Audrey Tang

…history. There’s already local storage based tools, where you can use that API to download locally to the browser and match it with the already known travel path from a known person who’s infected. That is passive collection, right? It’s basically where your phone has been.