Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Is My Smartphone Tracking COVID-19 Exposures Without My Consent?

Remember a few months ago when Google and Apple joined forces to come up with a system to help state and local governments establish a COVID-19 Exposure Notification system? If you didn’t, you aren’t alone. A lot has been going on lately. Just to catch you up, the two tech giants recently pushed out an update across nearly all modern smartphones so state and local governments can deploy apps to notify people when they may have been exposed to COVID-19. Let’s do a deep dive on what this means for your privacy.

To be honest, we stopped thinking about Google and Apple’s COVID-19 Exposure Notification system too. That is, until we started seeing social media posts going around over the last week or so claiming that Android and iPhones have been getting a COVID-19 tracking app installed without getting permission from the user first. 

Here is an example of one of the posts that have been making rounds across Facebook:

**VERY IMPORTANT ALERT!***
A COVID-19 sensor has been secretly installed into every phone.
Apparently, when everyone was having “phone disruption” over the weekend, they were adding COVID-19 Tracker [SIC] to our phones!

If you have an Android phone, go under settings, then look for google settings and you will find it installed there.

If you are using an iPhone, go under settings, privacy, then health. It is there but not yet functional.

The App can notify you if you’ve been near someone who has been reported having COVID-19.

We checked our phones and confirmed that the option is clearly there. On Android, go to your Settings and tap on Google Settings and front and center will be an option to opt-in to the COVID-19 Exposure Notification system. By default, you are not opted in.

On iPhones, go to Settings, then Privacy, then Health and you’ll see a similar opt in that is currently disabled. In fact, you can’t enable it unless you’ve installed an official COVID-19 Exposure Notification app from your local or state government.

No, Android and iOS Didn’t Sneak a COVID-19 Tracking App On Your Phone - It’s Just a New Security Setting

The two tech giants have been working together to build an API (short for Application  Programming Interface) for a standardized system to make it easier for states and local governments to build an effective app to notify users if they may have been exposed to COVID-19. Google and Apple aren’t building the apps or pushing them out to users. If you see this setting, rest easy knowing they didn’t sneak a COVID-19 app onto your phone without your consent. 

It’s Not the App, It’s the Opt-In the Apps Will Require

Just to be perfectly clear, unless you manually installed something, your Android or iPhone isn’t just going to start tracking you and your friends and family to see if you have COVID-19.

Apple and Google confirmed this in a joint statement saying “What we’ve built is not an app - rather public agencies will incorporate the API into their own apps that people install.”

One thing worth pointing out is that the system won’t work as well if users don’t participate - if half of all users decide not to opt in, the system might not be reliable enough to do much good. It’s really up to the local governments and states to raise awareness while addressing the public’s concerns for privacy. With that said, what is being done to ensure that your privacy is protected?

Is the COVID-19 Exposure Notification Update from Google and Apple Safe?

Keep in mind, it’s really up to state and local governments to deploy the official apps themselves. Apple and Google merely laid out some groundwork that these apps can utilize.

Here’s how it works. First, you need to install an official application from your local or state government. When you install it and set it up, you’ll also need to opt in to Google or Apple’s API (that’s the new setting everyone is worried about). Once you are set up, a random ID is generated and exchanged between your phone and other nearby phones (that also opted in) within Bluetooth range. These random, anonymous IDs are stored on your phone. The random IDs are also changed every 10 to 20 minutes so they can’t be tracked. In short, your phone keeps tabs of phones it has been near without collecting or sharing any personally identifiable information.

If someone is diagnosed with COVID-19 and that personal manually shares that information with one of the official contact tracing apps, all of the random IDs their phone has collected over the past two weeks are uploaded (with that user’s permission) and the users of those IDs are notified that they may have been exposed. 

In other words, you don’t know who or where you may have been exposed to COVID-19. You just know that, at some point, the owner of one of the phones you’ve been within 30-or-so feet of has shared that they have been diagnosed with COVID-19.

Most importantly, the system doesn’t track your location, or share other users’ identities within the app, or even with Google or Apple. According to Google, the apps are not allowed to use your phone’s location or track your location in the background.

The technology is very secure and anonymous. It has to be, because it has to fall under the strict rules that govern healthcare data.

The Big Question Everyone is Asking: How Do You Uninstall the Apple/Google COVID-19 Exposure Notification Update?

Let’s get this out of the way. There is no app to uninstall. It’s an update to the Android and iOS operating system as part of a recent security update. The update isn’t tracking you - it’s simply a setting that lets you decide if you want to opt in to participate in the COVID-19 Exposure Notification System.

The only real danger is if you search around the Internet and follow instructions that walk you through rolling back your phone or other risky procedures to try to remove the update. That puts your phone at risk for other threats. There is nothing to uninstall, and rolling back your phone and preventing future security updates from ever getting installed is not a good plan.

If you don’t want to particulate, simply do not opt in. If you are worried about it, both Apple and Google state that by simply not installing a COVID-19 Exposure Notification app, or uninstalling one if you did install one, is all it takes to not participate.

JUST TO MAKE IT CLEAR: DO NOT FOLLOW ANY INSTRUCTIONS ONLINE THAT WALK YOU THROUGH ROLLING BACK YOUR PHONE AND OPTING OUT OF SECURITY UPDATES. 

That is only going to put your data and your privacy at risk. In other words, it’s shortsighted.

That said, the choice to opt in or out of the COVID-19 Exposure Notification system is yours to make, but Google and Apple seem to have built a system that is secure, without violating anyone’s privacy. If you have any concerns about the security of your data, don’t hesitate to reach out to us at Voyage Technology.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, 26 April 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Email Computer Google Workplace Strategy Small Business Hosted Solutions Collaboration Backup Users Managed Service Ransomware Mobile Device Productivity Microsoft AI Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Network Current Events Tech Term Remote Internet of Things Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Gadgets Cloud Computing Training Compliance Covid-19 Remote Work Server IT Support Managed Service Provider Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Business Continuity Data Management Virtualization Wi-Fi Business Technology Bandwidth Windows 10 Blockchain Data Security Vendor Apps Two-factor Authentication Managed Services Mobile Office App Employer-Employee Relationship BYOD Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi BDR Applications Computing Physical Security Information Technology Hacker Conferencing Access Control Avoiding Downtime Office 365 Marketing Password Managed IT Services How To HIPAA Router Big Data Operating System 2FA Help Desk Risk Management Virtual Private Network Computers Health Healthcare Website Analytics Office Tips Augmented Reality Retail Storage Bring Your Own Device Going Green Patch Management Social Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Monitoring Customer Service Excel Display Printer Paperless Office Infrastructure Managed IT Service Remote Workers Telephone Document Management Cooperation Free Resource Project Management Firewall Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Employees Integration Robot Modem User Tip Processor Mobile Security Settings Wireless Printing Holidays Content Filtering Customer Relationship Management IT Management YouTube Meetings Data Storage VPN Smart Technology Supply Chain Video Conferencing Cryptocurrency Hacking Managed Services Provider Presentation Virtual Machines Professional Services Computer Repair Saving Time Virtual Desktop Wireless Technology Data storage LiFi Downloads Outlook iPhone Licensing Machine Learning Money Entertainment Humor Word Vulnerabilities Data Privacy Images 101 Maintenance Antivirus Sports Multi-Factor Authentication Mobility Telephone System Mouse Cost Management Safety Administration Legal Trend Micro IT solutions Specifications Security Cameras Workplace Strategies How To Microchip Internet Exlporer Software as a Service Business Growth Fraud Meta Notifications Travel Username Application Managing Costs Amazon Techology eCommerce Google Maps Black Friday SSID Cortana IBM Database Surveillance Alt Codes Virtual Assistant Outsource IT Downtime Unified Threat Management Media IT Technicians Virtual Machine Environment Unified Threat Management Cookies Hosted Solution Cyber Monday Medical IT Proxy Server Reviews Tactics Development Typing Hotspot Transportation Small Businesses Network Congestion Mirgation Hypervisor Displays Competition Google Drive User Error Nanotechnology Optimization PowerPoint Knowledge Shopping Addiction Language Employer/Employee Relationships Outsourcing Point of Sale Navigation 5G Management PCI DSS Chatbots Google Docs Screen Reader Unified Communications Distributed Denial of Service Workplace Experience Gig Economy Service Level Agreement Internet Service Provider User Bitcoin Network Management Computing Infrastructure Teamwork Hiring/Firing Running Cable Tech Support Evernote Paperless Monitors Regulations Compliance Google Wallet Identity Smart Tech Memes Co-managed IT Bookmark IP Address Download Net Neutrality Windows 8 Alerts SQL Server Technology Care Laptop Websites Business Communications Financial Data Drones History Browsers Smartwatch SharePoint Connectivity IT Break Fix Scams Electronic Medical Records Upload Procurement Recovery Azure Hybrid Work Halloween Cyber security Multi-Factor Security Tech Human Resources Writing Social Network Telework Hard Drives Lenovo CES Domains IoT Communitications Dark Web Cables Virtual Reality Trends Supply Chain Management Hacks Server Management Scary Stories Private Cloud Regulations Identity Theft Google Calendar Term Google Apps Fun Customer Resource management FinTech Refrigeration Superfish Data Analysis Public Speaking Star Wars IT Assessment Deep Learning Microsoft Excel IT Maintenance Twitter Lithium-ion battery Gamification Flexibility Staff Value Business Intelligence Error Social Networking Entrepreneur Education Legislation Shortcuts Social Engineering Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware Remote Computing Content Remote Working Mobile Computing Wearable Technology Memory Vendors Motherboard Data Breach Tablet Comparison Google Play Be Proactive Search Health IT Undo Directions Videos Assessment Electronic Health Records Best Practice Permissions Workforce Alert Dark Data Managed IT Wasting Time Threats Buisness File Sharing

Blog Archive