• FooBarrington@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    Security researches have taken apart the binaries, listened to network requests and everything else you need to do to verify that nothing nefarious was going on. The system itself is set up so no tracing is possible if nobody reads your hashes.

    • ooterness@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 year ago

      [Citation needed]

      Every reverse-engineering study I’ve read has been about the apps built in top of the Google API, not the Google binaries. Here’s one, and here’s another, and neither paints a flattering picture.

      Maybe it’s possible to build a perfect implementation, but that is not what we got.

      You know what does work? Masks and vaccines. Phone-based tracking was a dangerous waste of time.