Skip to main content
. 2021 Feb 9;9(2):e25245. doi: 10.2196/25245

Figure 3.

Figure 3

Probable attacks on contact tracing apps.