issues
search
ROBERT-proximity-tracing
/
documents
Protocol specification, white paper, high level documents, etc.
Other
247
stars
21
forks
source link
issues
Newest
Newest
Most commented
Recently updated
Oldest
Least commented
Least recently updated
Why in 3.1 Server Setup is Tptsstart dynamic?
#25
spiunno
opened
4 years ago
1
Fix some typos
#24
Keirua
closed
4 years ago
3
Difference to Singapore's BlueTrace/TraceTogether
#23
ReichertL
opened
4 years ago
5
What scenarios could be used to assess risk scores centrally, but not decentrally?
#22
kaythxbye
opened
4 years ago
2
Author names are missing
#21
akuckartz
opened
4 years ago
3
information leaked through size/freq of client to server queries.
#20
Matioupi
opened
4 years ago
4
Why are EPIDs only generated by server?
#19
ArchanaaSK
opened
4 years ago
7
Clarify 'securely erase'
#18
ArchanaaSK
opened
4 years ago
0
MAC verification at server end is performed last, should be first
#17
ArchanaaSK
opened
4 years ago
2
Deactivating 'at risk' accounts - why deactivate? what features are deactivated?
#16
ArchanaaSK
opened
4 years ago
2
Social/contact/proximity graph - why are they needed? Are they all same?
#15
ArchanaaSK
opened
4 years ago
1
Misleading: 'B and D do not get exposed' in Specification
#14
ArchanaaSK
opened
4 years ago
0
Clarify "Honest-but-curious" terminology
#13
defeo
opened
4 years ago
10
Add missing license
#12
btrd
closed
2 years ago
3
The 'Exposure Status Request' mechanism exposes the full social graph of all users (infected or not) to the authority.
#11
gdanezis
closed
4 years ago
13
Identification of diagnosed people by their contacts, or an active malicious agent
#10
hwti
opened
4 years ago
6
TPM?
#9
vaudenay
opened
4 years ago
2
K_S rotation?
#8
vaudenay
opened
4 years ago
4
Inject false "at risk" status
#7
vaudenay
opened
4 years ago
19
"authority... will need to deploy sniffing devices"
#6
pdehaye
opened
4 years ago
22
Add a license
#5
MattiSG
closed
4 years ago
4
Provide documents in a format that allows for feedback and discussion
#4
MattiSG
opened
4 years ago
5
Do not use 3DES as a potential block-cipher
#3
mlpo
opened
4 years ago
4
Pseudonyms Generated and Managed by Authority, Communicated to Users
#2
nadimkobeissi
opened
4 years ago
7
Is this part of PEPP-PT?
#1
pdehaye
closed
4 years ago
5
Previous