The ministry of Health is reluctant to give its support to the application of tracing to manage the epidemic of the COVID-19. Like many computer security specialists, public health concerns for the protection of privacy.
“Even if the company is in good faith and does not use the data for something else, they can still be hacker. Someone from the inside can sell the data. It is the already-seen. There are several factors that I find unacceptable, ” says the expert in cybersecurity Luc Poulin.
There is no guarantee that the data are adequately protected with tracing applications that use a phone, Bluetooth technology, and artificial intelligence, ” he said.
These risks are also overly concerned with public health, according to our information. The latter would still not have the application project COVI Canada.
Developed by researchers at the Mila – Institut québécois artificial intelligence – in collaboration with other organizations, the application uses the Bluetooth technology and artificial intelligence to track down the people infected by the virus. It also helps to know if you came in contact with people with the COVID-19.
Some of the information
The ministry of Health says it continues to analyze all of the technological solutions. “Many aspects remain to be studied, including issues of privacy, and we want to evaluate the benefits of such an application in a pandemic situation,” said spokesman Robert Maranda.
Mila points out that by downloading the app, users will have the opportunity, if they wish, to share certain information in order to contribute to the development of the analysis capabilities of artificial intelligence.
The spokesperson Vincent Martineau swears that it will not contain any personal information and that all data will be deleted at the end of the pandemic.
With colleagues, the computer security expert Patrick Mathieu, co-founder of the Hackfest, has analyzed the white Paper of the application that has been made public on the web.
In the document, the creators admit that hackers could download the app and then edit it in a way malicious.
“They set out the residual risks concerning possible attacks on the application. These risks are not covered by the application. It will be vulnerable to certain elements, “explains Patrick Mathieu, calling it” a mess ” the application on the plan of the security of the information. “It is done at the last minute, quickly. This is a recipe for problems. “
The experts interviewed also pointed at the weaknesses of the Bluetooth. The application might be misleading because of the lack of precision of this technology. Mila maintains that the comments on this topic are analyzed in order to improve the project.