HomeTechnologyQatar will require two...

Qatar will require two applications from World Cup visitors: are there any risks in them?

The World Championship will begin in November and will bring together guests from all qualified countries. | Font: AFP or licensors | Photographer: GIUSEPPE CACACHE

adUnits.push({
code: ‘Rpp_tecnologia_apps_Nota_Interna1’,
mediaTypes: {
banner: {
sizes: (navigator.userAgent.match(/iPhone|android|iPod/i)) ? [[300, 250], [320, 460], [320, 480], [320, 50], [300, 100], [320, 100]] : [[300, 250], [320, 460], [320, 480], [320, 50], [300, 100], [320, 100], [635, 90]]
}
},
bids: [{
bidder: ‘appnexus’,
params: {
placementId: ‘14149971’
}
},{
bidder: ‘rubicon’,
params: {
accountId: ‘19264’,
siteId: ‘314342’,
zoneId: ‘1604128’
}
},{
bidder: ‘amx’,
params: {
tagId: ‘MTUybWVkaWEuY29t’
}
},{
bidder: ‘oftmedia’,
params: {
placementId: navigator.userAgent.match(/iPhone|android|iPod/i) ? ‘22617692’: ‘22617693’
}
}]
});

at the gates of Qatar World Cup 2022, the government of the country wants all visitors to the territory to install two applications. However, there may be problems with them that even reach espionage and surveillance on the territory.

In particular, Programs are Eteraz D There is now. One serves as an application for tracking COVID-19 cases, while the other is used as the official application of the World Cup to follow matches, buy tickets and even take the subway to their cities. But why would they be a problem?

Spyware?

In accordance with the privacy policy Programs created by the Ministry of the Interior of the country, almost complete access to the mobile phone is requested, from reading or deleting the contents of the mobile phone, even taking precedence over others Programs and even prevent your computer from going to sleep.

In addition, it also requests access to the person’s location.

When There is nowasks to share personal information without restrictions, as well as access to location or mobile network connections.

It also emphasizes that you cannot request deletion of the data we provide.

FROM NRK These applications have been extensively investigated with disappointing results.

“By downloading these two applications, you agree to the terms of the contract, and these terms are very generous. Basically, you transfer all the information to your phone. You give the people who control the applications the ability to read and change things and modify them. They also have the ability to receive information from other applications if they have the ability, and we believe they do,” says Øyvind Vasaasen, head of security.

– You say that it is perfectly normal if the authorities come to your house. They receive the key and can enter. You don’t know what they are doing there. They say that they may not take advantage of this opportunity, but you give them this opportunity. And you would never do that,” Vasaasen says.

intrusive politics

Other experts expressed their point of view on this issue.

Naomi Lintvedt, a law researcher at the University of Oslo, notes that if she were an employer, she would not allow her employees to take their mobile phone to work from work. Qatar. Even as a private citizen, she would be very skeptical about using her own phone in a country hosting the World Cup.

We recommend METADATA, RPP’s technology podcast. News, analytics, reviews, recommendations and everything you need to know about the tech world.

Source: RPP

- A word from our sponsors -

Most Popular

LEAVE A REPLY

Please enter your comment!
Please enter your name here

More from Author

- A word from our sponsors -

Read Now

Mother and Sin settled in a circle after three Plenid flights (video)

Mother and son - the grapes of Margarita and Ruslan - unexpectedly met at today's exchange after three years of captivity after Azovstal left in Maripul. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation;...

In Bell House, they were a goat goat in a scandal with a signal date

US Secretary of Defense Pitt Hegset will be released using data leakage. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation; } The politician writes about this. The head...

The American congressman-prisoners wrote a post for Putin on the shell

The American congressman-regional Brian Fizpatrick wrote a message for Putin in the shell. The armed forces helped with delivery. .in_text_content_22 {width: 300px; Height: 600px; } @Media (min-width: 600px) {.in_text_content_22 {width: 580px; Height: 400px; }} .Adsbygoogle {Touch-Action: Manipulation; } Fitzpatrick, who arrived...