J. Martin, D. Alpuche, K. Bodeman, L. Brown, E. Fenske et al., Handoff All Your Privacy -A Review of Apple's Bluetooth Low Energy Continuity Protocol, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.34-53, 2019.

. Google and . Nearby, , 2019.

. Microsoft, Microsoft Connected Devices Platform Protocol Version 3, pp.2019-2024, 2019.

. Apple, All your devices. One seamless experience, 2019.

. M. Apple and . Program, , 2019.

. Apple, Home accessories. The list keeps getting smarter, 2019.

. Apple, Apple Reports Record First Quarter Results, 2016.

M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, Why MAC Address Randomization is Not Enough: An Analysis of Wi-Fi Network Discovery Mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, ASIA CCS '16, pp.413-424, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

T. Issoufaly and P. U. Tournoux, BLEB: Bluetooth Low Energy Botnet for large scale individual tracking, 2017 1st International Conference on Next Generation Computing Applications (NextComp), pp.115-120, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01816475

B. Greenstein, R. Gummadi, J. Pang, Y. Mike, T. Chen et al., Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era, HotOS, 2007.

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, pp.56-69, 2014.

K. Aveek, . Das, H. Parth, C. Pathak, P. Chuah et al., Uncovering Privacy Leakage in BLE Network Traffic of Wearable Fitness Trackers, Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp.99-104, 2016.

S. Bluetooth, Bluetooth Core Specification v4.0, 2010.

K. Johannes, D. Becker, D. Li, and . Starobinski, Tracking Anonymized Bluetooth Devices, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.50-65, 2019.

G. Celosia and M. Cunche, Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02394629

M. Woolley, Bluetooth Technology Protecting Your Privacy, 2015.

, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, IEEE Std, vol.802, pp.1-74, 2014.

S. Bluetooth, Bluetooth Core Specification v5.1, 2019.

, Apple. iOS Security -iOS, vol.12, 2019.

. Apple, HomeKit Accessory Protocol Specification (Non-Commercial Version) -Release R2, pp.2019-2027, 2019.

. Apple, About AirPrint, 2019.

A. Cui, M. Costello, and S. Stolfo, When Firmware Modifications Attack: A Case Study of Embedded Exploitation, 2013.

. Apple, Connect and use your AirPods, 2019.

D. Kewley, R. Fink, J. Lowry, and M. Dean, Dynamic approaches to thwart adversary intelligence gathering, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, vol.1, pp.176-185, 2001.

. Apple and . Handoff, , 2019.

. Apple, Use Handoff to continue a task on your other devices, 2019.

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., A Study of MAC Address Randomization in Mobile Devices and When It Fails, Proceedings on Privacy Enhancing Technologies, vol.2017, pp.365-383, 2017.

L. Olejnik, G. Acar, C. Castelluccia, and C. Diaz, The leaking battery, Data Privacy Management, and Security Assurance, pp.254-263, 2015.

. Apple, Use Instant Hotspot to connect to your Personal Hotspot without entering a password, pp.2019-2027, 2019.

K. Fawaz, K. Kim, and K. Shin, Protecting Privacy of BLE Device Users, USENIX Security Symposium, pp.1205-1221, 2016.

M. Bertrand and E. Kamenica, Coming Apart? Cultural Distances in the United States Over Time, National Bureau of Economic Research, 2018.

Y. S. Le-t-nguyen, P. Kim, J. Tague, and . Zhang, IdentityLink: User-Device Linking through Visual and RF-Signal Cues, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.529-539, 2014.

C. Matthias, K. Sala, L. Partridge, and . Jacobson, An Exploration into Activity-Informed Physical Advertising Using PEST, International Conference on Pervasive Computing, pp.73-90, 2007.

B. Copos, K. Levitt, M. Bishop, and J. Rowe, Is Anybody Home? Inferring Activity From Smart Home Network Traffic, 2016 IEEE Security and Privacy Workshops (SPW), pp.245-251, 2016.

J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012.

L. Demir, A. Kumar, M. Cunche, and C. Lauradoux, The Pitfalls of Hashing for Privacy, IEEE Communications Surveys & Tutorials, vol.20, issue.1, pp.551-565, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01589210

M. Marx, E. Zimmer, and T. Mueller, Hashing of personally identifiable information is not sufficient, 2018.

T. Hunt, The 773 Million Record "Collection #1" Data Breach, 2019.

J. Haitsma and T. Kalker, A Highly Robust Audio Fingerprinting System, Ismir, vol.2002, pp.107-115, 2002.

H. Knospe, Privacy-enhanced perceptual hashing of audio data, 2013 International Conference on Security and Cryptography (SECRYPT), pp.1-6, 2013.

K. Gopala-krishna-anumanchipalli, A. W. Prahallad, and . Black, Festvox: Tools for Creation and Analyses of Large Speech Corpora, Workshop on Very Large Scale Phonetics Research, p.70, 2011.

. Sparhandy, Siri commands -endless functions of your virtual assistant, 2019.

H. Fu, A. Zhang, and X. Xie, Effective Social Graph Deanonymization Based on Graph Structure and Descriptive Information, ACM Transactions on Intelligent Systems and Technology (TIST), vol.6, issue.4, p.49, 2015.

J. Sponas, Things You Should Know About Bluetooth Range, pp.2019-2027, 2018.

N. Gerber, B. Reinheimer, and M. Volkamer, Investigating People's Privacy Risk Perception, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.267-288, 2019.

C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz, On the Reliability of Wireless Fingerprinting using Clock Skews, Proceedings of the third ACM conference on Wireless network security, pp.169-174, 2010.

M. Stute, S. Narain, A. Mariotto, A. Heinrich, D. Kreitschmann et al., A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link, p.18, 2019.

D. Antonioli, N. O. Tippenhauer, and K. Rasmussen, Nearby Threats: Reversing, Analyzing, and Attacking Google's' Nearby Connections' on Android, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019.

G. Celosia and M. Cunche, Detecting smartphone state changes through a Bluetooth based timing attack, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.154-159, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01870011

N. Apthorpe, D. Reisman, S. Sundaresan, A. Narayanan, and N. Feamster, Spying on the Smart Home: Privacy Attacks and Defenses on Encrypted IoT Traffic, 2017.

S. Siby, N. Rajib-ranjan-maiti, and . Tippenhauer, IoTScanner: Detecting and Classifying Privacy Threats in IoT Neighborhoods, 2017.

, Alice is my mother.; Best comedy movies ?; Best horror movies ?; Bob is my brother.; Call 408 555 1212.; Call Bob.; Call Mark.; Call me sweetheart.; Call the nearest restaurant.; Can you recommend a movie ?; Cancel my event with Mark.; Decrease brightness.; FaceTime Audio call to Alice.; Find number of dad.; How are the markets doing ?; How big is the biggest elephant ?; How far away is Mars ?; How far away is Tokyo ?.; How humid is it in Paris ?; How long do cats live ?; How many calories in an apple ?, Activate Do Not Disturb

, Inform my wife when I leave my home.; Is mom at home ?; Learn to pronounce my name.; Listen to Alicia Keys.; Locate my father.; Note: 'Susan will be late tonight'.; Open Instagram.; Open Spotify.; Play some music.; Play the rest of this album.; Read my new messages.; Remind me today: call Kevin.; Search Google for pictures of Thor.; Search the web for 'computer'.; Search the web for 'privacy'.; Send a message to Bob.; Send a message to Mark.; Send an e-mail to Susan.; Set a timer for 3 minutes.; Show all my photos.; Show me best family movies.; Show me my notes.; Show me my photos from London.; Show me my photos of last week.; Show me new e-mail from Peter.; Show me the latest tweets.; Show me the nearest cinema.; Show me tweets from Peter.; Show me videos of Avengers.; Show my favorite photos.; Show my selfies.; Square root of 49 ?; Susan is my sister.; Take a video.; Take me home.; Turn on Night Mode.; Turn on Wi-Fi.; What day is in 5 days ?; What day was 2 days ago ?; What did Dow close at today ?; What did Nikkei close at today ?; What is my altitude ?; What is the time zone in Miami ?, Inform my husband when I'm back home

, What's the temperature outside ?; What's the temperature tonight ?

, When do I meet Bob ?; When is my next appointment ?; When is the sunrise ?; When is the sunset ?; When is the Super Bowl ?; Where died Bob Marley ?; Where is my iPhone ?; Where is my next appointment ?; Where lives Susan ?; Which movies are with Tom Hanks ?

, Call me a cab.; Call me king.; Cancel my event with Alice.; Compare Nikkei with Dow.; Deactivate Do Not Disturb.; Delete all alarms.; Delete the reminder 'project'.; Find some movie theaters near my home.; Flip a coin.; How many bones does a dog have ?; How many days until the birthday of dad ?; How many days until year 2020 ?; How small is the smallest dog ?; In which city lives Peter ?; Is 'Airplane mode' enabled ?; Navigate to Susan by car.; Open Facebook.; Open mail.; Open settings.; Pause the timer.; Play me my latest voicemail.; Play the Titanic soundtrack.; Play the trailer for 'Pearl Harbor, Andrew is my boyfriend

, Show me my photos of yesterday.; Show me pictures of Hulk.; Show me the appointments for next month.; Show me the traffic.; Tell me a story.; Text Susan: 'I will be late'; Translate 'cat' from English in Russian.; Turn on Cellular Data.; What is the time at home ?; What's the current dew point ?; What's the Nasdaq price ?; What's the pressure outside ?; What's the visibility outside ?; When died Freddie Mercury ?; When is Kevin's birthday ?