SlideShare a Scribd company logo
1 of 49
Download to read offline
SafetyScore
protecting lives, livelihoods, and liberty
• As a result of globalization, new pandemics
have the potential to spread like wildfire
around our planet
• The last decade has seen an alarming increase
in the number of new infectious diseases cross
over from animals to people
• Until we address the root causes (food supply
chain, urbanization, biodiversity loss, etc.), we
need to be prepared for new pandemics
Threat of Pandemics
• The economic impact of pandemics can be
devastating. Millions unemployed and many
more facing an uncertain future
• Unless we make major breakthroughs in
medical science, it will always take time to
create effective treatments and vaccinations
• Many businesses will simply not be able to
survive another wave of lockdowns in the face
of a new pandemic
Economic Challenges
SafetyScore
SafetyScore allows us to take back control.
We can keep people safe while keeping the
economy and critical industries open.
SafetyScore 11
63
85
67
21
9971
74
73
82 60
68
Health Passport
• SafetyScore calculates a score for everyone
based on the encounters they've had with
potentially infected people
• Authorities can verify an individual's
SafetyScore by simply scanning a QR code on
the user's app
• Being able to assess people's risk levels gives
countries a powerful tool to contain epidemics,
save lives, and keep economies alive
SafetyScore Health Passport
Scanning ...
14:18
Verified.
Entry Granted
14:18
92
• Places like universities, offices, restaurants, and
bars can operate safely by simply checking
people's SafetyScore before letting them in
• This helps to keep premises safe. Governments
can regulate the required Safety Levels on a
regional basis depending on the premise type
• SafetyScore empowers communities to self-
manage their risk so that local economies can
function while keeping people safe
Keeping Businesses Open
SafetyScore 11
63
85
67
21
9971
74
73
82 60
68
Traffic Light System
26
13:27
Nov 22
13:27
45
18:11
Nov 9
18:11
SAFE ON ALERT SELF-ISOLATE
Unrestricted Access Restricted Access at Large Events Regulated Access
10:52
88
10:52
Oct 5
SafetyScore Air Bridges
• SafetyScore enables people to visit other
Air Bridge countries without the need for
quarantine
• Governments can limit their exposure to
foreign infection risk by checking people's
SafetyScore before letting them in
• Governments specify the Air Bridge
countries that they trust, and this will be
factored into the verification process
How It Works
SafetyScore
SafetyScore takes a radically different approach
to first-generation contact tracing apps built on
the Apple/Google framework
• SafetyScore uses Bluetooth on mobile phones
to detect others that come in close proximity
to a user
• Unlike first-gen apps which broadcast random
IDs over Bluetooth, SafetyScore broadcasts
cryptographic public keys
• This allows us to establish secure
communication channels between users that
will remain private from others
Proximity Detection
10:42 11:15 13:28
SafetyScore
distributes risk
Patient confirms
diagnosis
Health official
checks patient
First Degree
Contacts
Second Degree
Contacts
82
-10
71
-20
11
-9
15-6
85
-2
09
-17
• Health officials certify when someone is infected.
This propagates risk to the contact chain of the
infected person, updating SafetyScores
• Unlike first-gens apps that only notify direct
contacts, SafetyScore also propagates risk to
indirect contacts, improving accuracy
• If a person's score drops below a threshold,
governments can use this to prioritize access to
testing, treatment, and benefits
Risk Propagation
FIRST-GEN APPS
Exposure notification to direct contacts only
!
99
71
68
82
71
11
15
09
23
23
-21
-1
-2
-5
-10
-1
-14
16
!
85
-4
-7
-17
-6
-2
SAFETYSCORE
Fine-grain risk propagation to both direct and indirect contacts
• A range of factors are brought together to
make an individual's SafetyScore as accurate as
possible while maintaining privacy
• The score includes risk exposure from direct
and indirect contacts, recent test results, and
the Geo-Regions the individual has visited
• To minimize cheating, the score factors in user
behavior, e.g. that they haven't turned the
phone off
SafetyScore Calculation
SafetyScore
1st
, 2nd
Degree
Risk Exposure
Geo-Region
Activity Profile Risk Profile
Test Results
(Immunity,
Negative Tests)
• Most contact tracing apps have seen adoption
rates of less than 20% — resulting in less than
4% of contacts being traced
• In contrast, the SafetyScore health passport is
able to work effectively at the local community
level, and can thus grow to scale organically
• The ability to safeguard spaces aligns with the
operational and liability concerns of universities
and businesses, further accelerating adoption
Designed for Growth
• SafetyScore has been designed from the
ground up to maximize a user's privacy and to
protect them from being tracked
• User activity is obscured through multiple
cryptographic layers and constantly changes so
as to limit the potential for mass surveillance
• SafetyScore builds on established primitives
such as cryptographic blinding to obscure the
social interactions between people
Privacy First
• SafetyScore nodes act as an API server for
clients like mobile apps. Collectively, these
nodes form a peer-to-peer network
• Since they are not controlled by a single entity,
it protects the system from malicious parties
such as foreign agents
• While we expect governments to run nodes to
serve their population, anyone will be able to
run one to further improve network security
Decentralized Protocol
Distribution
Commitments
Risk
Account
Day 7
Notary1
Notary2
Notary3
A305
B305
B305 B306
C306 D306 E306
B307
1
2
3
4
7
6
5
• SafetyScore is built around a distributed ledger
which serves as a high-integrity, shared
database without a single point of control
• Our distributed consensus algorithm is able to
scale to meet the high throughput needs of
SafetyScore
• To protect against resource exhaustion attacks
and spam, nodes will only gain the right to
write to the ledger by acting reliably over time
Distributed Ledger
Signature for Block 5 Signature for Block 6
Block
Reference
Block
Reference
Block
Reference
Block
Reference
Block
Reference
Entry Entry Entry Entry Entry
Entry Entry
Entry Entry Entry Entry Entry
Entry Entry Entry Entry Entry
• When health officials certify infections, they
make public some anonymized data, e.g. type
of disease, test method, location, etc.
• Epidemiologists can use this to track disease
spread and can act as an early warning system
for new infectious diseases
• Health authorities can use this to prioritize
resource allocation and co-ordinate responses
both locally and globally
Epidemic Response Hub
• SafetyScore is being developed as an open
source project. This helps us maximize
transparency and build a global community
• The SafetyScore protocol will be an open
standard so that others can build on it, e.g.
hardware devices, software services, etc.
• We will also release an extensible mobile SDK
so that others can integrate SafetyScore into
their existing apps and services
Open Source
• SafetyScore’s protocol is flexible enough to
address all contagious diseases, whether it's
the seasonal flu or a new pandemic
• It can be continuously updated to address new
scientific data, e.g. new strains, new diseases,
our understanding of immunity, etc.
• SafetyScore can self-learn and adapt the score
calculation to changes in disease transmission
and social behavior
Future Proof
• SafetyScore primarily accounts for
transmission via people and is limited in its
ability to track transmission via surfaces
• While smartphone adoption is high enough in
urban areas, where most transmission happens,
it might be an issue in certain countries
• SafetyScore will use about 30MB of mobile
data every day. This may prove to be costly for
users in some countries
Limitations
• The targeted approach of health passports
might feel unfair, but we believe this is better
than blanket lockdowns
• Governments will be able to help ensure fairness
by making special allowances for key workers,
vulnerable citizens, and essential services
• SafetyScore will make visible to users the
various factors that are affecting their score so
as to maximize transparency and trust
Fairness
SafetyScore
Health Passport
Apple/Google
Contact Tracing
Decentralized & Privacy-Preserving ✓ ✓
Exposure Notification ✓ ✓
Verifiable Risk Score ✓ ✗
Second Degree+ Contacts ✓ ✗
Designed for Growth ✓ ✗
Air Bridges ✓ ✗
Comparison
International Team
Assembled from World-Leading Experts
✓ Public Health
✓ Epidemiology
✓ Privacy
✓ Cybersecurity
✓ Distributed Systems
✓ Open Source
✓ Human-Centered Design
Tav Siva  Social entrepreneur,
distributed systems engineer, open
source developer. Chainspace, UK
Home Office, WikiHouse, Freenet
Tom Salfield  Social-tech
entrepreneur, collaborative systems
designer. Wikifactory, Impact Hub,
Opencoin, Imperial, LSE
Dr. Luke Robinson Deep tech
entrepreneur, quantum physicist.
Post Urban Ventures, Hazy, Oxford,
Cambridge
Dr. Oliver Zahn  Ex-Head of Data
Science at Google. Tech
entrepreneur. SpaceX, Impossible
Foods, UC Berkeley, Harvard
Dr. Laura Kahn  Co-founder at One
Health Initiative. Public health
expert, physician, science and
global security scholar. Princeton
Dr. David Spergel Director at
Simons Foundation. Computational
astrophysicist. Breakthrough prize
winner. Princeton, NASA, Harvard
Imtiaz Shams AI entrepreneur,
non-profit builder, fundraising. Post
Urban Ventures, Charities: Think &
Faith to Faithless, LSE
Alice Fung Director at Health
Foundry. Top 100 Women in Social
Enterprise. Architecture 00, Mayor's
Design Advocate, Impact Hub
Hinesh Mandalia  Senior full-stack
engineer, fintech. G-Research,
Lloyds Banking Group, Logica,
Imperial
William Pritchard  Senior QA
engineer, automation tester, data
security, AI. Genomics England, UK
Cabinet Office, Capgemini
Krishna Kotecha  Ex-iOS team lead
at Babylon Health. Award-winning
mobile developer. Hailo, Deutsche
Bank, Symbian
Ramesh Nair  Full-stack polyglot
engineer, blockchain enthusiast.
Nayms, TokenCard, Ethereum
Foundation, Imperial
Alex McKinlay  Senior software
engineer, distributed systems, fintech,
smart contracts. Refinitiv, TokenCard,
Pantheon Ventures
Huy Dinh  Experienced CTO, scalable
systems architect, app developer.
NTT Docomo. Guardian News, BBC
Worldwide
Dr. Nina Fefferman Infectious
diseases modeling expert. Professor
in Ecology, Evolution & Maths at UT
Knoxville. Rutgers, Tufts, Princeton
Anthony Leung  Senior finance,
treasury, and strategy executive.
Tesco, Credit Suisse, Morgan
Stanley, LSE
Seyi Ogunyemi  Senior full-stack
engineer, graphic designer, UX
specialist, fintech. Civic, Espians,
Coca-Cola, Diageo
How It Compares
We built an agent-based simulation tool to test our assumptions and
see how SafetyScore compares
The baseline, without any apps or other interventions, results in 80% of
the population infected for the median case
For an Apple/Google-based app, even assuming a high adoption rate of
60%, we see 73% of the population still get infected
In contrast, with SafetyScore, only 18% of the population get infected
and 1% require self-isolation
This is almost as effective as lockdowns, where 7% get infected, but
without the economic impact of isolating 83% of the population
SafetyScore
These simulations show that SafetyScore can
keep citizens healthy and economies open at the
same time
SafetyScore is 3x better than Apple/Google-based apps for preventing
infections and 48x better than lockdowns in terms of time spent in
isolation
Appendix
Simulation Tool
Try out our simulation tool:
https://simulation.safetyscore.app
Read our whitepaper:
https://safetyscore.app/whitepaper
Whitepaper
Establishing Contact Keys
Save Contact
Key from X
Save Contact
Key from Y
Broadcast
Key
Broadcast
Key
X
Y
Derive Shared Secret
Derive Temporary
Contact Key for Y
Derive Temporary
Contact Key for X
Distributed Ledger
Post Contact
Proof to Ledger
Post Contact
Proof to Ledger
Post Contact
Key for Y
Post Contact
Key for X
Aggregate proofs from X
corresponding to the same
Activity Period
Aggregate proofs from Y
corresponding to the same
Activity Period
Layered Identity
A1 A2 A... A48
R1 R2
K1 K2 K3 K4 K5 K... K... K118 K119
A49 A...
K120 K122 K123 K... K... K...
Broadcast
Keys
Activity
Keys
Daily Risk
Accounts
Distributed Ledger
Node C
Node B
Node A
Tick 1
Block A1
Block B1
Block C1
Block A2
References
A1
Block C2
References
A1, B1, C1
Block A3
References
A2, B1, C1, C2
Block B2
References
A1, B1, C1, C2
Block B3
References
A2, A3, B2
Block C3
References
A2, A3, B2, C2
Block A4
References
A3, B2
Tick 2 Tick 3 Tick 4
Node Relays
Legend:
Path 1
Path 2
Node
Relay Path
Relay Start
Relay Termination & Publication
Risk Distribution Flow
A5 A6 A7 A8 A9 A10
B5 B6 B7 B8 B9 B10
E5 E6 E7 E8 E9 E10
Risk Distribution Tree
A6
B6 C6 D6
F10 F12 G12
H10 I12 J12
Distribution
Implicit Distribution
Activity Key
Legend:
C11B8 B9 D12
F11F9E8
J7
Connection
Links
1. Bidirectional Contact Tracing is Required for Reliable COVID-19 Control
2. The UK's Contact Tracing Plan Has Two Fatal Flaws
3. Effective Configurations of a Digital Contact Tracing App: A report to NHSX
4. Contact-Tracing Apps Aren’t the Technology Panacea People Hoped
5. Exposure Notifications: Using Technology to Help Public Health Authorities Fight COVID-19
6. A Socio-Technical Framework for Digital Contact Tracing
7. Longitudinal Evaluation and Decline of Antibody Responses in SARS-CoV-2 Infection
SafetyScore
connect@safetyscore.app

More Related Content

What's hot

Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Arnold Bijlsma
 

What's hot (20)

SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
ICS CERT- Incidence Reports
ICS CERT- Incidence ReportsICS CERT- Incidence Reports
ICS CERT- Incidence Reports
 
Next Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers GuideNext Generation Endpoint Prtection Buyers Guide
Next Generation Endpoint Prtection Buyers Guide
 
Allianz Global CISO october-2015-draft
Allianz Global CISO  october-2015-draftAllianz Global CISO  october-2015-draft
Allianz Global CISO october-2015-draft
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Scot Secure 2015
Scot Secure 2015Scot Secure 2015
Scot Secure 2015
 
edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019) edgescan vulnerability stats report (2019)
edgescan vulnerability stats report (2019)
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
 
Skillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant fluxSkillful scalefull fullstack security in a state of constant flux
Skillful scalefull fullstack security in a state of constant flux
 
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)Lookout Mobile Endpoint Security Datasheet (US - v2.5)
Lookout Mobile Endpoint Security Datasheet (US - v2.5)
 
Windstream Cloud Security Checklist
Windstream Cloud Security Checklist Windstream Cloud Security Checklist
Windstream Cloud Security Checklist
 
5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats5 Key Findings on Advanced Threats
5 Key Findings on Advanced Threats
 
Web security – application security roads to software security nirvana iisf...
Web security – application security roads to software security nirvana   iisf...Web security – application security roads to software security nirvana   iisf...
Web security – application security roads to software security nirvana iisf...
 
Webinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on UtilitiesWebinar - Reducing the Risk of a Cyber Attack on Utilities
Webinar - Reducing the Risk of a Cyber Attack on Utilities
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 

Similar to SafetyScore

Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd Iaetsd
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
SUBHI7
 

Similar to SafetyScore (20)

Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Covid Safe Paths
Covid Safe PathsCovid Safe Paths
Covid Safe Paths
 
Connected Platform for Contact Tracing
Connected Platform for Contact TracingConnected Platform for Contact Tracing
Connected Platform for Contact Tracing
 
Connected Platform for Contact Tracing
Connected Platform for Contact TracingConnected Platform for Contact Tracing
Connected Platform for Contact Tracing
 
Securing the digital front door
Securing the digital front doorSecuring the digital front door
Securing the digital front door
 
Selv Demo - A Digital Health Passport
Selv Demo - A Digital Health PassportSelv Demo - A Digital Health Passport
Selv Demo - A Digital Health Passport
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Insecure magazine - 51
Insecure magazine - 51Insecure magazine - 51
Insecure magazine - 51
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
e-HealthWhitepaper
e-HealthWhitepapere-HealthWhitepaper
e-HealthWhitepaper
 
Smartphones in Healthcare
Smartphones in HealthcareSmartphones in Healthcare
Smartphones in Healthcare
 
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
A Proposed Blueprint of a “privacy first” Pan Canadian Disease Contact Tracin...
 
COVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTIONCOVID-19 FACE MASK DETECTION
COVID-19 FACE MASK DETECTION
 
Iaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakageIaetsd cplm cloud facilitated privacy shielding leakage
Iaetsd cplm cloud facilitated privacy shielding leakage
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
AtHocProductBrochure_V2
AtHocProductBrochure_V2AtHocProductBrochure_V2
AtHocProductBrochure_V2
 
Blockchain Technology and COVID19
Blockchain Technology and COVID19Blockchain Technology and COVID19
Blockchain Technology and COVID19
 
Mobile Apps Security Testing -1
Mobile Apps Security Testing -1Mobile Apps Security Testing -1
Mobile Apps Security Testing -1
 
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with SplunkMapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
 
Risk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docxRisk management planExecutive SummaryThe past.docx
Risk management planExecutive SummaryThe past.docx
 

Recently uploaded

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 

SafetyScore

  • 2. • As a result of globalization, new pandemics have the potential to spread like wildfire around our planet • The last decade has seen an alarming increase in the number of new infectious diseases cross over from animals to people • Until we address the root causes (food supply chain, urbanization, biodiversity loss, etc.), we need to be prepared for new pandemics Threat of Pandemics
  • 3. • The economic impact of pandemics can be devastating. Millions unemployed and many more facing an uncertain future • Unless we make major breakthroughs in medical science, it will always take time to create effective treatments and vaccinations • Many businesses will simply not be able to survive another wave of lockdowns in the face of a new pandemic Economic Challenges
  • 4. SafetyScore SafetyScore allows us to take back control. We can keep people safe while keeping the economy and critical industries open.
  • 7. • SafetyScore calculates a score for everyone based on the encounters they've had with potentially infected people • Authorities can verify an individual's SafetyScore by simply scanning a QR code on the user's app • Being able to assess people's risk levels gives countries a powerful tool to contain epidemics, save lives, and keep economies alive SafetyScore Health Passport Scanning ... 14:18 Verified. Entry Granted 14:18 92
  • 8. • Places like universities, offices, restaurants, and bars can operate safely by simply checking people's SafetyScore before letting them in • This helps to keep premises safe. Governments can regulate the required Safety Levels on a regional basis depending on the premise type • SafetyScore empowers communities to self- manage their risk so that local economies can function while keeping people safe Keeping Businesses Open SafetyScore 11 63 85 67 21 9971 74 73 82 60 68
  • 9. Traffic Light System 26 13:27 Nov 22 13:27 45 18:11 Nov 9 18:11 SAFE ON ALERT SELF-ISOLATE Unrestricted Access Restricted Access at Large Events Regulated Access 10:52 88 10:52 Oct 5
  • 10. SafetyScore Air Bridges • SafetyScore enables people to visit other Air Bridge countries without the need for quarantine • Governments can limit their exposure to foreign infection risk by checking people's SafetyScore before letting them in • Governments specify the Air Bridge countries that they trust, and this will be factored into the verification process
  • 12. SafetyScore SafetyScore takes a radically different approach to first-generation contact tracing apps built on the Apple/Google framework
  • 13. • SafetyScore uses Bluetooth on mobile phones to detect others that come in close proximity to a user • Unlike first-gen apps which broadcast random IDs over Bluetooth, SafetyScore broadcasts cryptographic public keys • This allows us to establish secure communication channels between users that will remain private from others Proximity Detection 10:42 11:15 13:28
  • 14. SafetyScore distributes risk Patient confirms diagnosis Health official checks patient First Degree Contacts Second Degree Contacts 82 -10 71 -20 11 -9 15-6 85 -2 09 -17 • Health officials certify when someone is infected. This propagates risk to the contact chain of the infected person, updating SafetyScores • Unlike first-gens apps that only notify direct contacts, SafetyScore also propagates risk to indirect contacts, improving accuracy • If a person's score drops below a threshold, governments can use this to prioritize access to testing, treatment, and benefits Risk Propagation
  • 15. FIRST-GEN APPS Exposure notification to direct contacts only !
  • 17. • A range of factors are brought together to make an individual's SafetyScore as accurate as possible while maintaining privacy • The score includes risk exposure from direct and indirect contacts, recent test results, and the Geo-Regions the individual has visited • To minimize cheating, the score factors in user behavior, e.g. that they haven't turned the phone off SafetyScore Calculation SafetyScore 1st , 2nd Degree Risk Exposure Geo-Region Activity Profile Risk Profile Test Results (Immunity, Negative Tests)
  • 18. • Most contact tracing apps have seen adoption rates of less than 20% — resulting in less than 4% of contacts being traced • In contrast, the SafetyScore health passport is able to work effectively at the local community level, and can thus grow to scale organically • The ability to safeguard spaces aligns with the operational and liability concerns of universities and businesses, further accelerating adoption Designed for Growth
  • 19. • SafetyScore has been designed from the ground up to maximize a user's privacy and to protect them from being tracked • User activity is obscured through multiple cryptographic layers and constantly changes so as to limit the potential for mass surveillance • SafetyScore builds on established primitives such as cryptographic blinding to obscure the social interactions between people Privacy First
  • 20. • SafetyScore nodes act as an API server for clients like mobile apps. Collectively, these nodes form a peer-to-peer network • Since they are not controlled by a single entity, it protects the system from malicious parties such as foreign agents • While we expect governments to run nodes to serve their population, anyone will be able to run one to further improve network security Decentralized Protocol Distribution Commitments Risk Account Day 7 Notary1 Notary2 Notary3 A305 B305 B305 B306 C306 D306 E306 B307 1 2 3 4 7 6 5
  • 21. • SafetyScore is built around a distributed ledger which serves as a high-integrity, shared database without a single point of control • Our distributed consensus algorithm is able to scale to meet the high throughput needs of SafetyScore • To protect against resource exhaustion attacks and spam, nodes will only gain the right to write to the ledger by acting reliably over time Distributed Ledger Signature for Block 5 Signature for Block 6 Block Reference Block Reference Block Reference Block Reference Block Reference Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry Entry
  • 22. • When health officials certify infections, they make public some anonymized data, e.g. type of disease, test method, location, etc. • Epidemiologists can use this to track disease spread and can act as an early warning system for new infectious diseases • Health authorities can use this to prioritize resource allocation and co-ordinate responses both locally and globally Epidemic Response Hub
  • 23. • SafetyScore is being developed as an open source project. This helps us maximize transparency and build a global community • The SafetyScore protocol will be an open standard so that others can build on it, e.g. hardware devices, software services, etc. • We will also release an extensible mobile SDK so that others can integrate SafetyScore into their existing apps and services Open Source
  • 24. • SafetyScore’s protocol is flexible enough to address all contagious diseases, whether it's the seasonal flu or a new pandemic • It can be continuously updated to address new scientific data, e.g. new strains, new diseases, our understanding of immunity, etc. • SafetyScore can self-learn and adapt the score calculation to changes in disease transmission and social behavior Future Proof
  • 25. • SafetyScore primarily accounts for transmission via people and is limited in its ability to track transmission via surfaces • While smartphone adoption is high enough in urban areas, where most transmission happens, it might be an issue in certain countries • SafetyScore will use about 30MB of mobile data every day. This may prove to be costly for users in some countries Limitations
  • 26. • The targeted approach of health passports might feel unfair, but we believe this is better than blanket lockdowns • Governments will be able to help ensure fairness by making special allowances for key workers, vulnerable citizens, and essential services • SafetyScore will make visible to users the various factors that are affecting their score so as to maximize transparency and trust Fairness
  • 27. SafetyScore Health Passport Apple/Google Contact Tracing Decentralized & Privacy-Preserving ✓ ✓ Exposure Notification ✓ ✓ Verifiable Risk Score ✓ ✗ Second Degree+ Contacts ✓ ✗ Designed for Growth ✓ ✗ Air Bridges ✓ ✗ Comparison
  • 29. Assembled from World-Leading Experts ✓ Public Health ✓ Epidemiology ✓ Privacy ✓ Cybersecurity ✓ Distributed Systems ✓ Open Source ✓ Human-Centered Design
  • 30. Tav Siva  Social entrepreneur, distributed systems engineer, open source developer. Chainspace, UK Home Office, WikiHouse, Freenet Tom Salfield  Social-tech entrepreneur, collaborative systems designer. Wikifactory, Impact Hub, Opencoin, Imperial, LSE Dr. Luke Robinson Deep tech entrepreneur, quantum physicist. Post Urban Ventures, Hazy, Oxford, Cambridge Dr. Oliver Zahn  Ex-Head of Data Science at Google. Tech entrepreneur. SpaceX, Impossible Foods, UC Berkeley, Harvard Dr. Laura Kahn  Co-founder at One Health Initiative. Public health expert, physician, science and global security scholar. Princeton Dr. David Spergel Director at Simons Foundation. Computational astrophysicist. Breakthrough prize winner. Princeton, NASA, Harvard Imtiaz Shams AI entrepreneur, non-profit builder, fundraising. Post Urban Ventures, Charities: Think & Faith to Faithless, LSE Alice Fung Director at Health Foundry. Top 100 Women in Social Enterprise. Architecture 00, Mayor's Design Advocate, Impact Hub Hinesh Mandalia  Senior full-stack engineer, fintech. G-Research, Lloyds Banking Group, Logica, Imperial William Pritchard  Senior QA engineer, automation tester, data security, AI. Genomics England, UK Cabinet Office, Capgemini Krishna Kotecha  Ex-iOS team lead at Babylon Health. Award-winning mobile developer. Hailo, Deutsche Bank, Symbian Ramesh Nair  Full-stack polyglot engineer, blockchain enthusiast. Nayms, TokenCard, Ethereum Foundation, Imperial Alex McKinlay  Senior software engineer, distributed systems, fintech, smart contracts. Refinitiv, TokenCard, Pantheon Ventures Huy Dinh  Experienced CTO, scalable systems architect, app developer. NTT Docomo. Guardian News, BBC Worldwide Dr. Nina Fefferman Infectious diseases modeling expert. Professor in Ecology, Evolution & Maths at UT Knoxville. Rutgers, Tufts, Princeton Anthony Leung  Senior finance, treasury, and strategy executive. Tesco, Credit Suisse, Morgan Stanley, LSE Seyi Ogunyemi  Senior full-stack engineer, graphic designer, UX specialist, fintech. Civic, Espians, Coca-Cola, Diageo
  • 32. We built an agent-based simulation tool to test our assumptions and see how SafetyScore compares
  • 33. The baseline, without any apps or other interventions, results in 80% of the population infected for the median case
  • 34. For an Apple/Google-based app, even assuming a high adoption rate of 60%, we see 73% of the population still get infected
  • 35. In contrast, with SafetyScore, only 18% of the population get infected and 1% require self-isolation
  • 36. This is almost as effective as lockdowns, where 7% get infected, but without the economic impact of isolating 83% of the population
  • 37. SafetyScore These simulations show that SafetyScore can keep citizens healthy and economies open at the same time
  • 38. SafetyScore is 3x better than Apple/Google-based apps for preventing infections and 48x better than lockdowns in terms of time spent in isolation
  • 40. Simulation Tool Try out our simulation tool: https://simulation.safetyscore.app
  • 42. Establishing Contact Keys Save Contact Key from X Save Contact Key from Y Broadcast Key Broadcast Key X Y Derive Shared Secret Derive Temporary Contact Key for Y Derive Temporary Contact Key for X Distributed Ledger Post Contact Proof to Ledger Post Contact Proof to Ledger Post Contact Key for Y Post Contact Key for X Aggregate proofs from X corresponding to the same Activity Period Aggregate proofs from Y corresponding to the same Activity Period
  • 43. Layered Identity A1 A2 A... A48 R1 R2 K1 K2 K3 K4 K5 K... K... K118 K119 A49 A... K120 K122 K123 K... K... K... Broadcast Keys Activity Keys Daily Risk Accounts
  • 44. Distributed Ledger Node C Node B Node A Tick 1 Block A1 Block B1 Block C1 Block A2 References A1 Block C2 References A1, B1, C1 Block A3 References A2, B1, C1, C2 Block B2 References A1, B1, C1, C2 Block B3 References A2, A3, B2 Block C3 References A2, A3, B2, C2 Block A4 References A3, B2 Tick 2 Tick 3 Tick 4
  • 45. Node Relays Legend: Path 1 Path 2 Node Relay Path Relay Start Relay Termination & Publication
  • 46. Risk Distribution Flow A5 A6 A7 A8 A9 A10 B5 B6 B7 B8 B9 B10 E5 E6 E7 E8 E9 E10
  • 47. Risk Distribution Tree A6 B6 C6 D6 F10 F12 G12 H10 I12 J12 Distribution Implicit Distribution Activity Key Legend: C11B8 B9 D12 F11F9E8 J7 Connection
  • 48. Links 1. Bidirectional Contact Tracing is Required for Reliable COVID-19 Control 2. The UK's Contact Tracing Plan Has Two Fatal Flaws 3. Effective Configurations of a Digital Contact Tracing App: A report to NHSX 4. Contact-Tracing Apps Aren’t the Technology Panacea People Hoped 5. Exposure Notifications: Using Technology to Help Public Health Authorities Fight COVID-19 6. A Socio-Technical Framework for Digital Contact Tracing 7. Longitudinal Evaluation and Decline of Antibody Responses in SARS-CoV-2 Infection