Digital Contact Tracing Effective Shield Against Pandemic

History tells us pandemics like COVID-19 can recur in some form or other. Their basic characteristics of mutating and spreading quickly among large populations are the biggest challenge to controlling them. Vaccines are effective in checking the spread but take time to get developed. In such a scenario, effective contact tracing plays a big role. Fortunately, technological tools are now available to ensure quick and effective contact tracing.

The traditional form of contact tracing is a labor-intensive process that depends on interviews and investigation. However, currently available technologies can improve the process by reducing the reliance on an individual’s ability to recall all those she/he met in the previous two weeks.

In the age of the connected world, where we carry smart devices with us almost everywhere, it is possible to enable the track-and-trace option embedded in smart devices such as smartphones, smartwatches, and smart bands.

Key technologies enabling digital contact tracing

  • Bluetooth Proximity Tracing: This is the most popular technology being used for the purpose. Bluetooth, or Bluetooth Low Energy, is used here to track the encounters between two smart devices while maintaining the anonymity of the identifiers of nearby devices. As soon as the user gets identified, an alarm notification is transmitted to other identified users based on the locally stored contact history log in an app. This solution has been implemented by Google and Apple for their contact-tracing app.
  • Location Tracking: This can be achieved by cellular triangulation of network towers or GNSS embedded in smart devices. The network tower-based tracking has the advantage of eliminating the need to download an app. However, it raises privacy concerns.
  • GEO-QR Code Tagging: This requires assigning a venue or a place to a QR code and asking people to scan the QR code using smartphones to tag their visit. No app is needed here to register the voluntary check-in and check-out from the location, hence enabling users to control their privacy. However, it increases the error margin in the tracking and tracing process. This method has been implemented by a few private sector entities in Malaysia, Australia, and New Zealand.
  • Ultrasound: Smartphones emit ultrasound signals which are detected by other smartphones. NOVID and SONAR-X are two digital contact tracing apps with sub-meter contact tracing capabilities that implement ultrasound.

Counterpoint-Digital Contact Tracing are Shields from Global Pandemic

A few real-life implementations:

  • India implemented Bluetooth proximity tracing with the Aarogya Setu app, which is now being used by almost 166 million of its citizens.
  • Italian company IK Multimedia has come up with a smart band, called Safe Spacer, with built-in memory to trace contacts, and time stamp collection to ensure social distancing.
  • Apart from IK Multimedia, brands like Fitbit and Samsung are also working for a similar purpose.
  • Some US military Academy cadets are donning smartwatches to evaluate their effectiveness in contact tracing. Since these devices contain no GNSS data, they will not hinder the cadets’ privacy.

Privacy concern over digital contact tracing:

The dilemma of social security and personal privacy has already been widely debated. Allowing apps to access your image gallery or camera is already a trade-off that you often sign up for in this age of connected devices.

Two of the major concerns over digital contact tracing are:

  • Bluetooth proximity tracing is designed to log a person’s contacts and send them to a centralized/decentralized database to work with apps developed by public health authorities. This raises privacy concerns over documentation of the time and date of your encounter along with the identity of another person. However, app developers and companies like Google and Apple want such data to be kept anonymous.
  • Location tracking creates a timeline of a person’s movement throughout the day. Such data can be misutilized in the wrong hands.

If the data is centralized, i.e. it is in control of an authoritative entity like a government, employer, or university, it may give officials undue power over an individual. However, even if the data is in good hands, it remains vulnerable to cyberattacks due to its single point of access, which can potentially result in data of all users being compromised in a single breach.

A blockchain-based decentralized approach gives users more control over the use of their information and reduces the risk of a wide-ranging breach or abuse.


Enabling contact tracing solutions through smartphones and smart wearables, along with maintaining the anonymity of the people, are crucial to effectively tracking and tracing the infected people and saving precious lives in any future outbreak.

Related Posts