?
  • Identity reveals if the central server is compromised
  • Identity reveals if any server (multiple) is compromised
  • Identity reveals if interacted/interacted/another user’s device is compromised
  • Identity is revealed only if the user’s device is compromised
The Indexed data model had higher privacy scores than the others regarding privacy capabilities. However, the Bulletin board works almost as well as the indexed data model. Compared with the quality/general attributes assessment in Table 6, the bulletin board model was more effective in controlling diseases and preventive measures. However, in Table 7, the indexed data model has higher privacy scores than the others. Overall, based on general and privacy-centric evaluation, the bulletin board outperforms all models with a clear distinction, while the indexed data model stands in the second rank.

7.3. Architectural Comparison: Privacy and Security Trade-Offs

To support a deeper understanding of the design trade-offs in contact tracing platforms, we present a comparison of the six categorized architectural models. Table 8 outlines each model’s control type, primary cybersecurity risks, privacy levels, and key strengths. Unlike the binary centralized vs. decentralized classification, our modular approach provides a more practical framework for evaluating system resilience and user trustworthiness.
This comparative overview supports the argument that a modular perspective enables more targeted decision-making for system design. It also illustrates that cybersecurity resilience is tightly coupled with architectural choices, necessitating thoughtful integration of cryptographic protections, data segmentation, and user control models. In terms of our goals, the Bulletin Board model best meets G1 (PII secrecy) and G3 (unlinkability), while Fully Centralized architectures often ease G2 controls (case-verification/notification authenticity) via clearer authority boundaries, explaining the observed Privacy–Security trade-offs.

7.4. Reliability and Robustness Results

Details of the scoring rubric, rater protocol, and analysis are in Section 3.1; the outcomes are reported below. Privacy and security findings are evaluated against goals G1–G3 from Section 3.2.
  • Inter-rater reliability (Cohen’s κ , macro-average by pillar): Privacy 0.606 (substantial), Security 0.433 (moderate), Governance 0.468 (moderate), Functionality 0.067 (low). The lower κ for Functionality reflects more variable or under-specified public documentation; we clarified functional indicator definitions and cite evidence per indicator in Appendix A.
  • Model-level scores (unweighted mean across 24 indicators): Bulletin Board 0.823; Custodian 0.792; Dedicated Servers 0.771; Indexed 0.708; Subset 0.615; Fully Centralized 0.583. A bar chart of model-level scores appears in Figure 7.
  • Sensitivity to indicator weights (1000 draws): Using D i r i c h l e t 1 , , 1 weight vectors over the 24 indicators, the Top-1 model changed in 20.5% of draws, while the Top-2 set remained the same in 63.4%. Thus, while exact ordering can shift under alternative priorities, the top tier (Bulletin Board/Custodian) remains robust across a wide range of reasonable weightings. Notation and step details appear in Appendix B (Table A7 and Table A8; Procedures B1–B2).
  • Security verification status: In this study, we verified architecture-level conformance to G1–G3 under the threat model in Section 3.2 by scoring indicators P1/P2/S1/S4, reporting Cohen’s κ for inter-rater agreement, and stress-testing conclusions with a 1000-draw weight-sensitivity analysis. We contextualized effectiveness with operational KPIs observable in deployments, verification latency (test → code → notification), notification coverage (share rate and percent of exposed contacts notified), susceptibility to false-positive/relay, interoperability, and retention/exit compliance, when such data are available.

7.5. Trends over Time

This study analyzed the protection and privacy of 18 contact-tracing platforms. It ranked the most critical features, such as a specific protocol, cryptographic technique, deployment framework, user identification approach, and role/trust of healthcare officials. Over time, and until December 2022, we examined the changing trends within these platforms regarding architectural shifts under our modular divisions, source code availability, and recent CTA launches. First, in the observations of architectural designs from May 2020 to April 2021, centralized app designs were seen to be more trusted and pioneering. After a few months of app deployment, many security vulnerabilities and privacy concerns came to the surface, and Apple/Google released its API interface on 20 May 2020. Centralized apps for iPhone users were challenging previously because of the way iOS/Apple restricts the use of Bluetooth, which also convinced the developers to shift their approach to fall into line with the decentralized design used by this API, and ended up having more than 65 applications by April 2021, while five shifts within our selected CT platforms. The governments of Germany, Switzerland, Israel, and the USA, for their platforms, Corona-warn-app, SwissCovid-DP3T, DP3T Unlinkable, Hamagen, and EpiOne, respectively, abandoned their centralized databases and shifted to decentralized approaches. This shift further within our architectural subclassification is shown in Figure 8.
Over the same period, quantitative evidence mirrors these shifts. A systematic review (76 studies; 25 meta-analyzed) finds that perceived benefits, trust, and ease-of-use consistently predict DCT acceptance, with cultural context moderating effects; “privacy concerns” alone are not uniformly predictive once other factors are controlled [30,63]. At population scale, the NHS COVID-19 app is estimated to have averted ~1 million cases during its first year [36], while an individual-level analysis in Belgium observed a ~1.2-day delay from PCR result to exposure notification and only ~4% of exposed contacts notified, highlighting cascade bottlenecks [35]. Design choices such as notification-window length also trade off epidemiological impact with adherence [37]. Preference and qualitative studies show willingness to install rises under public-health governance and privacy-preserving defaults, and falls with broad secondary data use; communication, digital-literacy, and transparency barriers further shape uptake [32,33,34]. Taken together, these findings help explain the observed trend toward bulletin-board/custodian architectures (trust/PII-secrecy/unlinkability) while more centralized variants often persisted where verification/authenticity (G2) workflows were prioritized.
We also witnessed other changes; for instance, the French government renamed its formerly introduced app from StopCovid to TousAntiCovid because of its slower adoption rate until July 2020 and updated the app in October. And COVID Safe Paths, an MIT-led project in the USA, was later named the Private Kit. In addition, a few countries had worked on protocols until July 2020. However, later, they launched their applications, such as the EpiOne protocol by UC Berkeley, which deployed its application “epione.net Patients”, version 5.7.0, on 18 March 2021. The German government introduced the “Corona-Warn-App” for its ConTra Corona Protocol on 29 March 2021. Until July 2020, a few protocols/apps’ source codes were not released online; however, until April 2021, the following changes were observed, as illustrated in Table 9. Please note that “×” means “Code Not Released Yet,” while “–” means “Switch didn’t happen”.
All platforms under study were seen to release their source code within a month gap or at the same time when they adopted the GAEN API, except the CovidSafe-PACT (West-coast) developed by the University of Washington, USA, made public three months after the shift in November 2020. Its beta version was released in May 2020, shifted to this API-based decentralized approach in August 2020, and later released its source code in November 2020 once it had finished updating and analyzing its recent decentralized system. The overall trends of source code release and GAEN adoption are graphically represented in the sum of platforms out of the 18 CT systems under study, as shown in Figure 9 and Figure 10.
After the release of GAEN APIs on 20 May 2020, most countries adopted this decentralized approach within a month, except for the cluster of applications launched by more than 20 states in the USA, such as CovidSafe–PACT, CovidWatch, CovidSafe paths, and EpiOne, which shifted their architecture in August 2020 after analyzing its suitability and the API-based system, while the majority of others have already shifted earlier.
Looking ahead to future digital-health systems and other privacy-preserving applications, our two architectural axes, locus of risk processing (device vs. server) and data addressability (recomputable vs. addressable records), remain applicable and adapt to new technologies and evolving public-health needs. IoT: proximity beacons, wearables, and venue sensors fit Bulletin-Board or Custodian patterns to keep PII off public channels while enabling local matching; gateways support cross-site federation under minimization (G1/G3). Cloud: when timeliness, fraud control, or case-management integration dominates, Dedicated-Servers or Hybrid variants centralize only what is necessary to satisfy G2 (authenticity) while retaining scoped uploads, verified diagnosis codes, and role separation. Blockchain: append-only bulletin boards (e.g., permissioned ledgers) can provide publication/audit for diagnosis keys or revocations without putting PII on-chain; pairing with verifiable credentials, PSI/PIR, and threshold/attested issuance preserves unlinkability (G3) and secrecy (G1). As technologies and public-health needs evolve, the classification remains useful because it exposes trade-offs explicitly, allowing authorities to choose implementations that meet G1–G3 under local constraints rather than defaulting to a binary centralized–decentralized view.

8. Conclusions

Digital contact tracing (CT) plays a pivotal role in mitigating pandemics by identifying and interrupting chains of transmission. However, CT platforms vary significantly in their privacy architectures, and the traditional centralized–decentralized dichotomy fails to capture this diversity. To address this, we introduced a modular six-model classification that makes these architectural trade-offs explicit.
We evaluated 18 platforms across 12 countries using a structured, 24-indicator rubric, capturing changes in design, privacy models, and adoption signals over time. This evidence-based comparison highlights how architecture relates to privacy, security, and operational choices.
Our findings show that no CT platform offers complete protection against all privacy threats. Bulletin Board and Custodian models generally form the top tier of privacy goals, while more centralized designs ease verification/notification workflows. Following GAEN’s release, several deployments shifted toward more privacy-preserving designs, and transparency measures (open-source code, minimal data collection, clear governance) correlated with higher acceptance across regions.
Greater feature complexity did not guarantee adoption. Platforms prioritizing simplicity, user control, and privacy transparency fared better, and many systems adapted post-launch in response to public feedback and regulatory pressure, underscoring the value of responsiveness. Non-technical factors, such as institutional trust, communication, and perceptions of surveillance, also influenced outcomes.
The six-model lens clarifies how compute locus and data addressability interact with privacy, functionality, and control. Beyond COVID-19, the framework generalizes to future digital-health settings, supporting privacy-first designs aligned with data-protection principles.
This study underscores the importance of embedding privacy-by-design into digital health platforms. Governments and health authorities must not treat privacy as a trade-off but as a strategic enabler of trust and cooperation. By implementing robust encryption, data minimization, anonymization, and transparent governance, CT systems can ensure both public safety and individual rights. In doing so, they can increase participation, enhance effectiveness, and strengthen collective efforts to control the spread of infectious diseases, now and in the future.
Implications: The six-model lens and 24-indicator rubric translate into concrete deployment choices, compute-locus, data addressability, and governance controls that align implementations with G1–G3 and remain applicable beyond COVID-19.
Limitations: Our evaluation relies on publicly documented behavior and artifacts, which vary in depth and currency across jurisdictions; inter-rater agreement was substantial for privacy but lower for functionality; and the reliability check used a representative subset of platforms. Baseline aggregation is unweighted by design; we mitigate weight subjectivity with a 1000-draw sensitivity analysis, but alternative stakeholder weights may reorder close models. We verified architecture-level properties under the stated threat model rather than providing machine-checked protocol proofs or user-level field trials.
Future research: Formal verification of goals G1–G3 under Section 3.2 threat model (e.g., ProVerif/Tamarin) can be a next step, alongside expanded double-coding on a larger platform set, stakeholder-weighted MCDA (Multi-Criteria Decision Analysis) to reflect policy priorities, and longitudinal measurement of operational KPIs (verification latency, notification coverage, false-positive/relay susceptibility, interoperability, retention/exit). Pilot applications in adjacent domains (e.g., IoT beacons and wearables, cloud-integrated case management, and blockchain-backed auditability using verifiable credentials/PSI/PIR) can further validate how the classification guides design under evolving public-health needs.

Author Contributions

Conceptualization, S.A. and J.A.; methodology, S.A. and J.A.; software, S.A.; validation, S.A.; investigation, S.A. and J.A.; writing—original draft preparation, S.A.; writing—review and editing, S.A. and J.A.; visualization, J.A.; supervision, J.A.; project administration, J.A.; funding acquisition, J.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the NSERC Discovery program grant number RGPIN-2015-06048.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Table A1. Indicator catalog and scoring rubric (24 indicators). Defines P1–P6 (Privacy), S1–S6 (Security), F1–F6 (Functionality), and G1–G6 (Governance), with decision rules for 1/0.5/0 and typical evidence sources. Aligns with goals G1–G3 and the threat model in Section 3.2.
Table A1. Indicator catalog and scoring rubric (24 indicators). Defines P1–P6 (Privacy), S1–S6 (Security), F1–F6 (Functionality), and G1–G6 (Governance), with decision rules for 1/0.5/0 and typical evidence sources. Aligns with goals G1–G3 and the threat model in Section 3.2.
CodePillarIndicatorScoring Rubric (0/0.5/1)
P1PrivacyNo PII on public channels (BLE/network payloads){“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
P2PrivacyRotating IDs unlinkable across time/devices{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
P3PrivacyData minimization
(only needed metadata)
{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
P4PrivacyConsent-bound uploads &
limited scope
{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
P5PrivacyExplicit retention limits &
deletion
{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
P6PrivacyLocal-first matching by default{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
S1SecurityVerified diagnosis upload (lab/TAN){“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
S2SecuritySubmission validation & deduplication{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
S3SecurityReplay/relay resistance documented{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
S4SecurityNotification authenticity
(crypto)
{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
S5SecurityAbuse rate-limits/fraud controls{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
S6SecuritySecure transport & crypto transparency{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
F1FunctionalityAutomated proximity logging (BLE/QR){“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
F2FunctionalityEnd-to-end exposure notification workflow{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
F3FunctionalityVerification & follow-up to testing/care{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
F4FunctionalityInteroperability/federation/cross-region{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
F5FunctionalityOffline resilience (queued updates){“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
F6FunctionalityOpt-out & data deletion by user{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
G1GovernanceRole separation (PHA vs. infra/keys){“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
G2GovernanceAccess controls & least privilege{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
G3GovernanceTransparency (DPIA/privacy report){“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
G4GovernanceOpen source or external audit{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
G5GovernanceSunset/exit plan documented{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
G6GovernanceIncident response & disclosure{“1.0”: “Present/explicit”, “0.5”: “Partial/conditional/unclear”, “0.0”: “Absent/contradicted”}
Table A2. Model Score unweighted. Mean score (0–1) for each architectural model, averaged over its constituent platforms; higher values indicate stronger overall conformance.
Table A2. Model Score unweighted. Mean score (0–1) for each architectural model, averaged over its constituent platforms; higher values indicate stronger overall conformance.
ModelUnweighted Score
Bulletin Board Model0.822916667
Custodian Data Model0.791666667
Dedicated Servers Model0.770833333
Indexed Data Model0.708333333
Subset Data Model0.614583333
Fully Centralized Model0.583333333
Table A3. Platform Score unweighted. Mean score (0–1) across the 24 indicators for one exemplar of each architectural model (after averaging the two raters).
Table A3. Platform Score unweighted. Mean score (0–1) across the 24 indicators for one exemplar of each architectural model (after averaging the two raters).
PlatformModelUnweighted Score
SwissCovid (DP-3T/GAEN)Bulletin Board Model0.822917
Epione (UC Berkeley)Custodian Data Model0.791667
ConTra Corona (research)Dedicated Servers Model0.770833
Pronto-C2 (research)Indexed Data Model0.708333
TousAntiCovid (ROBERT)Subset Data Model0.614583
TraceTogether (BlueTrace)Fully Centralized Model0.583333
Table A4. Kappa_per_indicator Score. Computed from two independent raters across six representative platforms; pillar membership is shown for each indicator, and macro-averages by pillar are reported in Section 6  κ [ 1 , 1 ] , higher = stronger agreement).
Table A4. Kappa_per_indicator Score. Computed from two independent raters across six representative platforms; pillar membership is shown for each indicator, and macro-averages by pillar are reported in Section 6  κ [ 1 , 1 ] , higher = stronger agreement).
CodeKappaPillar
F10Functionality
F20Functionality
F30.4Functionality
F40Functionality
F50Functionality
F60Functionality
G11Governance
G21Governance
G30Governance
G40.142857143Governance
G50.666666667Governance
G60Governance
P10Privacy
P20.666666667Privacy
P31Privacy
P40.571428571Privacy
P50.7Privacy
P60.7Privacy
S10.6Security
S21Security
S30Security
S41Security
S50Security
S60Security

IRR Sensitivity Summary

  • Macro κ by pillar
    • Functionality: Macro κ = 0.067
    • Governance: Macro κ = 0.468
    • Privacy: Macro κ = 0.606
    • Security: Macro κ = 0.433
  • Baseline model scores (unweighted)
    • Bulletin Board Model: 0.823
    • Custodian Data Model: 0.792
    • Dedicated Servers Model: 0.771
    • Indexed Data Model: 0.708
    • Subset Data Model: 0.615
    • Fully Centralized Model: 0.583
  • Sensitivity (1000 draws)
    • Baseline Top-1 model: Bulletin Board Model
    • Top-1 change rate: 0.205
    • Top-2 set stability: 0.634
Table A5. Rater 1’s Ratings. six representative platforms × 24 indicators. Raw 0/0.5/1 entries used for κ computation and model-level means.
Table A5. Rater 1’s Ratings. six representative platforms × 24 indicators. Raw 0/0.5/1 entries used for κ computation and model-level means.
PlatformP1P2P3P4P5P6S1S2S3S4S5S6F1F2F3F4F5F6G1G2G3G4G5G6
TraceTogether (BlueTrace)10.50.50.50.5010.510.50.511110.5110.50.50.50.500.5
TousAntiCovid (ROBERT early)10.50.50.50.5010.510.50.511110.5110.50.510.50.50.5
SwissCovid (DP-3T/GAEN)11111110.5110.51110.50.51110.5110.50.5
Pronto-C2 (research)1111110.50.5110.51110.50.5110.50.50.50.500.5
ConTra Corona (research)111110.511110.51110.50.51110.50.50.500.5
Epione (UC Berkeley)11111111110.51110.50.5110.50.50.50.500.5
Table A6. Rater 2’s Ratings. six representative platforms × 24 indicators. Companion to Table A5 for inter-rater analysis; differences feed the Cohen’s κ ( κ ).
Table A6. Rater 2’s Ratings. six representative platforms × 24 indicators. Companion to Table A5 for inter-rater analysis; differences feed the Cohen’s κ ( κ ).
PlatformP1P2P3P4P5P6S1S2S3S4S5S6F1F2F3F4F5F6G1G2G3G4G5G6
TraceTogether (BlueTrace)0.50.50.50.50.5000.510.50.511110100.50.50.50.500.5
TousAntiCovid (ROBERT early)10.50.510.5010.510.50.5010.500.5100.50.510.50.50
SwissCovid (DP-3T/GAEN)11111110.5110.51110.510.5110.50.500.50.5
Pronto-C2 (research)10.511110.50.5010.51110.50.5110.50.50.5000.5
ConTra Corona (research)111101111100.510111110.510.500.5
Epione (UC Berkeley)11111111110.510.510.50.5110.50.5100.50.5

Appendix B

Table A7. Symbols and Terms. Standardizes terms for consistent usage across the paper.
Table A7. Symbols and Terms. Standardizes terms for consistent usage across the paper.
Symbol/TermMeaningUsed in
PIIPersonally identifiable information (e.g., name, phone, national ID)Threat model; Privacy indicators
TempIDShort-lived device pseudonym used for proximity beaconsCentralized/Hybrid models
TEKTemporary Exposure Key; seed from which RPIs are derivedGAEN/DP-3T (Bulletin Board)
RPIRolling Proximity Identifier broadcast to nearby devicesGAEN/DP-3T (Bulletin Board)
SeedUplinked value from which observers can recompute RPIsBulletin Board/Indexed
IndexPointer or reference to server-side data without raw contentIndexed Data model
PIDPseudonymous account/device ID used for backend associationCentralized/Subset
VCVerification Code bound to a lab result for diagnosis uploadAll models with case verification
Match (local)On-device risk computation against downloaded dataDecentralized models
Match (server)Server-side risk computation against uploaded dataCentralized/Hybrid
A1/A2/A3Adversaries: (A1) network attacker, (A2) malicious user,
(A3) honest-but-curious backend
Section 3.2 Threat model
G1–G3Goals: G1 PII secrecy (public channels); G2 authenticity
(verification/notifications); G3 unlinkability (rotating tokens)
Section 3.2; Section 7.4
P1/P2/S1/S4Indicators mapping to goals: P1 → G1, P2 → G3, S1/S4 → G2Section 3.1
TTL/RetentionTime-to-live/retention window for stored dataPrivacy/Governance
GatewayCross-jurisdiction exchange service for keys/alertsInteroperability
Table A8. Mathematical symbols, parameters and formulas used in methods and results, including domains and brief meanings.
Table A8. Mathematical symbols, parameters and formulas used in methods and results, including domains and brief meanings.
SymbolMeaning/DefinitionDomain/Units
F Number of indicators (here F = 24) N
I Set of all platforms; I m I : platforms in model mset
s f i r Score given by rater r for platform i on indicator f{0,0.5,1}
s f i Consensus score for platform i on indicator f: mean over raters[0, 1]
S i Platform unweighted score: S i = 1 F s u m f = 1 F s f i [0, 1]
S m Model unweighted score:
S m = 1 / I m i I m S i
I m
S pillar Pillar score: mean of indicators within a pillar[0, 1]
κ f Cohen’s kappa for indicator f between two raters[−1, 1]
κ ¯ P Macro-average kappa over indicators in pillar P[−1, 1]
w Indicator weight vector, w     R 0 F ,     s u m f w f =   1 simplex
w Dir 1 , , 1 Sampling scheme for sensitivity (uniform overweight simplex)
S i w Weighted platform score: s u m f w f s f i [0, 1]
S m w Weighted model score: mean of S i w f o r i     I m [0, 1]
Top-1 change rateFraction of weight draws where the top model differs from
unweighted baseline
[0, 1]
Top-2 set stabilityFraction of draws where the top-2 set matches baseline
(order ignored)
[0, 1]
Δ notify Verification/notification latency (test → code → notification)days
ρ share Positive users’ share rate (uploaded codes/positives)[0, 1]
C cov % of exposed contacts notified[0, 1]

Appendix B.1. Procedure: Scoring and Aggregation

  • Raters assign s f i r { 0,0.5,1 } from public evidence (rubric Table A1).
  • Compute consensus s f i by averaging over raters.
  • Compute platform score S i = 1 F s u m f s f i
  • For each model m, compute S _ m = 1 / I m s u m i I m S i
  • Report pillar means and overall means (unweighted baseline).

Appendix B.2. Procedure: Weight-Sensitivity

  • Sample w D i r 1 , , 1
  • For each platform, compute S i w = s u m f w f s f i
  • For each model, compute S m w by averaging platforms.
  • Rank models; tally Top-1 change rate and Top-2 set stability across 1000 draws.

Appendix C

Platform Notes

  • Tracetogether: TraceTogether is a centralized app launched in Singapore in March 2020 to help control the COVID-19 pandemic and provide comprehensive support for PHAs (Public Health Authorities (PHAs). This open-source app was developed by the Ministry of Health, GOVTECH & SG UNITED, and as of December 2022, it has been installed by over 4.9 million users, accounting for a significant portion of Singapore’s population.
    TraceTogether records user interactions via Bluetooth using the BlueTrace protocol [19]. The user’s interaction history is stored locally on personal devices and cannot be accessed directly by health authorities. If a user tests positive or is in contact with an infected person, they are prompted to share their encounter history by entering a Personal Identification Number (PIN). Upon authorization, health authorities can access the interaction database using the user’s PII to trace potentially exposed individuals [49]. However, TraceTogether limits data access to PHAs by following strict guidelines and regulations. A temporary and unique identifier, rather than personal details such as name or phone number, was assigned to each user’s device. This identifier is regularly updated to enhance privacy and maintain anonymity throughout the contact-tracing process [19].
  • Coronavirus Disease-19: The Coronavirus Disease-19 platform is a centralized contact tracing system utilized in South Korea. It collected and analyzed data from 323 hospitals and various governmental sources to help control the spread of COVID-19. This system gathers data from multiple sources, including security camera footage, mobile base station data, Global Positioning System (GPS), and credit card transaction records [64]. These data streams were used to identify potential hotspots, trace proximities, and map the travel logs of infected individuals.
    The system discloses patient contact-tracing data, including partially anonymized information such as demographics, infection status, and travel history. However, disclosing these details has raised significant privacy concerns, particularly regarding the balance between public safety and personal privacy [19]. Unlike other platforms, Coronavirus Disease-19 does not provide any self-reporting features. Additionally, the platform code has not been made publicly available, which limits the transparency of its operation. The South Korean government’s use of a multisource data collection approach for contact tracing was highly effective in controlling the spread of COVID-19. However, they continue to face scrutiny of privacy issues.
  • Health Code: The Health Code is a centralized contact-tracing system implemented in more than 300 cities across China. Its primary function is to allocate a color-based QR code (green, yellow, or red) to each user to represent their health status and risk of exposure to COVID-19 [41]. The system was operated by Tencent and Ant Group, utilizing a combination of GPS tracking and QR code technology [19], mainly integrated into popular apps, such as Alipay and WeChat. With over 900 million users (~70% of China’s population), it is one of the largest contact tracing systems in the world and is used extensively in urban and rural areas for access control and movement monitoring during pandemics [41].
    The platform employs a centralized system that assigns users a color-coded QR code (green, yellow, and red) based on their health status and exposure risk, determining their access to public spaces and travel. Using GPS, the system tracks user locations in real-time and analyzes their duration in high-risk areas for more accurate risk assessment [1]. The Health Code collects three key data types: personal information (e.g., national ID numbers and health symptoms), spatial-temporal data from daily activities via Alipay and WeChat, and geolocation data from network operators and GPS. The system has proven effective in controlling the spread of COVID-19 through real-time tracking of user movement patterns and extensive reach; however, it has also sparked significant legal and ethical debates regarding privacy and data protection.
  • COVIDSafe: COVIDSafe is a centralized contact tracing (CT) app launched by the Australian government in April 2020 with support from Amazon Web Services (AWS), with a reported user base of over 7 million downloads, reflecting substantial public participation at the national level. The app is available on the Apple Store and Google Play, and its use is voluntary. Upon downloading COVIDSafe, users register with basic details, such as name (or pseudonym), phone number, age, and postal code. The app uses a “digital handshake” through Bluetooth to exchange encrypted reference codes between nearby devices, storing them locally for 21 days, and, with user consent, uploads contact data to a centralized system if the user tests positive for COVID-19 to aid contact tracing [44,60].
    The app does not track real-time locations; it relies on proximity data to assess the potential exposure [65]. Despite these privacy measures, the app has been criticized for its low effectiveness owing to technical issues, such as Bluetooth limitations on specific devices and reliance on voluntary data uploads. This meant that not all potential exposures were logged or acted upon by health authorities [45,46].
  • StopCovid or TousAntiCovid: TousAntiCovid, initially launched as StopCovid in France in June 2020, is a decentralized contact tracing (CT) app aimed at curbing the spread of COVID-19. Developed through a collaborative effort between INRIA (France’s National Institute for Research in Computer Science and Automation) and Fraunhofer in Germany, the app was renamed TousAntiCovid in October 2020 to align with France’s broader anti-pandemic strategy [21,48]. As of its relaunch, TousAntiCovid has been downloaded by more than 5 million users, representing around 7.4% of France’s population [21].
    The app uses the ROBERT protocol, which was developed for use in decentralized contact-tracing systems. This protocol generates Ephemeral IDs (EphIDs), which are temporary, anonymous identifiers exchanged between devices via Bluetooth when users come into proximity [66]. In the event of exposure, an infected individual’s EphIDs are uploaded to a server in a staggered, randomized sequence to avoid potential tracking [19]. TousAntiCovid prioritizes privacy protection using temporary EphIDs, ensuring that no location data or personal information, such as names or phone numbers, is stored or shared. Data are kept decentralized, and users have complete control over whether to upload their data following a positive COVID test [48].
  • Aarogya Setu: Aarogya Setu is a centralized contact-tracing (CT) app launched by the Indian government in April 2020. It was mandatory in several workplaces and containment zones, reflecting its importance in India’s COVID-19 response strategies. Aarogya Setu was developed by the National Informatics Centre (NIC) under the Ministry of Electronics and Information Technology (MeitY). The app has been downloaded more than 214 million times, covering approximately 15.2% of India’s population. Its Android source code was published on 26 May 2020, to address concerns about transparency.
    The app collects PII, including names, contact information, location data (GPS coordinates), and user self-assessment data. The app also uses data mining to estimate the number of potential COVID-19 cases within a range of 500 m to 10 km from the user’s current location [19]. The app operates on a centralized architecture, where data is uploaded to government-controlled servers for processing and analysis.
    The transparency of the app improved when its Android source code was made public. Initially, its use was mandatory for individuals in containment zones; however, due to heightened privacy concerns, the mandate was reconsidered and gradually relaxed in subsequent waves of the pandemic, reflecting the need to balance public health measures with individual privacy rights. In addition, despite the government’s efforts to ensure data security, the centralized architecture has raised other issues regarding user consent and data management [21].
  • GAEN APIs’ Apps: Apple and Google jointly developed a privacy-preserving exposure notification system in 2020 to support global contact-tracing efforts. This system provides a framework for health organizations to build decentralized apps, such as Canada’s COVID Alert and Germany’s Corona-Warn-App [61]. By April 2021, 65 applications had adopted these APIs globally, implementing the Associated Encrypted Metadata (AEM) approach for exposure notification services [39,40]. The exposure notification system uses Bluetooth Low Energy (BLE) to identify the proximity of two devices. They exchange encrypted random identifiers (EphIDs or Rolling Proximity Identifiers) stored locally on devices. The decentralized architecture ensures that contact logs remain on users’ devices unless they are shared with public health authorities. Unlike traditional contact-tracing systems, Apple and Google cannot access any data collected via these APIs. These APIs have enabled public health authorities worldwide to implement contact tracing with minimal privacy concerns by emphasizing user privacy, decentralization, and seamless cross-platform integration.
  • PACT East Coast: The PACT (Private Automated Contact Tracing) East Coast protocol is a decentralized contact tracing system developed through a collaborative research effort involving prestigious institutions such as Massachusetts General Hospital, Boston University, Carnegie Mellon University, Weizmann Institute of Science, SRI International, Brown University, and Lincoln Laboratory [51]. The PACT East Coast results from an interdisciplinary collaboration between these institutions, integrating public health, computer science, and data privacy expertise. The system is not widely deployed as a national platform but is a research-driven prototype for privacy-focused contact tracing. It emphasizes a decentralized structure, ensuring that data remains local on users’ devices unless voluntarily shared. Moreover, the PACT East Coast uses BLE technology to collect anonymous chirps, that is, short signals exchanged between nearby devices. These chirps include the time of receipt and signal strength, which help determine the proximity between devices [50]. Users can also opt to record additional metadata, such as location, in their device’s local log.
    The app allows users to self-report their contacts, and the data can be synchronized in real-time with public health information systems. The decentralized nature of the platform ensures that users retain control over their data with optional location data collection to enhance the accuracy of exposure detection. Its cross-platform functionality and user-friendly design render it a valuable tool for research and potential public health use. However, its reliance on user-driven data uploads and limited support for PHAs may present challenges for its widespread implementation.
  • COVIDSafe-PACT (West-Coast): COVIDSafe-PACT (West Coast) is a decentralized mobile contact tracing (CT) protocol designed by researchers at the University of Washington [7]. Similarly to its East Coast counterpart, the West Coast (PACT) emphasizes privacy-preserving contact tracing by keeping user data encrypted and stored locally on smartphones. Launched in Washington State, the app has been installed by over two million users, covering approximately 26% of the population. The app uses BLE to transmit pseudorandom IDs, anonymizing each device during the proximity exchanges. When two users contact each other, their smartphones broadcast and receive these anonymous IDs, which are stored locally on their devices. Like PACT (East Coast), users are voluntarily asked to upload their encounter logs to public health authorities if they test positive for COVID-19 [51].
    The West Coast system uses a distinct key-based mechanism to generate pseudorandom IDs. The keychain architecture is more storage-efficient, requiring fewer initial seeds (values used to create pseudoIDs) to be stored compared with the PACT East Coast [50]. This design improves the overall performance and resource management of the app. Public health authorities (PHAs) can also customize apps by introducing new data components or enforcing validation rules for data use. However, its limited language support and lack of technical assistance for public health authorities present potential barriers to its widespread customization and adoption.
  • DP3T: The DP3T (Decentralized Privacy-Preserving Proximity Tracing) protocol was designed as a privacy-focused alternative to centralized contact tracing systems and was led by the Swiss Federal Institute of Technology (EPFL). It has since been adopted in various European countries as the foundation for their COVID-19 contact tracing apps, such as Switzerland’s SwissCovid, Spain’s Radar COVID, and Denmark’s Smittestop [57]. DP3T uses Bluetooth-based tracking to generate temporary anonymized identifiers called Ephemeral IDs (EphIDs) exchanged between nearby devices.
    Each device stores these EphIDs locally, and if a user tests positive for COVID-19, they can voluntarily upload their daily keys to the central server. The server then converts these daily keys into EphIDs, which are cross-checked against the users’ local EphIDs to determine the exposure risk. No identifiable information is shared, and no centralized database stores user movements or contacts. Although the database is unencrypted, the protocol prevents passive tracking and minimizes the risk of third-party surveillance. However, the lack of root detection features may leave an app vulnerable to malicious attacks by applications with root access, potentially exposing the local contact-tracing database.
  • SwissCovid-DP-3T: SwissCovid is a decentralized, open-source contact-tracing platform based on the DP3T (Decentralized Privacy-Preserving Proximity Tracing) protocol. Developed by the Federal Office of Public Health (FOPH) in collaboration with Swiss institutions, including the Swiss Federal Institute of Technology (EPFL), the DP3T protocol was adapted for national use in Switzerland. It has garnered over 3.18 million users, representing approximately 37% of the Swiss population [52]. The app has undergone upgrades to address security concerns, including the release of an unlinkable’ version to mitigate Linking and Enumeration attack risks. The updated version ensures that EphIDs are unlinkable and cannot be used to trace or identify individuals even after downloading the daily keys of an infected person [53].
    The risk assessment is conducted locally on each device, minimizing the need for data sharing with health authorities. However, PHAs can customize apps by adding new data elements and adjusting validation rules. SwissCovid also allows public health authorities to define parameters for infectious range, setting thresholds such as proximity (within 6 feet) and duration (contact for 30 min or more) to determine the potential risk of transmission.
  • CovidWatch–TCN: The CovidWatch (TCN Temporary Contact Numbers) is a decentralized, open-source contact-tracing app launched in the United States in partnership with ADHS-Arizona, Stanford University, and the University of Waterloo. The app has been adopted by over 10,000 users, accounting for roughly 10% of the population of the University of Waterloo [54]. Its adoption, although limited, demonstrates the importance of privacy-preserving features in contact-tracing apps, particularly in academic settings. CovidWatch generates TCNs, that is, pseudorandom identifiers, which are exchanged and stored locally on user devices during encounters. When users test positive, they can report their status, enabling others to compare their local logs to match TCNs and receive exposure notifications if a match is found [67].
    The app preserves privacy by not collecting personal or location data, and logs remain on the users’ devices unless they are voluntarily shared, ensuring that no central authority accesses identities or movements. The app employs end-to-end encryption to protect data exchanges, and users are notified of potential exposure without revealing the identity of the infected person. PHAs can customize features and implement data validation protocols; however, the core privacy-preserving principles of the app remain intact.
  • Immuni: Immuni is a decentralized, open-source contact-tracing application based on the Pronto protocol. The Italian government developed it in collaboration with the University of Salerno, the Ministry of Health, and the Ministry for Innovation Technology, and Digitalization. Launched in 2020, the app has garnered over 19 million users, representing approximately 36.7% of Italy’s population [21,43]. A unique feature of Immuni is its use of blockchain techniques to securely share exposure data with PHAs and epidemiologists. Blockchain adds a layer of security by making data tamper-resistant and helps maintain its integrity in the contact tracing process. Despite its multilingual support and additional privacy measures, the app’s adoption rate remained modest compared with Italy’s population until April 2021. This number includes an increase driven by the app’s role in the Green Pass system, which allowed users to store their COVID-19 vaccination certificates. However, despite the many downloads, the app’s effectiveness in contact tracing remains limited because of the lack of widespread adoption and integration with local health authority systems.
  • Hamagen: Hamagen, meaning “The Shield” in Hebrew, is a GPS-based contact-tracing app developed by Israel’s Ministry of Health and adopted by over 2.5 million users, representing approximately 26.9% of Israel’s population [19,21]. Hamagen compared a user’s GPS location history with a database of confirmed cases maintained by the Ministry of Health. The app emphasizes individual control over data, enables users to review discrepancies in matched locations, and reports false positives. If users confirm their presence at a reported location, the area is designated as high-risk, and this data is uploaded to the Ministry of Health’s database. Despite its GPS-based contact tracing, the app does not track users in real-time but instead compares location data to past movements stored on the device. Users also have the option to delete their data at any time, although reliance on GPS has raised privacy concerns.
  • DESIRE Protocol: The decentralized and secure identification of risks of exposure (DESIRE) protocol was developed through collaboration among several European academic and research institutions, primarily led by researchers at the French National Institute for Research in Computer Science and Automation (INRIA). It is designed as a decentralized contact-tracing solution that focuses on the cryptographic separation between users’ communication data and identities. The protocol uses Private Encounter Tokens (PETs) that are cryptographically generated and exchanged during user interactions. Unlike Ephemeral IDs (EphIDs) directly tied to user identifiers, PETs are anonymized and stored separately, ensuring that no direct link can be made between individuals based on data exchanges [58]. Additionally, client-side encryption ensures that data breaches or losses at the server level do not compromise the user information [58,68]. Furthermore, the protocol prevents the aggregation of social graphs or other patterns from being constructed from users’ proximity data, making it more difficult for malicious actors to analyze communication patterns for tracking purposes.
  • COVID Safe Paths: COVID Safe Paths, initially known as Private Kit, is a decentralized contact-tracing application developed by a team at MIT Media Lab led by Associate Professor Ramesh Raskar. Launched in the United States, the app has a user base of approximately 10,000 and continues to operate as a pilot project that focuses on privacy preservation. The app stores tracing histories, including contact device IDs and duration of interactions, in a plain text format within the user’s local database [6]. The app enables users to report their test results and share relevant demographic information, helping public health authorities (PHAs) track the spread of infection. The server is responsible for managing notifications and conducting risk analysis, thereby reducing the likelihood of linkage attacks and enumeration by other users [1,55]. The app also features automatic updates for communities, alerting users within 6 m of a confirmed case for 30 min or more. This feature ensures that critical exposure notifications are delivered while maintaining patient anonymity.
  • ConTra Corona: ConTra Corona is a decentralized contact-tracing protocol developed by Germany’s FZI Research Center for Information Technology and the Karlsruhe Institute of Technology. The protocol powers the Corona-Warn-App, launched in March 2021, with a user base of over 48 million installations, covering approximately 58% of Germany’s population. Although ConTra Corona shares some characteristics with hybrid architectures, it significantly diverges from protocols such as DESIRE by focusing on DDH (Decisional Diffie-Hellman) based authentication rather than simply generating IDs [42].
    Each device in the system generates anonymous IDs that are exchanged via Bluetooth and uploaded to the central server upon detection of disease exposure. Utilizing DDH key exchange prevents linkage attacks, which can compromise the user’s anonymity [69]. Additionally, the protocol mandates that Public Health Authorities (PHAs) verify the authenticity of COVID-19 reports and the identity of individuals uploading their data, thus minimizing the risk of DoS attacks.
  • EpiOne: EpiOne is a privacy-preserving contact-tracing protocol developed by a research team led by the University of California at Berkeley, with a modest user base through its app, epione.net Patients, with over 500 users. EpiOne’s emphasis on privacy stems from its ability to prevent interactions and social graph analysis [59]. It uses a private set intersection protocol, that is, a cryptographic method that allows devices to generate and exchange random IDs (tokens) based on a shared seed [21]. The system tracks both sent and received tokens, and if a user’s tests are positive for an infection, they share their seed with public health authorities, who can recreate the tokens sent to the server. By ensuring that neither the server nor the user has complete access to each other’s data, EpiOne aims to safeguard the anonymity of users and prevent the misuse of the contact history.

Appendix D

Security Guidelines and Case Notes

  • Security Risks and Attacks
    Our earlier analysis focused on the characteristics of various tools and assessed the general attributes attached to each tool. We primarily evaluated the user experience with these Contact Tracing (CT) platforms, granting access only to authorized individuals within the scope of privacy considerations, which only superficially addressed privacy properties. Although this approach offers insights into the quality of tools based on user experience, it needs to effectively highlight the efficacy of CT systems in specific healthcare jurisdictions, particularly concerning privacy and security issues. To address this, we identified potential attacks that could target these systems, thereby posing threats to privacy and security. These findings are detailed and summarized in Table 3 and Table 4, which provide a comprehensive overview of vulnerabilities across different platforms.
  • Single Point of Risk/Attack: A primary concern among users revolves around the potential misuse of their data by government officials for purposes other than contact tracing. For instance, despite the initial assurance that Singapore’s contact tracing app would be solely used for combating COVID-19, it was later reported that police could access its data for criminal investigations [70]. To address these privacy concerns, specific app designs and architectures, such as PACT East Coast, COVID-Safe PACT, DP-3T Unlinkable, and the PRONTO-C2 protocol, aim to anonymize user data. They generate unidentified IDs for devices, thereby preventing servers from linking them to individuals’ personal data. These distributed designs confine data management to the users’ smartphones, keeping PII off the server and allowing users to assess their health status independently. This decentralized approach reduces the risk of a single point of failure, such as a compromised central server [71,72,73]. Moreover, the decentralized architecture typically involves a minimally used central server, mainly for broadcasting and functioning as a middleware between patients and hospitals. As a result, it is less susceptible to a range of server-based attacks, thus enhancing overall data security.
  • Linkage Attack: Here, a client attempts to de-anonymize another client’s PII by correlating the anonymous data transmitted during communication with the additional data collected through secondary channels. This method of associating an obscure ID with a client’s known PII is called a linkage attack. For instance, CovidWatch, which adopts a decentralized approach, logs interactions and includes details such as day, time, duration, location, and gender. Suppose that a user receives a notification of potential exposure. In this case, they can identify the person they were exposed to by matching their interaction records with the time and duration indicated in the received chirps. In centralized systems, such as the Health Code, it is more feasible to de-anonymize close interactions. However, identifying a specific case is challenging because app users need access to a set of pseudonymous/Temp IDs for comparison. However, identification is possible when a quarantined user receives a contact alert after meeting only a single person. In such cases, the pseudoIDs can be linked to a specific user by cross-referencing factors such as the advertised mobile model number, contact duration, and uniqueness of the interaction [18,19,74,75]. Hybrid protocols such as DESIRE are typically considered unlinkable and do not share Private Encounter Tokens (PETs) from infected clients with other users. They conduct risk analysis and send alerts, such as centralized systems, mitigating the risks of linkage attacks and preserving anonymity.
  • Denial Of Service (DOS): This attack aims to deplete the resources (such as power and bandwidth) available in a system, which can be a client device or server. In this context, we consider a scenario in which an attacker introduces false interaction chirps into a contact-tracing ecosystem. Although the server initially processes these fake interactions in a centralized architecture, it discards them after completing the validity check. Conversely, verifying the authenticity of the received chips in a decentralized system is challenging if they are correctly formatted to appear legitimate. This inability to effectively filter out false data can lead to resource drainage and potential disruptions in the decentralized contact tracing process.
  • Replay/Relay Attack: This type of attack is considered one of the simplest methods to execute against users of a contact-tracing (CT) application. An attacker can intercept and rebroadcast the content transmitted by a user, either at the exact location to extend its reach or later. This is known as a replay attack, mainly when the bogus content carries a legitimate identifier such as a TempID or chirp. Otherwise, it falls under a DoS attack. In this context, a chirp is usually created using a pseudorandom function, incorporating TempID and the current time. In centralized applications such as BlueTrace, where pseudoIDs have a short lifespan (typically 15 min), a replay attack can be executed before TempID expires. If someone who receives this rebroadcast message later tests positive for COVID-19, the original sender might be falsely identified as a close contact and advised to undergo testing, leading to a false positive. In decentralized apps, such as PACT and DP3T, the systems check the shared timestamp of all stored chirps against the creation time of each rebroadcast chirp. They are likely to accept only those chirps where the timestamps match, a measure to guard against replay attacks. However, an attack can occur a minute before the chirp expires. In centralized designs, the victim is the originator of the replayed message. By contrast, in decentralized models, the victims are multiple recipients of the replayed message. Hybrid models, such as Inria-EpiOne, still have vulnerabilities to relay attacks because symmetrical data could exist in the PET table managed by two hosts with malicious intent. However, because only one user receives the replayed EphID and the calculated PETs are only accessible to the recipient, replay attacks are less feasible. If the recipient of a replayed system tests positive, the replayed PETs cannot be matched with any other PET, further reducing the risk of successful replay attacks.
  • Traffic Analysis Attack: In this scenario, malicious entities, whether individuals, applications, or organizations, aim to exploit the contact-tracing system by capturing temporary identifiers and seeds from recorded interactions. They then attempted to link these identifiers or chirps to additional information obtained through other means. Furthermore, an adversary that is capable of intercepting messages initiates a traffic analysis attack. The attacker’s goal is to identify users who have tested positive for COVID-19, because only those confirmed as infected are authorized to upload their seeds to the server. This attack leverages the observation of network traffic patterns to infer sensitive information, explicitly targeting the identification of infected individuals in the contact-tracing process.
2.
CT Platforms’ Security Guidelines
Based on our ad hoc analysis, this study aims to shed light on additional findings concerning security vulnerabilities in contact-tracing (CT) platforms and guide the discussion on general security guidelines for these systems. For instance, the TraceTogether app, which utilizes a centralized approach, faces significant privacy risks. A notable concern in its design is the inclusion of a support repository for third-party customers, specifically, the Zendesk SDK. This setup enables remote debugging from WebView, thereby creating a potential security loophole. An attacker can exploit this to dump content from WebView, posing a threat to the privacy and security of the app’s users [49]. When users input sensitive information, such as passwords and personal identity details, into a WebView with debugging enabled, this presents an opportunity for hackers. They can employ remote debugging tools to inspect all elements on a webpage, potentially accessing private data. As a security measure for TraceTogether, it is crucial to ensure that WebView is not left in debugging mode in the device’s release version.
On the other hand, Coronavirus Disease-19 Solutions that utilize GPS, a characteristic of centralized systems, may encounter risks associated with mass surveillance [56]. The foundation of an app’s security is laid during the development phase. Development teams must adhere to mobile security guidelines such as those provided by the Open Web Application Security Project (OWASP) Mobile Security Testing Guide [26]. These guidelines can significantly enhance an app’s security posture and protect it against potential threats.
The provisional legislative system in CovidSafe does a creditworthy job of answering privacy issues, but is not yet entirely defensive. This system relies on the right of the courts to issue warrants to access and review data obtained by the application, surveillance powers, preservation of information, and distribution to local law enforcement authorities. There are broader concerns regarding users’ willingness to consent to using their data by contact-tracing apps. For example, although StopCovid is an open-source application, this openness means that its source code is accessible to the public. This accessibility, if not properly managed and secured, can expose software to various threats. An attacker may exploit this to discreetly breach the app processes. To safeguard against such vulnerabilities, protection strategies must extend beyond merely modifying the code. This includes altering the app’s data and resources, updating the device APIs with which it interacts, and dynamically managing the contents of the app’s memory [69,76]. These comprehensive measures are essential to ensure the security and integrity of the application, particularly given its open-source nature.
Although Aarogya Setu effectively tracks a user’s location and requires constant Bluetooth access, this can be intrusive from a security and privacy standpoint. Similarly, cooperative protocols such as West Coast (PACT) are susceptible to linkage and enumeration attacks. This vulnerability arises because seeds from compromised users are sent to the registry and shared with others. These seeds can be used to link identity to anonymous data. In contrast, the DP3T architecture, which recognizes the susceptibility of decentralized systems to such attacks, implements measures such as database encryption and root detection [57]. This approach enhances the security of sensitive data, particularly at the startup of an application, to prevent data breaches and protect the database from unauthorized extraction. However, if the database containing timestamps and contact IDs were compromised, it could be exploited for adversary linkage attacks. With sufficient data gathered, attackers can use this information to track movements and identify individuals through linkage attacks. This scenario underscores the importance of robust security measures in contact-tracing apps to protect against potential breaches and misuse of sensitive data [64].
In addition, the DESIRE server takes on the role of risk mitigation and notification, eliminating the potential risks associated with clients in decentralized versions that could lead to Enumeration and Linkage attacks. This centralized approach helps bolster security. However, COVID Safe Paths has faced several vulnerabilities, as highlighted in a published report on 14 May 2020, in CVE-2020-12857. The COVID Safe app incorrectly retains GATT characteristics, such as Temp-IDs, for an extended period rather than regularly clearing them out [46,60]. This oversight means that if an attacker intercepts the data during a transaction, they can potentially monitor the transaction in the long run, posing a security risk to users. This underscores the importance of promptly clearing sensitive data to enhance the security of contact tracing apps.

References

  1. Mann, M.; Mitchell, P.; Foth, M. Between surveillance and technological solutionism: A critique of privacy-preserving apps for COVID-19 contact-tracing. New Media Soc. 2024, 26, 4099–4117. [Google Scholar] [CrossRef]
  2. Gvili, Y. Security Analysis of the COVID-19 Contact Tracing Specifications by Apple Inc. and Google Inc. 2020, 2020/428. Available online: https://eprint.iacr.org/2020/428 (accessed on 24 October 2024).
  3. Liu, J.K.; Au, M.H.; Yuen, T.H.; Zuo, C.; Wang, J.; Sakzad, A.; Luo, X.; Li, L.; Choo, K.K.R. Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach. Cryptology ePrint Archive. 2020. Available online: https://eprint.iacr.org/2020/528 (accessed on 23 October 2024).
  4. Simko, L.; Calo, R.; Roesner, F.; Kohno, T. COVID-19 Contact Tracing and Privacy: Studying Opinion and Preferences. arXiv 2020, arXiv:2005.06056. [Google Scholar] [CrossRef]
  5. Fitzsimons, J.K.; Mantri, A.; Pisarczyk, R.; Rainforth, T.; Zhao, Z. A note on blind contact tracing at scale with applications to the COVID-19 pandemic. In Proceedings of the 15th International Conference on Availability, Reliability and Security, Dublin, Ireland, 25–28 August 2020; ACM: New York, NY, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
  6. Contact Tracing Is Failing in Many States. Here’s Why—The New York Times. Available online: https://www.nytimes.com/2020/07/31/health/covid-contact-tracing-tests.html (accessed on 24 October 2024).
  7. Chan, J.; Foster, D.; Gollakota, S.; Horvitz, E.; Jaeger, J.; Kakade, S.; Kohno, T.; Langford, J.; Larson, J.; Sharma, P.; et al. PACT: Privacy Sensitive Protocols and Mechanisms for Mobile Contact Tracing. arXiv 2020, arXiv:2004.03544. [Google Scholar] [CrossRef]
  8. Williams, S.N.; Armitage, C.J.; Tampe, T.; Dienes, K. Public attitudes towards COVID-19 contact tracing apps: A UK-based focus group study. Health Expect. 2021, 24, 377–385. [Google Scholar] [CrossRef] [PubMed]
  9. Oliver, N.; Lepri, B.; Sterly, H.; Lambiotte, R.; Deletaille, S.; De Nadai, M.; Letouzé, E.; Salah, A.A.; Benjamins, R.; Cattuto, C.; et al. Mobile phone data for informing public health actions across the COVID-19 pandemic life cycle. Sci. Adv. 2020, 6, eabc0764. [Google Scholar] [CrossRef]
  10. Martin, T.; Karopoulos, G.; Hernández-Ramos, J.L.; Kambourakis, G.; Fovino, I.N. Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps. Wirel. Commun. Mob. Comput. 2020, 2020, 8851429. [Google Scholar] [CrossRef]
  11. Bulchandani, V.B.; Shivam, S.; Moudgalya, S.; Sondhi, S.L. Digital herd immunity and COVID-19. Phys. Biol. 2021, 18, 045004. [Google Scholar] [CrossRef]
  12. PRIME PubMed|Impact of Delays on Effectiveness of Contact Tracing Strategies for COVID-19: A Modelling Study. Available online: https://www.unboundmedicine.com/medline/citation/32682487/Impact_of_delays_on_effectiveness_of_contact_trac-ing_strategies_for_COVID_19 (accessed on 23 October 2024).
  13. Reichert, L.; Brack, S.; Scheuermann, B. Privacy-Preserving Contact Tracing of COVID-19 Patients. Cryptology ePrint Archive. 2020. Available online: https://eprint.iacr.org/2020/375 (accessed on 24 October 2024).
  14. Dar, A.B.; Lone, A.H.; Zahoor, S.; Khan, A.A.; Naaz, R. Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions. Comput. Sci. Rev. 2020, 38, 100307. [Google Scholar] [CrossRef]
  15. Hekmati, A.; Ramachandran, G.; Krishnamachari, B. CONTAIN: Privacy-oriented contact tracing protocols for epidemics. In Proceedings of the 2021 IFIP/IEEE International Symposium on Integrated Network Management (IM), Bordeaux, France, 17–21 May 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 872–877. Available online: https://ieeexplore.ieee.org/abstract/document/9464051/ (accessed on 23 October 2024).
  16. Zhang, H.; She, D.; Qian, Z. Android Root and its Providers: A Double-Edged Sword. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, Denver, CO, USA, 12–16 October 2015; ACM: New York, NY, USA, 2015; pp. 1093–1104. [Google Scholar] [CrossRef]
  17. Geist, D.; Nigmatullin, M.; Bierens, R. Jailbreak/Root Detection Evasion Study on iOS and Android. MSc System and Network Engineering. 2016. Available online: https://rp.os3.nl/2015-2016/p51/report.pdf (accessed on 23 October 2024).
  18. Cho, H.; Ippolito, D.; Yu, Y.W. Contact Tracing Mobile Apps for COVID-19: Privacy Considerations and Related Trade-offs. arXiv 2020, arXiv:2003.11511. [Google Scholar] [CrossRef]
  19. Sun, R.; Wang, W.; Xue, M.; Tyson, G.; Camtepe, S.; Ranasinghe, D. Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications. arXiv 2020, arXiv:2006.10933. [Google Scholar] [CrossRef]
  20. Krishnan, A.S.; Yang, Y.; Schaumont, P. Risk and Architecture factors in Digital Exposure Notification. 2020, 2020/582. Available online: https://eprint.iacr.org/2020/582 (accessed on 24 October 2024).
  21. Ahmed, N.; Michelin, R.A.; Xue, W.; Ruj, S.; Malaney, R.; Kanhere, S.S.; Seneviratne, A.; Hu, W.; Janicke, H.; Jha, S.K. A survey of COVID-19 contact tracing apps. IEEE Access 2020, 8, 134577–134601. [Google Scholar] [CrossRef]
  22. Alanzi, T. A Review of Mobile Applications Available in the App and Google Play Stores Used During the COVID-19 Outbreak. J. Multidiscip. Healthc. 2021, 14, 45–57. [Google Scholar] [CrossRef]
  23. Vinuesa, R.; Theodorou, A.; Battaglini, M.; Dignum, V. A socio-technical framework for digital contact tracing. Results Eng. 2020, 8, 100163. [Google Scholar] [CrossRef]
  24. Jacob, S.; Lawarée, J. The adoption of contact tracing applications of COVID-19 by European governments. Policy Des. Pract. 2020, 4, 44–58. [Google Scholar] [CrossRef]
  25. Abtahi, A.; Payer, M.; Aminifar, A. DP-ACT: Decentralized Privacy-Preserving Asymmetric Digital Contact Tracing. Proc. Priv. Enhancing Technol. (PoPETs) 2024, 2024, 330–342. [Google Scholar] [CrossRef]
  26. Akinbi, A.; Forshaw, M.; Blinkhorn, V. Contact tracing apps for the COVID-19 pandemic: A systematic literature review of challenges and future directions for neo-liberal societies. Health Inf. Sci. Syst. 2021, 9, 18. [Google Scholar] [CrossRef]
  27. Shahroz, M.; Ahmad, F.; Younis, M.S.; Ahmad, N.; Boulos, M.N.K.; Vinuesa, R.; Qadir, J. COVID-19 digital contact tracing applications and techniques: A review post initial deployments. Transp. Eng. 2021, 5, 100072. [Google Scholar] [CrossRef]
  28. Ho, K.K.; Chiu, D.K.; Sayama, K.L. When privacy, distrust, and misinformation cause worry about using COVID-19 contact-tracing apps. IEEE Internet Comput. 2023, 27, 7–12. [Google Scholar] [CrossRef]
  29. Jalabneh, R.; Syed, H.Z.; Pillai, S.; Apu, E.H.; Hussein, M.R.; Kabir, R.; Arafat, S.Y.; Majumder, M.A.A.; Saxena, S.K. Use of Mobile Phone Apps for Contact Tracing to Control the COVID-19 Pandemic: A Literature Review. SSRN, 2020; Preprint. [Google Scholar] [CrossRef]
  30. Kuo, K.-M. Antecedents Predicting Digital Contact Tracing Acceptance: A Systematic Review and Meta-Analysis. BMC Med. Inform. Decis. Mak. 2023, 23, 212. [Google Scholar] [CrossRef]
  31. Digital Contact Tracing Applications During COVID-19: A Scoping Review About Public Acceptance. Available online: https://www.mdpi.com/2227-9709/8/3/48 (accessed on 24 October 2024).
  32. Bito, S.; Hayashi, Y.; Fujita, T.; Takahashi, I.; Arai, H.; Yonemura, S. Survey of Citizens’ Preferences for Combined Contact Tracing App Features During a Pandemic: Conjoint Analysis. JMIR Public Health Surveill. 2024, 10, e53340. [Google Scholar] [CrossRef]
  33. Palmer, A.; Sharma, S.; Nagpal, J.; Kimani, V.; Mai, F.; Ahmed, Z. Identifying Barriers to the Adoption of Digital Contact Tracing Apps in England: Semistructured Interview Study with Professionals Involved in the Pandemic Response. JMIR Form. Res. 2024, 8, e56000. [Google Scholar] [CrossRef] [PubMed]
  34. Elers, P.; Emery, T.; Derrett, S.; Chambers, T. Barriers to Adopting Digital Contact Tracing for COVID-19: Experiences in New Zealand. Health Expect. 2024, 27, 395–404. [Google Scholar] [CrossRef] [PubMed]
  35. Geenen, C.; Raymenants, J.; Gorissen, S.; Thibaut, J.; McVernon, J.; Lorent, N.; André, E. Individual-Level Analysis of Digital Proximity Tracing for COVID-19 in Belgium Highlights Major Bottlenecks. Nat. Commun. 2023, 14, 6897. [Google Scholar] [CrossRef] [PubMed]
  36. Kendall, M.; Tsallis, D.; Wymant, C.; Di Francia, A.; Balogun, Y.; Didelot, X.; Ferretti, L.; Fraser, C. Epidemiological Impacts of the NHS COVID-19 App in England and Wales Throughout Its First Year. Nat. Commun. 2023, 14, 1005. [Google Scholar] [CrossRef]
  37. Leng, T.; Hill, E.M.; Keeling, M.J.; Tildesley, M.J.; Thompson, R.N. The Effect of Notification Window Length on the Epidemio-logical Impact of COVID-19 Contact-Tracing Mobile Applications. Commun. Med. 2022, 2, 69. [Google Scholar] [CrossRef]
  38. Masel, J.; Petrie, J.I.M.; Bay, J.; Ebbers, W.; Sharan, A.; Leibrand, S.M.; Gebhard, A.; Zimmerman, S. Combatting SARS-CoV-2 with Digital Contact Tracing and Notification: Navigating Six Points of Failure. JMIR Public Health Surveill. 2023, 9, e49560. [Google Scholar] [CrossRef]
  39. Privacy-Preserving Contact Tracing—Apple and Google. Apple. Available online: https://www.apple.com/covid19/contacttracing (accessed on 24 October 2024).
  40. Exposure Notifications: Helping Fight COVID-19—Google. Available online: https://blog.google/inside-google/company-announcements/update-exposure-notifications/ (accessed on 16 September 2025).
  41. Liang, F. COVID-19 and Health Code: How Digital Platforms Tackle the Pandemic in China. Soc. Media + Soc. 2020, 6, 2056305120947657. [Google Scholar] [CrossRef]
  42. Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T. ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy. In Advances in Cryptology—ASIACRYPT; Tibouchi, M., Wang, H., Eds.; Lecture Notes in Computer Science; Springer International Publishing: Cham, Switzerland, 2021; Volume 13091, pp. 665–695. [Google Scholar] [CrossRef]
  43. Avitabile, G.; Botta, V.; Iovino, V.; Visconti, I. Towards Defeating Mass Surveillance and SARS-CoV-2: The Pronto-c2 Fully Decentralized Automatic Contact Tracing System. Cryptology ePrint Archive. 2020. Available online: https://eprint.iacr.org/2020/493 (accessed on 24 October 2024).
  44. COVIDSafe. GitHub. Available online: https://github.com/AU-COVIDSafe (accessed on 23 October 2024).
  45. Cohney, S.; Cheong, M. COVID Down Under: Where did Australia’s pandemic apps go wrong? In Proceedings of the 2023 IEEE International Symposium on Ethics in Engineering, Science, and Technology (ETHICS), West Lafayette, IN, USA, 18–20 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 1–8. Available online: https://ieeexplore.ieee.org/abstract/document/10154912/ (accessed on 24 October 2024).
  46. COVIDSafe Assessment 3: COVIDSafe Application Functionality, Privacy Policy and Collection Notices|OAIC. Available online: https://www.oaic.gov.au/privacy/privacy-assessments-and-decisions/privacy-assessments/covidsafe-assessment-3-covidsafe-application-functionality,-privacy-policy-and-collection-notices (accessed on 24 October 2024).
  47. StopCOVID: France’s Controversial Tracing App Ready by June, Government Says|Euronews. Available online: https://www.euronews.com/my-europe/2020/04/29/coronavirus-french-mps-approve-covid-19-tracing-app-despite-privacy-concerns (accessed on 23 October 2024).
  48. TousAntiCovid Sources GitLab. GitLab. Available online: https://gitlab.inria.fr/stopcovid19 (accessed on 24 October 2024).
  49. Opentrace-Calibration/Trial Methodologies.md at Master Opentrace-Community/Opentrace-Calibration. GitHub. Available online: https://github.com/opentrace-community/opentrace-calibration/blob/master/Trial%20Methodologies.md (accessed on 23 October 2024).
  50. Rivest, R.L.; Callas, J.; Canetti, R.; Esvelt, K.; Gillmor, D.K.; Kalai, Y.T.; Lysyanskaya, A.; Norige, A.; Raskar, R.; Shamir, A.; et al. The PACT protocol specification. In Private Automated Contact Tracing Team; Tech. Rep. 0.1; MIT: Cambridge, MA, USA, 2020. [Google Scholar]
  51. PACT: Private Automated Contact Tracing. Available online: https://github.com/mitll/PACT (accessed on 16 September 2025).
  52. Swiss Tracing App Goes on Trial. ETH Zurich. Available online: https://ethz.ch/en/news-and-events/eth-news/news/2020/05/swiss-covid-app.html (accessed on 24 October 2024).
  53. Vaudenay, S.; Vuagnoux, M. Analysis of Swisscovid. 2020. Available online: https://infoscience.epfl.ch/record/278048 (accessed on 24 October 2024).
  54. Covid Watch. GitHub. Available online: https://github.com/covidwatchorg (accessed on 24 October 2024).
  55. Raskar, R.; Nadeau, G.; Werner, J.; Barbar, R.; Mehra, A.; Harp, G.; Leopoldseder, M.; Wilson, B.; Flakoll, D.; Vepakomma, P.; et al. COVID-19 Contact-Tracing Mobile Apps: Evaluation and Assessment for Decision Makers. arXiv 2020, arXiv:2006.05812. [Google Scholar] [CrossRef]
  56. Kang, H.; Kwon, S.; Kim, E. COVID-19 Health System Response Monitor: Republic of Korea. 2020. Available online: https://apps.who.int/iris/bitstream/handle/10665/337371/9789290228219-eng.pdf (accessed on 24 October 2024).
  57. DP^3T. GitHub. Available online: https://github.com/DP-3T (accessed on 24 October 2024).
  58. Bielova, N.; Boutet, A.; Castelluccia, C.; Cunche, M.; Lauradoux, C.; Le Métayer, D.; Roca, V. DESIRE: A Third Way for a European Exposure Notification System (SUMMARY-EN). Ph.D. Thesis, Inria, Le Chesnay-Rocquencourt, France, 2020. Available online: https://inria.hal.science/hal-02570172/ (accessed on 24 October 2024).
  59. Trieu, N.; Shehata, K.; Saxena, P.; Shokri, R.; Song, D. Epione: Lightweight Contact Tracing with Strong Privacy. arXiv 2020, arXiv:2004.13293. [Google Scholar] [CrossRef]
  60. COVIDSafe Legislation|Attorney-General’s Department. Available online: https://www.ag.gov.au/rights-and-protections/privacy/covidsafe-legislation (accessed on 23 October 2024).
  61. Project Aurora: A New Open Source Solution for the Google Apple Exposure Notification API. Available online: https://www.pathcheck.org/blogs/en/blog/a-new-open-source-solution-for-the-google-apple-exposure-notification-api (accessed on 16 September 2025).
  62. Preliminary Criteria for the Evaluation of Digital Contact Tracing Tools for COVID-19: Preliminary Criteria for the Evaluation of Digital Contact Tracing Tools for COVID-19. Available online: https://stacks.cdc.gov/view/cdc/87515 (accessed on 24 October 2024).
  63. Path-Check/Safeplaces-Dct-App. (12 October 2024). TypeScript. PathCheck Foundation. Available online: https://github.com/Path-Check/safeplaces-dct-app (accessed on 24 October 2024).
  64. Shen, Y.; Wang, F.; Jin, H. Defending against user identity linkage attack across multiple online social networks. In Proceedings of the 23rd International Conference on World Wide Web, Seoul, Republic of Korea, 7–11 April 2014; ACM: New York, NY, USA, 2014; pp. 375–376. [Google Scholar] [CrossRef]
  65. COVIDSafe. Available online: https://covidsafe.cs.washington.edu/ (accessed on 24 October 2024).
  66. ROBERT-Proximity-Tracing/Documents. (20 May 2024). HTML. ROBERT—ROBust and Privacy-presERving Proximity Tracing Protocol. Available online: https://github.com/ROBERT-proximity-tracing/documents (accessed on 23 October 2024).
  67. TCNCoalition/TCN. (8 July 2024). Rust. TCN Coalition. Available online: https://github.com/TCNCoalition/TCN (accessed on 24 October 2024).
  68. COVID Contact Tracing App Report. Avira. Available online: https://www.avira.com/en/covid-contact-tracing-app-report (accessed on 24 October 2024).
  69. Zimmermann, B.M.; Fiske, A.; Prainsack, B.; Hangel, N.; McLennan, S.; Buyx, A. Early perceptions of COVID-19 contact tracing apps in German-speaking countries: Comparative mixed methods study. J. Med. Internet Res. 2021, 23, e25525. [Google Scholar] [CrossRef]
  70. Abbas, R.; Michael, K. COVID-19 contact trace app deployments: Learnings from Australia and Singapore. IEEE Consum. Electron. Mag. 2020, 9, 65–70. [Google Scholar] [CrossRef]
  71. Bengio, Y.; Janda, R.; Yu, Y.W.; Ippolito, D.; Jarvie, M.; Pilat, D.; Struck, B.; Krastev, S.; Sharma, A. The need for privacy with public digital contact tracing during the COVID-19 pandemic. Lancet Digit. Health 2020, 2, e342–e344. [Google Scholar] [CrossRef]
  72. McLachlan, S.; Lucas, P.; Dube, K.; Hitman, G.A.; Osman, M.; Kyrimi, E.; Neil, M.; Fenton, N.E. Bluetooth Smartphone Apps: Are they the most private and effective solution for COVID-19 contact tracing? arXiv 2020, arXiv:2005.06621. [Google Scholar] [CrossRef]
  73. Li, T.; Faklaris, C.; King, J.; Agarwal, Y.; Dabbish, L.; Hong, J.I. Decentralized is not risk-free: Understanding public perceptions of privacy-utility trade-offs in COVID-19 contact-tracing apps. arXiv 2020, arXiv:2005.11957. [Google Scholar]
  74. Browne, C.; Gulbudak, H.; Webb, G. Modeling contact tracing in outbreaks with application to Ebola. J. Theor. Biol. 2015, 384, 33–49. [Google Scholar] [CrossRef] [PubMed]
  75. Sinha, P.; Paterson, A.E. Contact tracing: Can ‘Big tech’come to the rescue, and if so, at what cost? EClinicalMedicine 2020, 24, 100412. Available online: https://www.thelancet.com/journals/eclinm/article/PIIS2589-5370(20)30156-5/fulltext (accessed on 23 October 2024). [CrossRef] [PubMed]
  76. Shubina, V.; Holcer, S.; Gould, M.; Lohan, E.S. Survey of decentralized solutions with mobile devices for user location tracking, proximity detection, and contact tracing in the COVID-19 era. Data 2020, 5, 87. [Google Scholar] [CrossRef]
Figure 1. Fully Centralized Model, where central server plays a key role carrying out staple functionalities. Notations: Cylinder icons labeled DB indicate a database maintained by that server/authority.
Figure 1. Fully Centralized Model, where central server plays a key role carrying out staple functionalities. Notations: Cylinder icons labeled DB indicate a database maintained by that server/authority.
Cryptography 09 00060 g001
Figure 2. Subset Data Model, where roles are divided between user devices and server. Notations: Cylinder icons labeled DB indicate a database maintained by that server/authority.
Figure 2. Subset Data Model, where roles are divided between user devices and server. Notations: Cylinder icons labeled DB indicate a database maintained by that server/authority.
Cryptography 09 00060 g002
Figure 3. Custodian Data Model, where the server cannot locate the vulnerable users with the disease without colluding with the healthcare authority. Notations: W I d i ? = W I d i indicates an equality check between transmitted and stored identifiers; × marks a failed match; and Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Figure 3. Custodian Data Model, where the server cannot locate the vulnerable users with the disease without colluding with the healthcare authority. Notations: W I d i ? = W I d i indicates an equality check between transmitted and stored identifiers; × marks a failed match; and Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Cryptography 09 00060 g003
Figure 4. Dedicated Servers Model features a strict separation of tasks under different servers, i.e., submission server, matching server, deduplication server, notification server, and warning server. Notation: W I d i ? = S I d i and W I d i ? = W I d i indicate equality checks used during matching; and × denotes a failed match (rejected). Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Figure 4. Dedicated Servers Model features a strict separation of tasks under different servers, i.e., submission server, matching server, deduplication server, notification server, and warning server. Notation: W I d i ? = S I d i and W I d i ? = W I d i indicate equality checks used during matching; and × denotes a failed match (rejected). Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Cryptography 09 00060 g004
Figure 5. Server as Bulletin Board where all major server’s centralized roles are transferred to the devices. Notation: “np” = normal propagation step; × = deletion/rejection; “&&” denotes logical AND; and Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Figure 5. Server as Bulletin Board where all major server’s centralized roles are transferred to the devices. Notation: “np” = normal propagation step; × = deletion/rejection; “&&” denotes logical AND; and Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Cryptography 09 00060 g005
Figure 6. Indexed Data Model where the server can be used for the storage of encrypted pseudonyms and their authentication. Notations: K i ? = K is an equality check (match test); and Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Figure 6. Indexed Data Model where the server can be used for the storage of encrypted pseudonyms and their authentication. Notations: K i ? = K is an equality check (match test); and Cylinder icons labeled Database placed inside a box indicate a database maintained by that server/authority.
Cryptography 09 00060 g006
Figure 7. Model-level scores (unweighted mean across 24 indicators). Higher values indicate stronger overall conformance.
Figure 7. Model-level scores (unweighted mean across 24 indicators). Higher values indicate stronger overall conformance.
Cryptography 09 00060 g007
Figure 8. Sub-Architectural shift over time from 2020 to 2022. Arrows depict observed migrations between models for selected platforms; the diagram summarizes transition patterns discussed in Section 7.
Figure 8. Sub-Architectural shift over time from 2020 to 2022. Arrows depict observed migrations between models for selected platforms; the diagram summarizes transition patterns discussed in Section 7.
Cryptography 09 00060 g008
Figure 9. Released source code over time. Cumulative count of study platforms releasing code; the dashed line marks GAEN public release (20 May 2020), and the late outlier is annotated.
Figure 9. Released source code over time. Cumulative count of study platforms releasing code; the dashed line marks GAEN public release (20 May 2020), and the late outlier is annotated.
Cryptography 09 00060 g009
Figure 10. GAEN adoption after release: non-US vs. US state-app cluster. Cumulative adoptions by non-US and US state-level clusters (and total), with vertical markers for GAEN release and the US cluster shift (August 2020). Dashed lines are event markers only and are not data series.
Figure 10. GAEN adoption after release: non-US vs. US state-app cluster. Cumulative adoptions by non-US and US state-level clusters (and total), with vertical markers for GAEN release and the US cluster shift (August 2020). Dashed lines are event markers only and are not data series.
Cryptography 09 00060 g010
Table 1. Corpus and model mapping (July 2020–April 2021). Reference set of 18 CT platforms mapped to protocol lineage and architectural model; forms the basis for the model-level comparisons in Section 6.
Table 1. Corpus and model mapping (July 2020–April 2021). Reference set of 18 CT platforms mapped to protocol lineage and architectural model; forms the basis for the model-level comparisons in Section 6.
#CT SolutionsDeveloperDeployedPlatformSource CodeUser Base +
1GAEN APIs [39,40]Apple & Google 37 Countries (Globally)APIMillions of users by 65 Apps
2Health Code [41]Tencent and Ant GroupChinaFramework900 million
3Aarogya Setu [21]NIC, IndiaIndiaAndroid/iOS214 million
4ConTra Corona [42]FZI Research Center, GermanyGermanyProtocol48 million
5Immuni (Pronto-C2) [21,43]Italian GovernmentItalyAndroid/iOS19 million
6CovidSafe [44,45,46]Australian Government AustraliaAndroid/iOS7 million
7StopCovid/TousAntiCovid [21,47,48]INRIA & FraunhoferFranceAndroid/iOS5 million
8TraceTogether
(OpenTrace) [49]
Ministry of Health, GOVTECH & SG UNITED SingaporeAndroid/iOS4.9 million
9Hamagen [19,21]Israeli Ministry of Health IsraelAndroid/iOS2.5 million
10CovidSafe-PACT
(West-coast) [7,50,51]
University of WashingtonUSAProtocol2 million
11SwissCovid-DP-3T [52,53]FOPH, SwitzerlandSwitzerlandAndroid/iOS1 million
12CovidWatch–TCN [54]ADHS-Arizona, Stanford University, and the University of WaterlooWaterloo, CanadaAndroid/iOS10k
13COVID Safe Paths
(Private Kit) [6,55]
MIT Media LabUSAAndroid/iOS10k
14Coronavirus Disease-19 [19,56]South Korean GovernmentSouth KoreaWebsite
15DP3T [57]Swiss Federal Institute of Technology (EPFL)EuropeProtocol
16DESIRE protocol [58]INRIA, FranceProtocol
17EpiOne [59] UC Berkeley, USAProtocol
18PACT East Coast [50,51]MIT, USAProtocol
Notes: ✓ = source code available; ✖ = source code not available; + = aggregate total across all listed applications; – = no user base information available.
Table 3. Privacy-relevant exposure points and re-identification vectors per architecture (indicator definitions P1–P6 and goals G1 (PII secrecy)/G3 (unlinkability)).
Table 3. Privacy-relevant exposure points and re-identification vectors per architecture (indicator definitions P1–P6 and goals G1 (PII secrecy)/G3 (unlinkability)).
ArchitecturePrimary Privacy
Exposure Points
PII at Risk/Data ItemsRe-identification Vectors Other Notes
Centralized AppsUser end; Server end; Secondary channelsAll user data stored or referenced centrallyLinkage via secondary channels (e.g., correlating app/broadcast metadata)Susceptible to contact-advertising message correlation; proximity detection concerns reported
Decentralized AppsUser end; Secondary channelsSeeds & chirps on devices; uploads are keys/seedsTraffic analysis/linkage via side informationFalse positives are possible by relaying chirps (if mitigations are weak)
Hybrid AppsUser end; Secondary channelsRisk of PII de-anonymization in some flowsCorrelation of anonymous broadcast data via secondary channelsSimilar proximity/advertising concerns if broadcasts are linkable
Table 4. Security and operational threats by architecture (indicator definitions S1–S6 and goal G2 (authenticity of verification/notifications)).
Table 4. Security and operational threats by architecture (indicator definitions S1–S6 and goal G2 (authenticity of verification/notifications)).
ArchitectureServer/User-ID Protection ThreatsConsequences If Server Is CompromisedTypical Attack Surfaces Relative Difficulty
Centralized AppsSingle point of failure/attack; weak auth on BLE contact infoBroad data exposure (all user data)DoS; Replay/Relay; Linkage attacksEasy
Decentralized AppsLess central SPOF; risks shift to key distribution and client integrityAccess to seeds/chirps may enable graph inference if combined with side infoTraffic analysis; DoS; Limited replay; Relay; LinkageHard
Hybrid AppsMixed: partial central services + device-side matching; correlation risksPII de-anonymization possible if joins occurDoS; Relay; Linkage (esp. via secondary channels)Hard
Table 5. Server-side roles and data persistence by model. Shows what is stored at device, server, and health-authority endpoints and whether records are addressable or recomputable, informing linkability/governance analysis (G3/A3).
Table 5. Server-side roles and data persistence by model. Shows what is stored at device, server, and health-authority endpoints and whether records are addressable or recomputable, informing linkability/governance analysis (G3/A3).
Server ModelDevice EndServer EndHealth Authority
Fully Centralized Model T e m p I D , T k s , P I I , T x P , R S S I T i , P I I i , T x P i , R S S I i P I I i
Subset Data Model E p h I D , T k s , P I I , T x P , R S S I T p , P I I p , T x P p , R S S I p P I I p
Bulletin Board Model S i , C i , T , P I I , R S S I , L S b , T P I I i
Indexed Data Model E p h x   i ,   S K x   i ,   A d d r x   i ,   T i ,   K i E p h x ,   T x ,   K i P I I i
Dedicated Servers Model P I d i , W I d i , R I d i , S I d i S i d i , P I d i P I d i , W I d i , R I d i , S I d i , d a t e
Custodian Data Model P I d i , W I d i , R I d i , S I d i S i d i , P I d i P I d i , W I d i , R I d i , S I d i , d a t e
Table 6. Modular evaluation of capabilities and attributes (quality scores). Ordinal scores 1–4 summarize documented capabilities by architectural model (e.g., notification, interoperability, privacy).
Table 6. Modular evaluation of capabilities and attributes (quality scores). Ordinal scores 1–4 summarize documented capabilities by architectural model (e.g., notification, interoperability, privacy).
Server ModelsPatient IdentificationContact ElicitationContact NotificationUser InvolvementAvailabilityTrustworthinessPlatform SupportData InteroperabilityPrivacyTechnical SupportVendor ExperienceContact Follow-upCustomizability and Localization
Fully Centralized Model4122423323343
Subset Data Model4123233323343
Bulletin Board Model2442344444124
Indexed Data Model2442242442122
Dedicated Servers Model3242141431441
Custodian Data Model 3232111331441
Notes: Gray shading highlights higher scores for quick scanning. Ranking: 1 = none; 2 = low; 3 = medium; 4 = high.
Table 7. Privacy-Centric Reassessment Criteria for CT Workflows (Privacy Scores). Ordinal scores 1–4 (higher = better) rate workflow elements relevant to privacy (e.g., access criteria, longevity, data requests, risk of de-anonymization).
Table 7. Privacy-Centric Reassessment Criteria for CT Workflows (Privacy Scores). Ordinal scores 1–4 (higher = better) rate workflow elements relevant to privacy (e.g., access criteria, longevity, data requests, risk of de-anonymization).
AttributesFully Centralized ModelSubset Data ModelBulletin Board ModelIndexed
Data Model
Dedicated
Servers Model
Custodian Data Model
PHAs Data Access123322
PHAs Access Criteria114433
PHAs Data Longevity124433
PHAs Data Request114422
Users’ Risk of Anonymization113442
Total5718191412
Notes: Gray shading highlights higher scores for quick scanning.
Table 8. Architectural Comparison: Privacy And Security Trade-Offs. Concise, qualitative summary linking each model’s control locus, key risks, privacy level, and strengths to aid design choices.
Table 8. Architectural Comparison: Privacy And Security Trade-Offs. Concise, qualitative summary linking each model’s control locus, key risks, privacy level, and strengths to aid design choices.
ModelControl TypeKey Security RisksPrivacy LevelStrengths
Fully CentralizedGovernmentSingle point of failure, mass data breachLowCentralized control, full data visibility
Subset Data ModelGovernment/User SharedLinkage attacks, limited anonymizationMediumPartial data isolation, improved privacy over full centralization
Custodian Data ModelUser-ControlledData integrity issues, potential user mismanagementHighUser maintains control over exposure and health status data
Dedicated ServersGovernment/3rd PartiesDoS attacks on segmented serversHighSegmented risk zones, scalable and resilient infrastructure
Bulletin Board ModelAnonymous Relay ServerTraffic analysis, replay attacks, metadata correlationVery HighStrong anonymity, public exposure keys without direct identifiers
Indexed Data ModelMixed ControlIndex leakage, possible metadata profilingMedium-HighFast retrieval with partial anonymity, balance of privacy and speed
Table 9. Source-code releases and GAEN adoption timeline. Per-platform dates for open-source release and switch to GAEN were used to derive Figure 9 and Figure 10.
Table 9. Source-code releases and GAEN adoption timeline. Per-platform dates for open-source release and switch to GAEN were used to derive Figure 9 and Figure 10.
CT SolutionsDeployedSource Code
Release Date
Switch Date to GAEN API
GAEN APIs37 Countries
(Globally)
20 May 2020N/A
Health Code China××
Aarogya Setu IndiaJune 2020×
ConTra Corona Germany16 June 2020July 2020
CovidSafe-PACT (West-coast) USANovembre 2020August 2020
Immuni (Pronto-C2) Italy25 May, 20201 June, 2020
StopCovid/TousAntiCovid FranceJune 2020×
TraceTogether (OpenTrace)Singapore29 March 2020×
CovidSafe Australia8 May 2020×
SwissCoviD-DP-3T Switzerland26 May 2020June 2020
DP-3T Unlinkable EuropeApril 2020May 2020
Hamagen IsraelJuly 2020×
Coronavirus Disease-19 South Korea××
CovidWatch–TCNArizona, USAApril 2020August 2020
COVID Safe Paths (Private Kit)USAJune 2020August 2020
DESIRE protocol-×N/A
EpiOne-×August 2020
PACT East Coast-August 2020
Notes: N/A = not applicable to this row. Examples: GAEN APIs are the underlying framework (not an app), so no “Switch Date to GAEN API”; DESIRE protocol is non-GAEN by design, so no switch date applies.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Anwar, S.; Anderson, J. Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights. Cryptography 2025, 9, 60. https://doi.org/10.3390/cryptography9040060

AMA Style

Anwar S, Anderson J. Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights. Cryptography. 2025; 9(4):60. https://doi.org/10.3390/cryptography9040060

Chicago/Turabian Style

Anwar, Sidra, and Jonathan Anderson. 2025. "Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights" Cryptography 9, no. 4: 60. https://doi.org/10.3390/cryptography9040060

APA Style

Anwar, S., & Anderson, J. (2025). Privacy-Driven Classification of Contact Tracing Platforms: Architecture and Adoption Insights. Cryptography, 9(4), 60. https://doi.org/10.3390/cryptography9040060

Article Metrics

Back to TopTop