Digital Herd Immunity and COVID-19 ================================== * Vir B. Bulchandani * Saumya Shivam * Sanjay Moudgalya * S. L. Sondhi ## Abstract A population can be immune to epidemics even if not all of its individual members are immune to the disease, just as long as sufficiently many are immune—this is the traditional notion of herd immunity. In the smartphone era a population can be immune to epidemics *even if not a single one of its members is immune to the disease*—a notion we propose to call “digital herd immunity”, which is similarly an emergent characteristic of the population. This immunity arises because contact-tracing protocols based on smartphone capabilities can lead to highly efficient quarantining of infected population members and thus the extinguishing of nascent epidemics. When the disease characteristics are favorable and smartphone usage is high enough, the population is in this immune phase. As usage decreases there is a novel “contact tracing” phase transition to an epidemic phase. We present and study a simple branching-process model for COVID-19 and show that digital immunity is possible regardless of the proportion of non-symptomatic transmission. We believe this is a promising strategy for dealing with COVID-19 in many countries such as India, whose challenges of scale motivated us to undertake this study. ## I. INTRODUCTION Recent events have challenged the public health infrastructure worldwide for controlling the spread of contagious diseases. This difficulty is partly due to the novel pathogen involved and partly due to some unusual characteristics of COVID-19 [1]. Specifically, the infection appears to be transmitted through a large number of asymptomatic and pre-symptomatic cases [1, 2]. This leaves two approaches to controlling an exponential growth in the number of infected people. The first is continuous monitoring of entire populations via regular testing, which can identify new infections already during their latent phase and thus end non-symptomatic transmission. The second is the established method of “contact tracing” [3], in which people who have been exposed to newly identified infected people are isolated before they have a chance to infect others. In principle, either approach is capable of ending the epidemic. Population-level testing is not possible as we write this. Traditional contact tracing, done by teams of health officials relying on interviews with newly identified cases, is also not up to the task today, as it fails if non-symptomatic transmission is too frequent [3, 4]. Fortunately, we live in the smartphone era, and it has been noted that using these devices to record contacts can make the task of tracing them entirely solvable by automating it. This idea has been spelled out in a series of papers [5, 6] (see also [7–9]) and is the basis for a rapidly expanding set of contact-tracing apps and the recent announcement by the Apple-Google duopoly of their intention to build the technology into their operating systems [10]. In this paper we contribute to this emerging field of infectious disease control along two axes. First, we present a simple model of the early stages of the spread of COVID-19, which allows us to obtain estimates, as a function of a varying amount of non-symptomatic transmission, of the fraction of the population that needs to participate in a digital contact-sharing network in order to prevent new epidemics. Our interest in this question was seeded by the very practical question of whether a country like India can use this technology to achieve epidemic control today. Indeed, India is now launched on this enterprise [11]. While modeling with various differences from our own became available while we were working on this problem [5, 12], we feel that our approach has the virtue of making the existence and values of the estimated compliance thresholds transparent. Our estimates for the fraction of the population that needs to own a contact-tracing app to avert a COVID-19 epidemic range from 75% – 95% for *R* = 3, depending on the fraction of asymptomatic transmission, *θ* = 20% – 50%, that takes place. For smaller *R* produced by social distancing this fraction is lower. Our second contribution is to frame the overall discussion in a language more familiar to physicists and students of complex phenomena more generally—that of phases, phase transitions and emergent properties. The bottom line here is the idea that the immunity of a population to epidemic growth is an emergent, or collective, property of the population. For traditional vaccination or epidemic-induced “herd immunity”, this feature gets conflated with the fact that individuals can be immune to the disease at issue. But mass digital contact tracing now makes it possible for the population to be immune to epidemic growth *even as no individual has immunity to the underlying disease*. We propose to refer to this as the existence of a “digital herd immunity”. This fits well into the general idea of an emergent property, which does not exist at the level of the microscopic constituents but exists for the collective [13, 14]. We would be remiss if we did not note that epidemiologists have previously referred to this state of affairs as “herd protection” and “sustained epidemic control” [5]. Our intention with the proposed terminology is both to frame a public health goal by including the word digital and to emphasize the emergent nature of a herd immunity. Our application of ideas from statistical physics to the theory of contact tracing yields three main dividends compared to earlier approaches. First, we are able to analytically quantify the effectiveness of contact tracing for any recursive depth *n*, from the limit of traditional, manual contact tracing, for which *n* = 1, to perfect digital tracing, for which *n* = *∞* in principle. Describing this crossover, which was beyond existing theoretical techniques [3, 15, 16], allows us to sharply formulate an important, general principle of disease control: for any proportion of non-symptomatic transmission, tracing and isolation based on a sufficiently widespread contact-tracing network, of sufficient recursive depth, can prevent epidemic spread. The second insight gained through our approach is a point of principle that has been neglected in the public discourse surrounding this issue, namely that with effective contact-tracing protocols in place, nascent epidemics can be extinguished with probability one. Third, our study of the universal properties of the contact-tracing phase transition allows us to capture the full probability distribution for epidemic sizes as the critical threshold for epidemic control is approached. Our results imply that the contact-tracing phase boundary is not even visible at the resolution of previous studies for COVID-19 [12], that attempted to estimate the critical threshold for contact tracing by numerically simulating the epidemic-size distribution function. In the balance of this paper we do the following. We begin by summarizing the case for contact tracing as an effective strategy for combating COVID-19. We then introduce a simple branching-process model for the spread of this disease, that incorporates the key features of asymptomatic transmission, pre-symptomatic transmission and recursive contact tracing. We find that there is *always* a critical fraction 0 ≤ *ϕc*<1 of app ownership, such that take-up of contact-tracing apps by a fraction *ϕ* > *ϕc* of the population is sufficient to prevent epidemic spread. We provide an analytical formula for this threshold, which is verified against detailed numerical simulations, and characterize the universal features of the resulting “contact-tracing phase transition”. Finally, we address the applicability of our results to the specific context of India. ## II. A MODEL FOR APP-BASED CONTACT TRACING ### A. Motivation and relevance to COVID-19 Traditional contact tracing is a multi-stage process. First, one identifies symptomatic, infected individuals. Next, one finds the people they came into close contact with during their infectious period. Finally, one treats or isolates these people before they can go on to infect others. Manual contact tracing becomes difficult for infections that have a period before the onset of symptoms when an exposed person is contagious (the Ω period). Further delay in finding the symptomatic person and their contacts could lead to tertiary infections, making it difficult to control an outbreak. For COVID-19, the incubation period is thought to be around 5-6 days, while the Ω period is estimated to be 1-3 days [2]. The time before becoming contagious, or the latent period L, is around 4 days. Stochasticity of these times aside, it is reasonable to expect that if Ω < *L* on average, and if the exposed contacts of an individual can be traced before they become infectious, then an epidemic could be prevented. However, the delays typical for manual contact tracing, even just one or two days, can render contact tracing completely ineffective for COVID-19, given the typical *L* and Ω periods; this conclusion is supported by detailed numerical simulations [5, 12]. This is where digital contact tracing comes in. A smartphone application could enable instant isolation of an infected person and their network of contacts. This halts the transmission chain, because infected contacts cannot infect others during their latent period. The question immediately arises of how widespread such tracing needs to be in order to prevent an epidemic, and this question is the focus of our paper. Below we present a simple model that captures the essential features of disease spread necessary to tackle this problem. To place our work in context, the classic quantitative analyses of the efficacy of contact tracing [3, 4], from before the smartphone era, showed that traditional, manual contact-tracing protocols become useless when the rate of non-symptomatic spreading, *θ*, is too high. By contrast, app-based approaches allow for “recursive” contact tracing, whereby contacts of contacts can be traced to an arbitrary recursive depth, at no additional cost. The effectiveness of recursive contact tracing has been studied in previous work; mathematically rigorous results exist in simple limits [16, 17] and detailed numerical simulations have been performed in analytically inaccessible regimes [15]. Some recent works have provided quantitative estimates for the effectiveness of non-recursive contact-tracing in the specific context of COVID-19 [5, 6, 12]. Our results should be viewed as complementary to these studies. One advantage of the model that we propose is its simplicity; this allows for a more thorough analytical understanding of the contact-tracing phase transition than in previous works, for *any* recursive depth, 0 ≤ *n* ≤ *∞*. ### B. A branching-process model Suppose we have an epidemic spreading through an infinite population of susceptibles, in discrete time, and infecting a number *R* of the population at each time step (here, *R* is an “effective reproduction number” that depends on the detailed properties of the epidemic spread, including the basic reproduction number *R*). This is a generic model for a spreading epidemic at short times. The total number of infections *I*tot scales as ![Formula][1] and if *R* < 1, the epidemic has been controlled. We want to understand which *R* best captures the effect of mobile-phone-based contact tracing. From a statistical physics perspective, *R* is the single relevant parameter controlling the epidemic spread, and drives a phase transition from an “epidemic phase” to an “immune phase” as *R* decreases below *R* =1, which we shall elaborate on below. For the purposes of modelling epidemic spread, the key question is which “microscopic” degrees of freedom must be included to obtain a realistic estimate for *R*. To this end, we consider three parameters that implicitly determine *R*: the fraction of the population that will present asymptomatic cases (*θ*), the fraction of the population using a contact-tracing application (*ϕ*), and the basic reproduction number for an individual who eventually shows symptoms (*RS*). *RS* is a combined measure of the number of pre-symptomatic infections and the efficacy of quarantine: in the limit of perfect isolation after showing symptoms, *RS* is precisely the number of people that a symptomatic individual infects during their Ω period, as defined above. We assume that *RS* is independent of whether a symptomatic individual is on the contact-tracing network or not. The effects of these parameters on the growth of the epidemic (or *R*) are studied using a simple branching-process model, where all infectious individuals are either symptomatic (S) or asymptomatic (A), and either on the app-based contact tracing network (C) or not (N). In an an uncontrolled setting, all types of infectious cases are assumed to proliferate with *R* = 3, which is a reasonable estimate [18] for COVID-19 [19]. Suppose that the outbreak starts from a single infected individual at time *t* = 0 (“Patient Zero”). In our discrete time (generational) model, Patient Zero infects *R* other people at time *t* = 1, and each new infection is assigned to one of the categories {*CA, CS, NA, NS*} randomly, with probabilities that are determined by the values of *θ* and *ϕ*. Individuals infected at the beginning of each generation are assumed not to infect anyone else after that generation has elapsed. Whenever a symptomatic individual on the contact network (CS) is encountered during this branching process, the contact network is triggered, and all people connected to the CS individual by the network, through either past or present infections, are placed in quarantine. As discussed earlier, since pre-symptomatic infections are common for COVID-19, our model includes the possibility that a CS individual infects *RS* people by the time they trigger the contact network. As a consequence, non-CS individuals in the same generation are also allowed to infect the next generation before the activation of the contact network (see Fig. 1c). A few timesteps of the model are illustrated explicitly in Fig. 1, together with the implementation of recursive contact tracing via removing connected components of the contact graph. Different combinations of the parameters *θ*, *ϕ* and *RS* lead to an effective reproduction number *R* distinct from the bare reproduction number *R*, and we expect epidemic growth to be suppressed whenever *R* < 1. ![FIG. 1.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/26/2020.04.15.20066720/F1.medium.gif) [FIG. 1.](http://medrxiv.org/content/early/2020/05/26/2020.04.15.20066720/F1) FIG. 1. An illustrative realization of our branching-process model. *a)* An in-network asymptomatic individual (CA) infects *R* = 3 people, whose category of infection is chosen independently and uniformly subject to parameters *θ*, the fraction of the population that presents asymptomatic cases, and *ϕ*, the fraction of the population using a contact-tracing app. *b)* A CS infection triggers an alert on the contact network, but the CS individual and everybody else in their generation is still able to infect people before the contact network is triggered (while we depict *RS* = 2, we also simulate more realistic values *RS* = 0, 1). The arrows show the alerts sent to everyone connected to the CS individual by the contact network. *c)* Once the alert is sent out, everybody in the contact-network-connected component of the CS individual can be quarantined immediately (thick circles) without giving rise to further disease spread, since they are in the latent (non-contagious) periods of their infections. Meanwhile, every individual off the contact network continues to transmit the disease freely. The “recursive” aspect of such contact tracing corresponds to the arrow going back in time in Fig. (1b); the middle branch of infections would be missed by a traditional, non-recursive approach. Numerical simulations of this model were performed on 10, 000 nodes with 100 initial infections, without replacement; the results are summarized in Fig. 2. The location of the phase boundaries were verified to be independent of both doubling the system size and doubling the number of samples averaged per point shown on the phase diagram, to within the resolution of the phase diagram. Our numerics are consistent with the hypothesis that for any given fraction of asymptomatic transmission 0 ≤ *θ* < 1, and any presymptomatic reproduction number 0 ≤ *RS* < *R*, there is a critical point *ϕc* (*θ*), corresponding to the onset of “digital herd immunity”: epidemic control occurs for a fraction of app owners *ϕc* (*θ*) < *ϕ* ≤ 1. For realistic COVID-19 parameter values, *R* = 3, *RS* = 1 and *θ* = 0.2 − 0.5 [5, 18], we find that *ϕc* (*θ*) = 75% − 95%, illustrating that when both presymptomatic and asymptomatic transmission are taken into account, the rate of app coverage necessary to prevent an epidemic can be rather high. Some practical implications of this point are raised in the final discussion. ![FIG. 2.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/26/2020.04.15.20066720/F2.medium.gif) [FIG. 2.](http://medrxiv.org/content/early/2020/05/26/2020.04.15.20066720/F2) FIG. 2. *Top:* Phase diagrams of epidemic control for *R* = 3, where the tuning parameters are *θ*, the rate of asymptomatic transition, and *ϕ*, the fraction of contact-tracing app ownership among the population. *RS* denotes the basic reproduction number for pre-symptomatic transmission. Each phase diagram was generated from 4000 microscopic simulations of 20 generations of disease evolution on 10, 000 nodes, of which 100 nodes were initially infected at random. A black square denotes epidemic control (average growth in the cumulative number of infections over the generations 16 − 20 is less than 0.25% of total population). This is grayscaled continuously to white for late-time growth exceeding 2.5% per generation or full epidemic spread before 20 generations have elapsed. Dashed red curves show exact results for 10-step contact tracing, while dashed blue curves show an easy-to-use approximation to the exact result. Both formulae are presented in Sec. IIC. The exact critical point for *θ* = 0 and *RS* = 2, derived in Appendix A, is marked by a cyan arrow. *Bottom:* Sample simulations from the encircled region in the *RS* = 0 phase diagram. Curves (solid) denote cumulative number of infections as a percentage of total population, averaged over 10 samples (dashed), with *θ* = 0.5 fixed and *ϕ* varied from *ϕ* = 0.6 to *ϕ* = 0.9. ### C. The contact-tracing phase transition We now describe the sense in which our branching-process model exhibits a phase transition. Consider the disease dynamics seeded by a single initial infection, Patient Zero, at *t* = 0. As the disease spreads, there are two possibilities: either the epidemic seeded by Patient Zero terminates at some finite time, or it continues to spread indefinitely. In branching process theory [20], this dichotomy is captured by the “probability of ultimate extinction”, *q*, which is the probability that the epidemic seeded by Patient Zero terminates at some *t* < *∞*. To make the connection with statistical physics, consider the quantity *ρ* = 1 − *q*, which is the probability that the epidemic seeded by Patient Zero spreads for all time. This defines an order parameter for the epidemic-to-immune phase transition, in the following sense. If *ρ* > 0, an epidemic can spread with non-zero probability, and the population is in an “epidemic phase”. If *ρ* = 0, epidemics are almost surely contained, and the population is in an “immune phase”. In fact, *ρ* is precisely the order parameter for a site percolation phase transition [21] on the infinite, rooted, Cayley tree with bulk co-ordination number *z* = 1 + *R*. We argued above that the epidemic-to-immune phase transition is driven by a single relevant parameter, the effective reproduction number, *R*. Let us now make this statement precise. For simple epidemic models, the underlying branching process is Markovian, and we can define *R* to be the mean number of new infections generated by an infected node. It is then a rigorous result that *ρ* = 0 for *R* < 1 and *ρ* > 0 otherwise [20]. For such models, the connection between epidemic spread and percolation transitions has been known for some time [22-24]. By contrast, for the model studied in this paper, the possibility of tracing successive contacts means that the disease dynamics is no longer Markovian; there are correlations between generations that preclude a simple definition of *R*, and earlier theoretical results do not apply. The main technical innovation in our work is surmounting this breakdown of the Markov property: we develop generating function methods that allow for *exact* summation of non-Markovian contact-tracing processes, to any desired order. We show that despite intergenerational correlations, the critical behaviour is determined by a function *Rn* (*ϕ*, *θ*), which can be viewed as a “mean number of new infections”, suitably averaged over time. In particular, *Rn* (*ϕ*, *θ*) controls the ultimate fate of the epidemic, and the critical line for n-step contact tracing is given by an implicit equation ![Formula][2] in *ϕ* and *θ*; details of the calculation and a full expression for *Rn* (*ϕ*, *θ*) are presented in the Supplementary Material. Taking the limit as *n* → *∞* to yields the exact critical line for contact tracing to arbitrary recursive depth; however, for any *n* ≥ 1, this does not seem to be expressible in closed form, except at its endpoints. Fortunately, the function *Rn* is found to converge rapidly in its arguments with increasing *n*. Fig. 2 depicts results from Eq. (2) with ten-step contact tracing, *n* = 10, and shows excellent agreement with stochastic numerical simulations. We now discuss the universal properties of this phase transition. For concreteness, let us parameterize the critical line as (*ϕc*(*θ*),*θ*). For fixed *θ* in the domain of *ϕc*, a transition from an epidemic to an immune phase occurs as *ϕ* → *ϕc* (*θ*)−. We call this transition the “contact-tracing phase transition”, because it is controlled by the population fraction on the contact-tracing network. To capture the universal properties of this transition, it is helpful to consider the random variable |*C*|, which is the size of the infected cluster seeded by Patient Zero in a single realization of the branching process. On the immune side of the transition, |*C*| is almost surely finite, and the risk of epidemics is captured by the mean cluster size, ![Graphic][3]. On the epidemic side of the transition, the mean cluster size diverges, and the order parameter ![Graphic][4] better quantifies the risk of epidemic spread. In the vicinity of the critical point *ϕ* = *ϕc* (*θ*), both of these quantities are characterized by universal critical exponents, ![Formula][5] ![Formula][6] In the Supplementary Material, we show that *γ* = *β* = 1 for any finite *n*, demonstrating that the contact-tracing phase transition lies in the universality class of mean-field site percolation [25]. The scaling theory of percolation transitions then implies a universal scaling form for the distribution of epidemic sizes, ![Formula][7] where *f* is a scaling function with exponentially decaying tails, and the cluster correlation length *Nξ* ~ (*ϕ* − *ϕc* (*θ*))−2 as *ϕ* → *ϕc* (*θ*). As the recursive tracing depth *n* → *∞*, we find that such mean-field behaviour breaks down at the endpoint of the critical line (*ϕ*, *θ*) = (1,1), which exhibits a *discontinuous* phase transition, reflecting the non-locality of the underlying branching process; see Fig. 3. The emergence of a discontinuous percolation transition on the Bethe lattice is highly unusual, and suggests that the non-local character of the *n* = *∞* contact-tracing transition fundamentally distinguishes it from the percolation-type phase transitions that have arisen in related settings [22–24, 26, 27] Although Eq. (2) is exact, the full expression for *Rn* is a little cumbersome to rapidly adapt and use. ![FIG. 3.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/26/2020.04.15.20066720/F3.medium.gif) [FIG. 3.](http://medrxiv.org/content/early/2020/05/26/2020.04.15.20066720/F3) FIG. 3. The non-locality of the branching-process dynamics increases with the contact-tracing depth, *n*. The figure depicts a growing cluster of asymptomatic infections that are all on the contact network. As the recursion depth n for contact tracing increases, a single symptomatic infection allows for isolation of increasingly large asymptomatic clusters, up to a size that grows exponentially in *n*. In the limit *n* → *∞*, this results in a discontinuous phase transition at (*ϕ*, *θ*) = (1,1); see Appendix C for details. We therefore present a simpler, approximate formula for *R* = *R∞*(*ϕ*, *θ*), based on linear interpolation and a “mean-field” assumption, whereby inter-generational correlations are neglected. The resulting approximation to *R*, derived in Appendix D, is given by ![Formula][8] In Fig. 2, the critical threshold *R* = 1 predicted by Eq. (6) is compared to the exact result, Eq. (2), for 10-step contact tracing, and shows reasonably good quantitative agreement. ## III. DISCUSSION We have introduced a simple branching-process model for early-stage epidemic spread, which both retains a degree of analytical and numerical tractability and is sufficiently expressive to model complicated features of COVID-19 spreading and control, for example pre-symptomatic transmission, as distinct from asymptomatic transmission, and recursive contact tracing. Using this model, we have obtained predictions for the app take-up fraction needed to provide digital herd immunity as a function of *R* and the asymptomatic transmission frequency *θ*. We now consider the practical applicability of our results to India, whose particular challenges provided the initial stimulus for this work. India’s overall smartphone coverage is around 40% [28]. However, this percentage is much higher in the major cities which are the primary challenge and since the start of the epidemic *R* has not gone much higher than 2. Further almost 90% [28] of Indians use some sort of wireless phone, which can be included on a digital contact tracing network to various degrees using cell tower based triangulation and SMS broadcast. So when compared with the challenges of manual contact tracing, it is clear that the digital route is much more scalable. Indeed, India has had considerable success with this strategy already, with over 100 million downloads and 100,000 contacts traced. We end with some comments towards the future. In terms of statistical mechanics, it would be useful to generalize our computations to take real-world heterogeneity of *R* into account [29] and to examine the course of epidemics on realistic graphs when *ϕ* < *ϕc*. In terms of infectious disease control one should start to think of the herd immunity of a population as deriving from a combination of natural immunity, vaccination *and* digital immunity. For example, it seems realistic to aim at greatly reducing the annual incidence of influenza worldwide by adding digital control to the existing toolkit. ## Data Availability All data shown in the paper is available to readers ## ACKNOWLEDGMENTS We would like to thank the Principal Scientific Adviser to the Government of India, Professor K. VijayRagha-van, for interesting us in this question and for discussions of India’s Aarogya Setu contact tracing app, Professor Bryan Grenfell for sharing his wisdom regarding epidemiology at an extremely hectic time and Dr. Shoibal Chakravarty for continuing discussions on all aspect of India’s COVID-19 challenges. ## Appendix A: Critical behaviour along the line *θ* = 0 In this appendix, we derive the critical behaviour along the line *θ* = 0. Since all infections on this line are symptomatic, we denote *RS* = *R*. As we demonstrate below, the exact critical point can be obtained in closed form, and is found to be ![Formula][9] which matches our numerical phase diagram to within the resolution of the plot; see Fig. 2 for an example with *R* = 2. Let us now summarize some basic facts about the critical behaviour of percolation-type transitions. Recall [25] that standard site percolation on the Bethe lattice exhibits five metric-independent critical exponents, which we may denote {*α*, *β*, *γ*, *δ*, Δ}. The three scaling relations imply that only two of these are independent. There are three more metric-dependent critical exponents, {*ν*, *ρ*, *η*}, which can be expressed in terms of the previous exponents using the hyperscaling relations in six dimensions. We will focus on the two independent exponents *γ* and *β*, since these are the easiest to calculate. They control the critical behaviour of the mean cluster size ![Graphic][10] and the percolation probability ℙ*p*(|*C*| = *∞*) (probability of formation of an infinite cluster) respectively. In terms of the site occupation probability *p* and its critical value *pc*, they are defined by ![Formula][11] Site percolation on the Bethe lattice with *z* ≥ 3 lies in the universality class of mean-field percolation, and exhibits critical exponents *γ* = *β* =1 [25]. ### 1. Mean cluster size To compute the mean cluster size, we follow a method introduced by Fisher and Essam for counting clusters of a given size in the Bethe lattice [31]. We define a probability generating function for the cluster size ![Formula][12] where |*C*| denotes the cluster size and ℙ*ϕ*(|*C*| = *s*| initial node infected) denotes the probability of obtaining a cluster of size *s* from an initial infected node. Since susceptible individuals are on the network (*C*) with probability *ϕ* and off the network (*N*) with probability (1 − *ϕ*), *B* (*ϕ*; *x*) can be expressed as ![Formula][13] Using Eq. (A4), the expression for the mean cluster size reads ![Formula][14] If a node of type *C* infects another node of type *C*, the latter cannot transmit infection further. However, a node of type *N* can infect other nodes freely. This implies the recurrence relations ![Formula][15] ![Formula][16] for the coefficients of each probability generating function. Differentiating at *x* =1, and using the normalization constraint *BC*/*N* (*ϕ*, *x* = 1) = 1, we obtain ![Formula][17] Solving these linear equations, we find that ![Formula][18] ![Formula][19] Thus, using Eqs. (A10) and (A5), we obtain the mean cluster size: ![Formula][20] Denoting the roots of the denominator by ![Formula][21] we may write ![Formula][22] Since 0 ≤ *ϕ* ≤ 1, it follows that the mean cluster size has a simple pole at *ϕ* = *ϕ*+, and assumes a physical, positive value only when *ϕ* > *ϕ*+. Thus, the exact critical point lies at *ϕc* = *ϕ*+. (The unphysical, negative value in Eq. (A12) in the percolating regime *ϕ* < *ϕc* reects the divergence of the mean cluster size due to the in_nite cluster. Meaningful results in the percolating regime can be recovered by conditioning on the event {|C| < *∞*} [25], but we will not pursue this here.) In the vicinity of the critical point *ϕc* = *ϕ*+, we obtain ![Formula][23] from which the critical exponent *γ* = 1 can be read off. ### 2. Percolation probability To derive *β*, we de\_ne the probabilities of in\_nite cluster formation from a source infection that is respectively on or o_ the contact network: ![Formula][24] We now derive recurrence relations to compute *ρC* and *ρN*. Since a C node can give rise to an in_nite cluster only through infecting an *N* node, we can obtain an expression for *ρC* in terms of *ρN* as follows. Note that (1 − (1 − *ϕ*)*ρN*) is the probability that an infected *N* node does not lead to an infinite cluster, and hence (1 − (1 − *ϕ*))*ρN*)*R* is the probability that none of the *R* infected nodes lead to infinite clusters. Thus, the probability that at least one of the nodes infected by an initial *C* node leads to an infinite cluster is given by ![Formula][25] Similarly, noting that an *N* node can lead to an infinite cluster via either *C* or *N* nodes, the probability that at least one of the infected nodes leads to an infinite cluster is given by ![Formula][26] Eqs. (A15) and (A16) reduce to a single equation for *ρN*: ![Formula][27] Expanding to second order in *ρN* yields ![Formula][28] In terms of the roots defined in Eq. (A11), we have ![Formula][29] Note that in Eq. (A19), since *ρN* ≥ 0, the only physical solution for *ϕ* ≥ *ϕ*+ is *ρN* = 0, whereas *ρN* > 0 if *ϕ* < *ϕ*+. Hence we recover the result *ϕ*c = *ϕ*+. It further follows that ![Formula][30] Taking limits as ![Graphic][31] yields ![Formula][32] which implies ![Formula][33] and consequently that ![Formula][34] which suggests a critical exponent *β* = 1. To confirm this exponent, we define the probability of formation of an infinite cluster from a single infected site, *ρ* = *ϕρC* +(1 − *ϕ*)*ρN*. Since *ρN* is small in the vicinity of *ϕ*c, we can linearize Eq. (A15), ![Formula][35] to obtain ![Formula][36] from which the critical exponent *β* = 1 is immediate. ## Appendix B: Exact critical line for digital herd immunity Here, we derive the exact critical line for digital herd immunity using two complementary approaches. In App. B1, we obtain recurrence relations for the full probability generating function for the size of infected clusters, which allows us to identify when the mean size of an infected cluster diverges. In App. B2, we study the processes involved in the cluster growth and determine when the percolation probability of the infected cluster approaches zero. ### 1. Mean cluster size approach First, it is useful to define one probability generating function per type of initial node: ![Formula][37] where *α* ∈ {*CA*; *CS*; *NA*; *NS*}. The probability generating function for cluster sizes, given any type of infected initial node, is then ![Formula][38] We shall find the exact critical line for *n*-step contact tracing by determining when the mean size of an infected cluster, ![Graphic][39], diverges. We first obtain exact recurrence relations for the generating functions *Bα* by enumerating possibilities at a given node. When the initial infected node is off the contact network, i.e. of type *NA* or *NS*, we obtain ![Formula][40] since nodes off the network can infect any other type of node (cf. Eq. (A7)). When the initial infected node is of type *CS*, any infections in the next generation that are on the network will be detected (cf. Eq. (A6)), and we obtain ![Formula][41] where it is useful to define ![Formula][42] The analogous result for *BCA* is rather more involved. The essential difficulty is that for *n*-step contact tracing, the recurrence relation for *BCA* involves *n* generations beyond the initial node, rather than just one. This is because the possibility arises of multi-generational clusters of *CA* nodes, that escape detection until they infect a *CS* node at some later generation 1 < *m* ≤ *n*. (Put diffierently, the underlying branching process is not Markovian.) The simplest way to proceed is to study all the configurations of clusters originating from an initial infected node of type *CA*, and organize the sum according to the generation in which the *CA* cluster connected to the initial *CA* node is detected, schematically ![Formula][43] We first define a function and its composition to recursively “propagate” the generating function from one generation to the next, after the addition of a *CA* node: ![Formula][44] The generating function for the processes without detection in generations *j* ≤ *n* reads ![Formula][45] where *g*(1) is the generating function for all processes that do not lead to a *CS* node in one generation of disease spread. Similarly the generating function for all processes that end in detection in generation *j*, reads ![Formula][46] where *g*(2) (resp. *g*(3)) are generating functions for all processes that lead to (resp. do not lead to) creation of a *CS* node in generation *j*, and the subtraction ensures that only processes that give rise to at least one *CS* node in generation *j* are included. Using Eqs. (B6), (B8), and (B9), we _nd that ![Formula][47] It can be verified that *BCA* is correctly normalized, i.e. that *BCA* | *x*=1 = 1. To compute the mean cluster size, we first compute derivatives of the generating functions *Bα*. Noting that *Bα* | *x*=1 = 1 and using Eqs. (A7) and (B4), we obtain ![Formula][48] Eliminating all variables other than ∂*xB* | *x*=1, we can write the derivative of *BCA* in the form ![Formula][49] and in terms of these coefficients {*En*; *Fn*}, the mean cluster size reads ![Formula][50] where is is useful to define ![Formula][51] It is clear that the mean cluster size diverges when ![Formula][52] It remains to compute *Fn*, as defined in Eq. (B12). To this end, let us introduce functions ![Formula][53] of *ϕ* and *θ*, with arguments other than *x* suppressed. By the chain rule, these satisfy the recurrence relations ![Formula][54] where we defined ![Graphic][55]. Since we are only concerned with the coefficient of ∂*xB* | *x*=1 in ∂*xBCA* | *x*=1, let us write ![Graphic][56], as in Eq. (B12). Upon making this substitution in Eq. (B17), we obtain the recurrence ![Formula][57] for the terms ![Graphic][58] of interest. Combining the above expressions, we find ![Formula][59] where the ![Graphic][60] are defined recursively for *j* > 0 via ![Formula][61] with ![Formula][62] and ![Formula][63] The exact critical line for *n*-step contact tracing is thus given by the implicit equation ![Formula][64] for *ϕ* and *θ*. ### 2. Percolation probability approach We now outline a procedure to obtain the critical line using the percolation probability of an infected initial node. The probability of formation of an infinite cluster is given by ![Formula][65] where *ρα* is the probability of formation of an infinite cluster starting from a node of type *α*. Since nodes off the network (*NS* and *NA*) can infect any type of node, we obtain the recurrence relations ![Formula][66] Further, since the *CS* node can only infect anyone outside the network, we obtain ![Formula][67] Similar to the case of the generating function in the previous section, obtaining the recurrence relation for *ρCA* is more involved. We proceed by enumerating the minimum number of processes such that the expression for the formation of an infinite cluster *ρCA* can be expressed in terms of the *ρα*’s. For depth *n* contact tracing, this yields a term that schematically reads ![Formula][68] To determine the critical line, it is sufficient to linearize the recurrence relations for {*ρα*} similar to the calculation in App. A. We thus obtain ![Formula][69] where *Rn* is defined in Eq. (B14). To count the different kind of processes that enter Eq. (B27), we divide all processes of *j* generations into three types, which we denote as follows. ![Formula][70] Note that processes in ![Graphic][71] and ℇ(*j*) lead to no detection in generation *j* and ![Graphic][72] leads to a detection in generation *j* that activates the contact network. Examples of these processes for *j* = 2 are shown in Fig. 4. To linear order in *p*, we find that the terms in *ρCA* in Eq. (B27) can be expressed as ![Formula][73] where *τ* runs over all the processes in the sets described in Eq. (B29), _ is summed over all types of nodes unless other wise stated, and we have defined *nα*(*τ*), *Pτ*, and ![Graphic][74] as follows. *nα*(*Pτ*) denotes the number of nodes of the type *α* on the edge of a process *τ*. *Pτ* is the probability of having a process *τ*, i.e. the product of the individual probabilities {*pα*} of all the nodes in the process including the root *CA* node, and in Eq. (B30) we divide by a factor of *pCA* in order to determine the probabilities of the processes given that the root is of type *CA*. ![Graphic][75] is the probability of formation of an infinite cluster due a *CA* that has been detected due to a *CS* node in the same generation, which reads ![Formula][76] where we have used Eq. (B28). To evaluate the terms in Eq. (B30), we define generating functions corresponding to each of the processes in Eq. (B29) as ![Formula][77] These generating functions can be enumerated recursively as ![Formula][78] with ![Formula][79] In terms of these generating functions, Eq. (B30) reads ![Formula][80] Using Eqs. (B24), (B28), (B31), and (B35), we finally obtain an expression for *ρ* of the form ![Formula][81] using which we identify the critical line to be ![Formula][82] While we are not able to derive a more explicit expression for *Rn*(*ϕ*; *θ*) using this approach, we have verified using Mathematica that it yields the same critical line of Eq. (B23) for several values of *n*. That is, we find that ![Formula][83] ![FIG. 4.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/26/2020.04.15.20066720/F4.medium.gif) [FIG. 4.](http://medrxiv.org/content/early/2020/05/26/2020.04.15.20066720/F4) FIG. 4. Examples of processes that appear in the recursive expression for *ρCA*. Processes shown in (a), (b), and (c) belong to the sets ![Graphic][84], ℇ(2), and ![Graphic][85] respectively (see Eq. (B29)). *ρCA* can be expressed in terms of the probabilities of formation of in_nite clusters starting from the nodes on the edge of the processes. ### 3. Critical exponents Following the derivation of critical exponents in App. A, it is clear that for any finite *n*, the critical exponents *β* and *γ* are controlled by the behaviour of the function near the critical line *Rn*(*ϕ*; *θ*) = 1. Unfortunately, it does not seem possible to obtain *Rn*(*ϕ*; *θ*) in closed form. However, since *Rn*(*ϕ*; *θ*) is analytic for any finite *n*, the critical behaviour on the transition line is expected to be determined by the leading terms in its Taylor expansion, which are linear in *ϕ* for given *θ* and vice versa. Numerically, we find that this is indeed the case; see Fig. 5. The numerical data suggests that *β* = *γ* = 1 everywhere except on the line *ϕ* = 1, whose critical behaviour is discussed below. ## Appendix C: Critical behaviour along the line *ϕ* = 1 Here, we study the critical behaviour along the line *ϕ* = 1. In the limit of infinite tracing depth, we find that there is a discontinuous phase transition at *θc* = 1. However, for any finite contact-tracing depth *n*, the critical point *θc* < 1, and the transition shows the same critical exponents as mean-field percolation. ![FIG. 5.](http://medrxiv.org/https://www.medrxiv.org/content/medrxiv/early/2020/05/26/2020.04.15.20066720/F5.medium.gif) [FIG. 5.](http://medrxiv.org/content/early/2020/05/26/2020.04.15.20066720/F5) FIG. 5. Behaviour of *Rn*(*ϕ*; *θ*) near the critical line Rn(*ϕ*; *θ*) = 1 for various fixed *ϕ* and continuously varying *θ*, and vice versa. It is clear that *Rn*(*ϕ*; *θ*) behaves linearly in *θ* and *ϕ* near the critical line *Rn* = 1. Results are shown for a contact-tracing depth *n* = 100 and parameter values *R* = 3, *RS* = 1; the summation was checked to be well-converged already for *n* = 10. ### 1. Infinite tracing depth When the tracing depth is infinite, there is a discontinuous transition as *θ* → 1−, in the sense that the “order parameter”, i.e. the probability *ρ*(*θ*) of formation of an infinite infected cluster, jumps discontinuously from 0 to 1 at *θc* = 1. To see this, note that when *ϕ* = 1, the evolution of an asymptomatic cluster from an asymptomatic source is described by the following branching process ![Formula][86] where ![Graphic][87] denotes the total number of new asymptomatic infections in generation *n*, the indicator functions ![Graphic][88] reflect the fact that a single symptomatic case will terminate the branching process, and ![Formula][89] The probability generating function of ![Graphic][90] then satisfies the recurrence relation ![Formula][91] where *f*(*y*) is the probability generating function for the descendants of a single asymptomatic node, ![Formula][92] Using these results, it can be shown by induction that ![Formula][93] The probability that the branching process is extinct in generation *n* is then ![Formula][94] The extinction probability is thus ![Formula][95] It follows that the critical point occurs at *θ* = *θc* = 1, and that the probability of formation of an infinite cluster, which is usually regarded as the order parameter for percolation transitions, behaves like ![Formula][96] Such discontinuous behaviour of the order parameter indicates that the transition has a first-order character. For example, at *θ* = 1 all asymptomatic clusters are infinite and the critical exponent *δ* is not even defined. However, several other critical exponents are defined, a scenario reminiscent of one-dimensional site percolation, which also has a critical probability *pc* = 1 and a mixture of continuous and discontinuous behaviour as ![Graphic][97]. ### 2. Finite tracing depth For any finite tracing depth *n*, the exact critical point along the line *ϕ* = 1 is found to lie at ![Formula][98] with mean-field critical exponents, *γ* = *β* = 1. While this can be obtained from the results of App. B, we provide an intuitive explanation here. When *ϕ* = 1, all nodes are on the contact network, and hence only two types need to be considered: symptomatic (*S*) and asymptomatic (*A*), which occur with probabilities (1 − *θ*) and *θ* respectively. Since any infinite cluster must consist entirely of *A* nodes, we can directly obtain the recurrence relation for the probability *ρ* of formation of an infinite cluster. For contact tracing with recursive depth *n*, the only event that does not rule out the existence of an infinite cluster is the formation of an *n*-generation tree in which every node is asymptomatic. This occurs with probability ![Graphic][99], where ![Formula][100] where *Nn* is the total number of nodes in such a tree excluding the root node. Given such a tree, infinite clusters can originate from any of the ![Graphic][101] asymptomatic leaves in generation n. This yields the following recurrence relation for *ρ*: ![Formula][102] Expanding Eq. (C11) to second order in *ρ*, it is straightforward to derive Eq. (C9) and that ![Formula][103] Thus, *β* = 1 for any finite *n*. A similar argument yields the mean cluster size ![Formula][104] which has the same critical point as the percolation probability, and yields a critical exponent *γ* = 1, since ![Formula][105] ## Appendix D: Mean-field-like estimate for the critical line In this section, we derive a simple, approximate formula for *R* = *R∞*(*ϕ*; *θ*), based on linear interpolation and a “mean-field” assumption, whereby inter-generational correlations are neglected. It is first helpful to label the possible types of infected individual by *α* ∊ {*CA, CS, NA, NS*}, and note that susceptible individuals of each type occur with the independent probabilities given in Table D1: ![Formula][106] Now suppose that there are no correlations between generations. Then the effective reproduction number is simply an average over the possible types of node: ![Formula][107] Here, the probabilities *pα* are given as in Table D1, while *RNA* = *R*, *RNS* = *RS*, and *RCS* = *RS*(1 − *ϕ*), corresponding to the average number of live nodes generated by a symptomatic individual on the contact network. However, *RCA* is essentially undetermined in this approach, since discarding correlations in time also discards contact tracing, to which the effective value of *RCA* is highly sensitive. We will therefore treat *RCA* as a variational parameter, to be estimated self-consistently. In the “best” case, asymptomatic transmission within the network is completely suppressed, and *RCA* = (1 − *ϕ*)*R*o. In the “worst” case, asymptomatic transmission within the network is not suppressed at all, and *RCA* = *R*. A simple way to proceed is to solve for the unique linear interpolation between these cases that passes through the known endpoint (*ϕ*, *θ*) = (1, 1) of the non-perturbative critical line (see Appendix C). The resulting approximation to *R* is given by ![Formula][108] * Received April 15, 2020. * Revision received May 25, 2020. * Accepted May 26, 2020. * © 2020, Posted by Cold Spring Harbor Laboratory The copyright holder for this pre-print is the author. All rights reserved. The material may not be redistributed, re-used or adapted without the author's permission. ## References 1. [1]. P. G. Auwaerter, Coronavirus COVID-19 (SARS-CoV-2), Johns Hopkins ABX Guide, The Johns Hopkins University, 2017 (2020). 2. [2]. W. Wei, Z. Li, C. Chiew, S. Yong, and M. Toh, Presymptomatic Transmission of SARS-CoV-2 — Singapore, January 23-March 16, 2020, MMWR Morb Mortal Wkly Rep 69:411–415 (2020). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.15585/mmwr.mm6914e1&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=32271722&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F26%2F2020.04.15.20066720.atom) 3. [3]. C. Fraser, S. Riley, R. M. Anderson, and N. M. Ferguson, Factors that make an infectious disease outbreak controllable, Proceedings of the National Academy of Sciences 101, 6146 (2004). [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMToiMTAxLzE2LzYxNDYiO3M6NDoiYXRvbSI7czo1MDoiL21lZHJ4aXYvZWFybHkvMjAyMC8wNS8yNi8yMDIwLjA0LjE1LjIwMDY2NzIwLmF0b20iO31zOjg6ImZyYWdtZW50IjtzOjA6IiI7fQ==) 4. [4]. K. T. Eames and M. J. Keeling, Contact tracing and disease control, Proceedings of the Royal Society of London. Series B: Biological Sciences 270, 2565 (2003). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1098/rspb.2003.2554&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=14728778&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F26%2F2020.04.15.20066720.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000187989900005&link_type=ISI) 5. [5]. L. Ferretti, C. Wymant, M. Kendall, L. Zhao, A. Nurtay, L. Abeler-Dörner, M. Parker, D. Bonsall, and C. Fraser, Quantifying SARS-CoV-2 transmission suggests epidemic control with digital contact tracing, Science 10.1126/science.abb6936 (2020). 6. [6]. M. Faggian, M. Urbani, and L. Zanotto, Proximity: a recipe to break the outbreak (2020), arXiv:2003.10222 [cs.CY]. 7. [7]. M. Salathé, M. Kazandjieva, J. W. Lee, P. Levis, M. W. Feldman, and J. H. Jones, A high-resolution human contact network for infectious disease transmission, Proceedings of the National Academy of Sciences 107, 22020 (2010). [Abstract/FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6NDoiQUJTVCI7czoxMToiam91cm5hbENvZGUiO3M6NDoicG5hcyI7czo1OiJyZXNpZCI7czoxMjoiMTA3LzUxLzIyMDIwIjtzOjQ6ImF0b20iO3M6NTA6Ii9tZWRyeGl2L2Vhcmx5LzIwMjAvMDUvMjYvMjAyMC4wNC4xNS4yMDA2NjcyMC5hdG9tIjt9czo4OiJmcmFnbWVudCI7czowOiIiO30=) 8. [8]. E. Yoneki and J. Crowcroft, Epimap: Towards quantifying contact networks for understanding epidemiology in developing countries, Ad Hoc Networks 13, 83 (2014). 9. [9]. G. Gartner and H. Huang, Progress in Location-Based Services 2014, Lecture Notes in Geoinformation and Cartography (Springer International Publishing, 2014). 10. [10].Apple and Google partner on COVID-19 contact tracing technology, Apple Press Release (2020). 11. [11].Aarogya Setu Mobile App, Government Of India (2020). 12. [12]. J. Hellewell, S. Abbott, A. Gimma, N. I. Bosse, C. I. Jarvis, T. W. Russell, J. D. Munday, A. J. Kucharski, W. J. Edmunds, F. Sun, et al., Feasibility of controlling COVID-19 outbreaks by isolation of cases and contacts, The Lancet Global Health 10.1016/S2214–109X(20)30074-7 (2020). 13. [13]. P. W. Anderson, More Is Different, Science 177, 393 (1972). [FREE Full Text](http://medrxiv.org/lookup/ijlink/YTozOntzOjQ6InBhdGgiO3M6MTQ6Ii9sb29rdXAvaWpsaW5rIjtzOjU6InF1ZXJ5IjthOjQ6e3M6ODoibGlua1R5cGUiO3M6MzoiUERGIjtzOjExOiJqb3VybmFsQ29kZSI7czozOiJzY2kiO3M6NToicmVzaWQiO3M6MTI6IjE3Ny80MDQ3LzM5MyI7czo0OiJhdG9tIjtzOjUwOiIvbWVkcnhpdi9lYXJseS8yMDIwLzA1LzI2LzIwMjAuMDQuMTUuMjAwNjY3MjAuYXRvbSI7fXM6ODoiZnJhZ21lbnQiO3M6MDoiIjt9) 14. [14]. J.-Y. Moon and E. LaRock, On emergence from the perspective of physical science (2017), arXiv:1705.11075 [physics.hist-ph]. 15. [15]. D. Klinkenberg, C. Fraser, and H. Heesterbeek, The effectiveness of contact tracing in emerging epidemics, PloS one 1 (2006). 16. [16]. J. Müller, M. Kretzschmar, and K. Dietz, Contact tracing in stochastic and deterministic epidemic models, Mathematical biosciences 164, 39 (2000). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1016/S0025-5564(99)00061-9&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=10704637&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F26%2F2020.04.15.20066720.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000085814000003&link_type=ISI) 17. [17]. A. Okolie and J. Müller, Exact and approximate formulas for contact tracing on random trees, Mathematical Biosciences 321, 108320 (2020). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1016/j.mbs.2020.108320&link_type=DOI) 18. [18]. A. J. Kucharski, T. W. Russell, C. Diamond, Y. Liu, J. Edmunds, S. Funk, R. M. Eggo, F. Sun, M. Jit, J. D. Munday, et al., Early dynamics of transmission and control of COVID-19: a mathematical modelling study, The Lancet Infectious Diseases (2020). 19. [19].There are also some higher estimates in the literature, e.g. based on the early epidemic dynamics in Wuhan [30]. Given the greatly increased state of awareness of the disease at this point it seems reasonable to assume that such higher values are not relevant to disease dynamics today. 20. [20]. G. Grimmett and D. Welsh, Probability: An Introduction (Oxford University Press, 2014). 21. [21].To see this, first designate all nodes of this tree “empty”, except for the root. Next, embed the branching processes model in this tree in the natural way, with Patient Zero at the root, and “occupy” nodes according to their probability of infection. The the probability of formation of an infinite cluster of infections, p, is precisely the probability that occupied sites percolate on the Cayley tree, which is usually taken as the order parameter in percolation theory [25]. 22. [22]. P. Grassberger, On the critical behavior of the general epidemic process and dynamical percolation, Mathematical Biosciences 63, 157 (1983). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1016/0025-5564(82)90036-0&link_type=DOI) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=A1983QK11000001&link_type=ISI) 23. [23]. J. L. Cardy, Field theoretic formulation of an epidemic process with immunisation, Journal of Physics A: Mathematical and General 16, L709 (1983). 24. [24]. J. L. Cardy and P. Grassberger, Epidemic models and percolation, Journal of Physics A: Mathematical and General 18, L267 (1985). 25. [25]. G. Grimmett, Percolation (Springer Berlin Heidelberg, 1999). 26. [26]. B. Drossel and F. Schwabl, Self-organized critical forest-fire model, Phys. Rev. Lett. 69, 1629 (1992). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1103/PhysRevLett.69.1629&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=10046273&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F26%2F2020.04.15.20066720.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=A1992JM85000002&link_type=ISI) 27. [27]. B. Drossel and F. Schwabl, Forest-fire model with immune trees, Physica A: Statistical Mechanics and its Applications 199, 183 (1993). 28. [28].Telecom subscription data, Telecom Regulatory Authority of India (2020). 29. [29]. J. O. Lloyd-Smith, S. J. Schreiber, P. E. Kopp, and W. M. Getz, Superspreading and the effect of individual variation on disease emergence, Nature 438, 355 (2005). [CrossRef](http://medrxiv.org/lookup/external-ref?access_num=10.1038/nature04153&link_type=DOI) [PubMed](http://medrxiv.org/lookup/external-ref?access_num=16292310&link_type=MED&atom=%2Fmedrxiv%2Fearly%2F2020%2F05%2F26%2F2020.04.15.20066720.atom) [Web of Science](http://medrxiv.org/lookup/external-ref?access_num=000233300200048&link_type=ISI) 30. [30]. S. Sanche, Y. T. Lin, C. Xu, E. Romero-Severson, N. Hengartner, and R. Ke, The novel coronavirus, 2019-ncov, is highly contagious and more infectious than initially estimated, medRxiv 10.1101/2020.02.07.20021154 (2020). 31. [31]. M. E. Fisher and J. W. Essam, Some cluster size and percolation problems, Journal of Mathematical Physics 2, 609 (1961), [https://doi.org/10.1063/L1703745](https://doi.org/10.1063/L1703745). [1]: /embed/graphic-1.gif [2]: /embed/graphic-4.gif [3]: /embed/inline-graphic-1.gif [4]: /embed/inline-graphic-2.gif [5]: /embed/graphic-5.gif [6]: /embed/graphic-6.gif [7]: /embed/graphic-7.gif [8]: /embed/graphic-9.gif [9]: /embed/graphic-10.gif [10]: /embed/inline-graphic-3.gif [11]: /embed/graphic-11.gif [12]: /embed/graphic-12.gif [13]: /embed/graphic-13.gif [14]: /embed/graphic-14.gif [15]: /embed/graphic-15.gif [16]: /embed/graphic-16.gif [17]: /embed/graphic-17.gif [18]: /embed/graphic-18.gif [19]: /embed/graphic-19.gif [20]: /embed/graphic-20.gif [21]: /embed/graphic-21.gif [22]: /embed/graphic-22.gif [23]: /embed/graphic-23.gif [24]: /embed/graphic-24.gif [25]: /embed/graphic-25.gif [26]: /embed/graphic-26.gif [27]: /embed/graphic-27.gif [28]: /embed/graphic-28.gif [29]: /embed/graphic-29.gif [30]: /embed/graphic-30.gif [31]: /embed/inline-graphic-4.gif [32]: /embed/graphic-31.gif [33]: /embed/graphic-32.gif [34]: /embed/graphic-33.gif [35]: /embed/graphic-34.gif [36]: /embed/graphic-35.gif [37]: /embed/graphic-36.gif [38]: /embed/graphic-37.gif [39]: /embed/inline-graphic-5.gif [40]: /embed/graphic-38.gif [41]: /embed/graphic-39.gif [42]: /embed/graphic-40.gif [43]: /embed/graphic-41.gif [44]: /embed/graphic-42.gif [45]: /embed/graphic-43.gif [46]: /embed/graphic-44.gif [47]: /embed/graphic-45.gif [48]: /embed/graphic-46.gif [49]: /embed/graphic-47.gif [50]: /embed/graphic-48.gif [51]: /embed/graphic-49.gif [52]: /embed/graphic-50.gif [53]: /embed/graphic-51.gif [54]: /embed/graphic-52.gif [55]: /embed/inline-graphic-6.gif [56]: /embed/inline-graphic-7.gif [57]: /embed/graphic-53.gif [58]: /embed/inline-graphic-8.gif [59]: /embed/graphic-54.gif [60]: /embed/inline-graphic-9.gif [61]: /embed/graphic-55.gif [62]: /embed/graphic-56.gif [63]: /embed/graphic-57.gif [64]: /embed/graphic-58.gif [65]: /embed/graphic-59.gif [66]: /embed/graphic-60.gif [67]: /embed/graphic-61.gif [68]: /embed/graphic-62.gif [69]: /embed/graphic-63.gif [70]: /embed/graphic-64.gif [71]: /embed/inline-graphic-10.gif [72]: /embed/inline-graphic-11.gif [73]: /embed/graphic-65.gif [74]: /embed/inline-graphic-12.gif [75]: /embed/inline-graphic-13.gif [76]: /embed/graphic-66.gif [77]: /embed/graphic-67.gif [78]: /embed/graphic-68.gif [79]: /embed/graphic-69.gif [80]: /embed/graphic-70.gif [81]: /embed/graphic-71.gif [82]: /embed/graphic-72.gif [83]: /embed/graphic-73.gif [84]: F4/embed/inline-graphic-14.gif [85]: F4/embed/inline-graphic-15.gif [86]: /embed/graphic-76.gif [87]: /embed/inline-graphic-16.gif [88]: /embed/inline-graphic-17.gif [89]: /embed/graphic-77.gif [90]: /embed/inline-graphic-18.gif [91]: /embed/graphic-78.gif [92]: /embed/graphic-79.gif [93]: /embed/graphic-80.gif [94]: /embed/graphic-81.gif [95]: /embed/graphic-82.gif [96]: /embed/graphic-83.gif [97]: /embed/inline-graphic-19.gif [98]: /embed/graphic-84.gif [99]: /embed/inline-graphic-20.gif [100]: /embed/graphic-85.gif [101]: /embed/inline-graphic-21.gif [102]: /embed/graphic-86.gif [103]: /embed/graphic-87.gif [104]: /embed/graphic-88.gif [105]: /embed/graphic-89.gif [106]: /embed/graphic-90.gif [107]: /embed/graphic-91.gif [108]: /embed/graphic-92.gif