App that helps to analyse individuals travel and trace their movements when cases of infection arise.
|size (curr.)||3158 kB|
Rakning C-19 App
Rakning C-19 is an app that can be downloaded voluntarily and facilitates the contact tracing process amidst the ongoing Covid-19 pandemic in Iceland.
With the user’s consent the app keeps their location data. In case the contact tracing team of the Department of Civil Protection and Emergency Management needs to track someone’s movements, they will be asked to upload their location data.
This would allow for the tracing team to help retrace a user’s movements for the last two weeks and increase the likelihood of identifying individuals you might have been in contact with.
Then go to the React Native Environment Setup page, click the
React Native CLI Quickstart tab, then select your
Development OS and
Target OS to get a detailed guide to configure your machine for app development.
Finally, install the project dependencies:
Run instructions for iOS:
- Open MyTestApp/ios/MyTestApp.xcworkspace in Xcode or run “xed -b ios”
- Hit the Run button
You need XCode and an Apple developer account to run this on device.
If you get this error when building the project for iOS:
error: /Users/pedroteixeira/projects/rakning-c19-app/ios/Pods/Target Support Files/Pods-Rakning/Pods-Rakning.debug.xcconfig: unable to open file (in target "Rakning" in project "Rakning") (in target 'Rakning' from project 'Rakning')
yarn prepare, which should fix this issue.
For other CocoaPods issues, it sometimes helps to go into the
ios folder and run:
pod install --repo-update
Run instructions for Android:
Have an Android emulator running (quickest way to get started), or a device connected. Then run:
How can I get the app?
There are now three ways to get this app:
Never install the app from places not listed here or on covid.is, since they can be spreading a modified version of the app which could compromise your privacy and security.
How does Rakning C-19 work?
It authenticates users with their phone number. It stores the user’s phone number, their locale and push notification token on the server.
Then the app requests permission to track the user’s location in the background. Geolocation updates are then stored on-device in a SQLite database.
When the backend receives a request for data, it marks the user for data collection and triggers a push notification.
Next time the user opens the app, it checks if there’s a data request and allows the user to approve the request before sending 14 days of geolocation data to the backend.
For more information, check out the System Architecture.
How does Rakning C-19 track the user’s location?
Rakning C-19 uses a React Native plugin called React Native Background Geolocation. Behind the scenes, it calls different APIs on Android and iOS to get geolocation updates, even when you don’t have the application opens.
These geolocation updates are stored in an SQLite database that the plugin manages.
The logic is in
When does the app send geolocation data to the backend?
Only after the user explicitly approves a data collection request.
The logic is in
Why Open Source?
The app is now open source under the MIT License. There are three main reasons:
- We want to encourage and facilitate cooperation between nations through this pandemic.
- We want more contributors to make the app better. It’s been a volunteer project from the beginning, so we have limited time to work on it.
- We want total transparency in how the app works precisely.
Please help us improve the app for all.
We’re still evaluating if/how we want to open source the API.
Who is behind this project?
The project is a private initiative developed in a close collaboration with the Icelandic Directorate of Health and the Department of Civil Protection and Emergency Management.
All respective parties gave their work to this project.
Do you accept contributions?
We’ll gladly accept contributions. Check out the issues for places to start.
Is the app secure?
We have reviewed the code multiple time and received security audits from third party vendors. However, there is no such thing as 100% security.
If you believe you’ve found a security vulnerability, please send it to us by emailing firstname.lastname@example.org. Please include the following details with your report:
- Description of the location and potential impact of the vulnerability.
- A detailed description of the steps required to reproduce the vulnerability (POC scripts, screenshots, and compressed screen captures are all helpful to us).
Please practice Responsible Disclosure and give us sufficient time to deploy a fix to our users.