Collects the different approaches to implementing technology-assisted contact tracing.
As it is common today, we use the term “contact tracing” although a more accurate term may be “exposure notification”.
We found the following implementation choices:
- Apple/Google contact tracing
- The approach to contact tracing taken by the Apple/Google project
- DP-3T contact tracing
- The approach to contact tracing taken by the Decentralized Privacy-Preserving Proximity Tracing project
- Contact tracing with changing pseudonyms created by iterating a hash function
- Contact IDs are derived from a value that progresses through iteration of a secure hash function
- Manual contact tracing
- Contact tracing is performed through in-person interviews and research
- PEPP-PT contact tracing
- The approach to contact tracing taken by the Pan-European Privacy-Preserving Proximity Tracing project
- Contact tracing with static Contact IDs
- The App User is identified with a pseudonym that never changes