This website was mostly translated automatically from the
German version. We
apologize for any translation errors.
x
Integration
Zilp-Zalp is an open system and can thus be easily integrated
into third-party applications. This should allow to integrate a
method for privacy-friendly and decentralized contact tracking into
existing systems (apps, tickets, etc.). This document describes the
general integration possibilities of the protocol
Preliminary note
This document generally describes integration possibilities of
Zilp-Zalp into third party systems. - However, the security and -
privacy aspects of such integration must always be considered on a
case-by-case basis using the complete system design, as integration
can lead to a weakening of the security & privacy guarantees of the
Zilp-Zalp protocol.
Integration in third party apps
In general, Zilp-Zalp QR codes can also be integrated into
existing apps. In this case, an initialization would first be
carried out via the Zilp-Zalp web application. Subsequently, the
public QR codes generated from this would be transferred via a
suitable mechanism to a smartphone app, which stores them locally
and displays them as required. As described above, time-based QR
codes can be generated in this process. However, the secret keys
remain under the control of the user. Accordingly, if the
third-party app is compromised, no personal or sensitive data can
become known. However, since the app knows all of a user's QR
codes, there is still a re-identification risk in the event that
the third-party app operator gains knowledge of all hash values
stored in the system. However, since these are processed by other
actors, the risk can be considered low. In addition, as of protocol
version 0.4, information on localities is also stored
in encrypted form and can therefore only be decrypted by health
authorities even if all visit data is published.
Integration into digital or analogue documents
Zilp-Zalp QR codes can also be integrated into other digital or
analog documents. For example, public Zilp-Zalp codes could be
integrated directly into admission tickets. In this case, the
operator who integrates this data must first initialize it together
with the user. This should ideally be done locally by integrating
the Zilp-Zalp web library, so that again secret keys remain
strictly with the user. Alternatively, the user can provide the
operator's system with an existing Zilp-Zalp QR code, which can
then be integrated into the document. This has the advantage that
the operator cannot gain knowledge of the user's secret key
material. However, since many registration scenarios already
process personal data of the user (and thus are already available
to the operator), these can also be used directly to perform an
initialization. As with integration in third-party apps, however,
the operator gains knowledge of the user's QR code and can assign
it accordingly, thus gaining knowledge of an alert for the
corresponding code and linking it to the user. Whether this risk is
justifiable must be weighed up. A modification of the tendering
process as described in protocol version 0.5 can
minimise this risk.
Integration
Zilp-Zalp is an open system and can thus be easily integrated into third-party applications. This should allow to integrate a method for privacy-friendly and decentralized contact tracking into existing systems (apps, tickets, etc.). This document describes the general integration possibilities of the protocol
Preliminary note
This document generally describes integration possibilities of Zilp-Zalp into third party systems. - However, the security and - privacy aspects of such integration must always be considered on a case-by-case basis using the complete system design, as integration can lead to a weakening of the security & privacy guarantees of the Zilp-Zalp protocol.
Integration in third party apps
In general, Zilp-Zalp QR codes can also be integrated into existing apps. In this case, an initialization would first be carried out via the Zilp-Zalp web application. Subsequently, the public QR codes generated from this would be transferred via a suitable mechanism to a smartphone app, which stores them locally and displays them as required. As described above, time-based QR codes can be generated in this process. However, the secret keys remain under the control of the user. Accordingly, if the third-party app is compromised, no personal or sensitive data can become known. However, since the app knows all of a user's QR codes, there is still a re-identification risk in the event that the third-party app operator gains knowledge of all hash values stored in the system. However, since these are processed by other actors, the risk can be considered low. In addition, as of protocol version
0.4
, information on localities is also stored in encrypted form and can therefore only be decrypted by health authorities even if all visit data is published.Integration into digital or analogue documents
Zilp-Zalp QR codes can also be integrated into other digital or analog documents. For example, public Zilp-Zalp codes could be integrated directly into admission tickets. In this case, the operator who integrates this data must first initialize it together with the user. This should ideally be done locally by integrating the Zilp-Zalp web library, so that again secret keys remain strictly with the user. Alternatively, the user can provide the operator's system with an existing Zilp-Zalp QR code, which can then be integrated into the document. This has the advantage that the operator cannot gain knowledge of the user's secret key material. However, since many registration scenarios already process personal data of the user (and thus are already available to the operator), these can also be used directly to perform an initialization. As with integration in third-party apps, however, the operator gains knowledge of the user's QR code and can assign it accordingly, thus gaining knowledge of an alert for the corresponding code and linking it to the user. Whether this risk is justifiable must be weighed up. A modification of the tendering process as described in protocol version
0.5
can minimise this risk.