, In terms of applications, bandwidth, power consumption and range

, Signals are transmitted at about 433 MHz in Europe (see Figure II.2), and at 315 MHz in most other parts of the world

, During our experiment, we witnessed a range of about fifty meters

, To minimize the privacy implications that this experiment can raise, we only collected TPMS messages emitted by a car at our disposal. 2. Especially, with Eun-Jeong Shin, vol.237

, We left manufacturers time to react to our solicitations

, After having reviewed their systems/protocols. 5. They did not even respond to our e-mails

J. Martin, D. Alpuche, K. Bodeman, L. Brown, E. Fenske et al., Handoff All Your Privacy -A Review of Apple's Bluetooth Low Energy Continuity Protocol, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.34-53, 2019.

, GATT Specification Supplement v1, Bluetooth Special Interest Group, vol.1, pp.2020-2024, 2019.

G. Celosia and M. Cunche, Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, Proceedings on Privacy Enhancing Technologies, vol.2020, pp.26-46, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02394619

G. Celosia and M. Cunche, Valkyrie: A Generic Framework for Verifying Privacy Provisions in Wireless Networks, Proceedings of the 13th Conference on Security and Privacy in Wireless and Mobile Networks, pp.278-283, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02651398

G. Celosia and M. Cunche, DEMO: Venom: a Visual and Experimental Bluetooth Low Energy Tracking System, Proceedings of the 13th Conference on Security and Privacy in Wireless and Mobile Networks, pp.346-348, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02651359

G. Celosia and M. Cunche, Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, MobiQuitous 2019 -16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp.444-453, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02394629

G. Celosia and M. Cunche, DEMO: Himiko: A Human Interface for Monitoring and Inferring Knowledge on Bluetooth-Low-Energy Objects, Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, pp.292-293, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02154148

G. Celosia and M. Cunche, Detecting smartphone state changes through a Bluetooth based timing attack, Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.154-159, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01870011

G. Celosia and M. Cunche, Fingerprinting Bluetooth-Low-Energy Devices Based on the Generic Attribute Profile, Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, pp.24-31, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02359914

G. Celosia and M. Cunche, Saving Private Addresses: An Analysis of Privacy Issues in the Bluetooth-Low-Energy Advertising Mechanism, Atelier sur la Protection de la Vie Privée (APVP), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02394629

G. Celosia and M. Cunche, Detecting smartphone state changes through a Bluetooth based timing attack, Atelier sur la Protection de la Vie Privée (APVP), 2018.
URL : https://hal.archives-ouvertes.fr/hal-01870011

G. Celosia and M. Cunche, Protection de la Vie Privée dans les Communications Sans Fil de l'Internet des Objets (IoT), Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), 2018.

G. Celosia and M. Cunche, POSTER: Preserving Privacy in Wireless Communications of the Internet of Things (IoT), Rendez-vous de la Recherche et de l'Enseignement de la Sécurité des Systèmes d'Information (RESSI), 2018.

G. Celosia and M. Cunche, Discontinued Privacy: Personal Data Leaks in Apple Bluetooth-Low-Energy Continuity Protocols, Annual seminar of the Inria PRIVATICS team, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02394619

G. Celosia and M. Cunche, DEMO: Himiko: A Human Interface for Monitoring and Inferring Knowledge on Bluetooth-Low-Energy Objects, Salon de l'Internet Des Objets (SIDO), 2019.
URL : https://hal.archives-ouvertes.fr/hal-02154148

G. Celosia and M. Cunche, Privacy Threats from the Bluetooth Low Energy Service Discovery Mechanism, Annual seminar of the Inria PRIVATICS team, 2019.

G. Celosia and M. Cunche, Detection of Bluetooth surveillance systems, Presentation for Inria EPI: Data and Algorithmic Transparency and Accountability (DATA), 2018.

G. Celosia and M. Cunche, Privacy concerns in IoT radio communications, Pitch for the INSA Lyon -SPIE ICS IoT chair, 2018.

C. Mathieu-cunche, G. Matte, and . Celosia, Wi-Fi Scanner: How many data can be collected on your smartphone, The Web Conference, 2018.

G. Celosia and M. Cunche, Preserving Privacy in Wireless Communications of the Internet of Things (IoT), 2018.

G. Celosia and M. Cunche, Valkyrie -A generic framework for verifying privacy provisions in wireless networks, pp.2020-2024, 2020.
URL : https://hal.archives-ouvertes.fr/hal-02651398

G. Celosia and M. Cunche, Joker -A Wireshark dissector for Bluetooth Low Energy (BLE) advertisement packets of Apple Continuity, Microsoft CDP and Garmin proprietary protocols, pp.2020-2024, 2020.

, Internet of Things (IoT) connected devices installed base worldwide from, Statistica, pp.2020-2023, 2015.

N. Bouhaï, I. Saleh, and H. Hachour, Frontières numériques et savoir. Editions L'Harmattan, 2016.

E. Bertino, Data Security and Privacy in the IoT, EDBT, vol.2016, pp.1-3, 2016.

J. Manach, La vie privée, un problème de vieux cons? FYP editions, 2010.

J. Daniel and . Solove, I've got nothing to hide and other misunderstandings of privacy, San Diego L. Rev, vol.44, p.745, 2007.

E. Parliament, REPORT with recommendations to the Commission on Civil Law Rules on Robotics, pp.2020-2025, 2017.

. Un-general-assembly, Universal declaration of human rights, UN General Assembly, vol.302, issue.2, 1948.

D. Samuel, L. Warren, and . Brandeis, The right to privacy, Harvard law review, pp.193-220, 1890.

. Alan-f-westin, Privacy and freedom, Washington and Lee Law Review, vol.25, issue.1, p.166, 1968.

A. Barki, A. Bouabdallah, S. Gharout, and J. Traore, M2M security: Challenges and solutions, IEEE Communications Surveys & Tutorials, vol.18, issue.2, pp.1241-1254, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01236511

H. Shafagh, A. Hithnawi, A. Droescher, S. Duquennoy, and W. Hu, Talos: Encrypted query processing for the internet of things, Proceedings of the 13th ACM conference on embedded networked sensor systems, pp.197-210, 2015.

A. Sanaah, J. Salami, K. Baek, E. Salah, and . Damiani, Lightweight encryption for smart home, 11th International Conference on Availability, Reliability and Security (ARES), pp.382-388, 2016.

N. Davies, N. Taft, M. Satyanarayanan, S. Clinch, and B. Amos, Privacy mediators: Helping IoT cross the chasm, Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp.39-44, 2016.

R. Neisse, G. Steri, I. N. Fovino, and G. Baldini, SecKit: a model-based security toolkit for the internet of things. computers & security, vol.54, pp.60-76, 2015.

H. Chen, T. Finin, A. Joshi, L. Kagal, F. Perich et al., Intelligent agents meet the semantic web in smart spaces, IEEE Internet computing, vol.8, issue.6, pp.69-79, 2004.

, Bluetooth Core Specification v5.2, Bluetooth Special Interest Group, pp.2020-2023, 2019.

, Bluetooth Core Specification v4.0, Bluetooth Special Interest Group, pp.2020-2024, 2010.

M. Woolley, Bluetooth Technology Protecting Your Privacy, 2015.

. Accessed, , pp.2020-2025

, IEEE Standard for Local and Metropolitan Area Networks: Overview and Architecture, IEEE Std, vol.802, pp.1-74, 2014.

, Generic Access Profile -Assigned Numbers, Bluetooth Special Interest Group, pp.2020-2025, 2020.

P. Leach, M. Mealling, and R. Salz, A universally unique identifier (uuid) urn namespace, 2005.

, Bluetooth Special Interest Group. GATT Specifications -GATT Services, pp.2020-2024, 2020.

. Transparentech, . Online, and . Generator, , pp.2020-2025, 2020.

. Canonical, uuidgen -Create a new UUID value, pp.2020-2025, 2019.

, Bluetooth Special Interest Group. GATT Specifications, pp.2020-2024, 2019.

, Bluetooth Special Interest Group. Device Information -GATT Ser

, Bluetooth Special Interest Group. Battery Service -GATT Ser

, Xml/Services/org.bluetooth.service.battery _ service, pp.2020-2025

. Mathieu-cunche, Mathieu Cunche -Associate Professor, INSA-Lyon -CITI, Inria -Privatics, pp.2020-2025, 2020.

G. Celosia, Guillaume Celosia -PhD Student @ CITI Lab -Inria, pp.2020-2025, 2020.

J. Kooker, Z. Bluetooth, and W. , A comparison of wpan technologies. CSE 237A, vol.20, 2008.

E. Blossom, GNU radio: tools for exploring the radio frequency spectrum, Linux journal, issue.122, p.4, 2004.

, Philippe Biondi and the Scapy community. Scapy -Packet crafting for Python2 and Python3. 2020, pp.2020-2025

M. Ossmann, HackRF, an open source SDR platform, pp.2020-2025, 2016.

M. Ossmann, Ubertooth One: an open source Bluetooth test tool, pp.2020-2025, 2016.

B. Fung, How stores use your phone's WiFi to track your shopping habits, pp.2020-2023, 2013.

V. Mavroudis and M. Veale, Eavesdropping whilst you're shopping: Balancing personalisation and privacy in connected retail spaces, 2018.

K. Fawaz, K. Kim, and K. Shin, Protecting privacy of {BLE} device users, 25th USENIX Security Symposium (USENIX Security 16), pp.1205-1221, 2016.

S. Siby, N. O. Rajib-ranjan-maiti, and . Tippenhauer, Iotscanner: Detecting privacy threats in iot neighborhoods, Proceedings of the 3rd ACM International Workshop on IoT Privacy, Trust, and Security, pp.23-30, 2017.

N. Apthorpe, D. Reisman, and N. Feamster, A smart home is no castle: Privacy vulnerabilities of encrypted iot traffic, 2017.

M. Bertrand and E. Kamenica, Coming Apart? Cultural Distances in the United States Over Time, National Bureau of Economic Research, 2018.

N. Apthorpe and D. Reisman, Srikanth Sundaresan, Arvind Narayanan, and Nick Feamster. Spying on the smart home: Privacy attacks and defenses on encrypted iot traffic, 2017.

Y. Wang, X. Yang, Y. Zhao, Y. Liu, and L. Cuthbert, Bluetooth positioning using RSSI and triangulation methods, 2013 IEEE 10th Consumer Communications and Networking Conference (CCNC), pp.837-842, 2013.

. Mozilla, Mozilla Location Service (MLS). 2020. URL https:// location.services.mozilla, pp.2020-2025

. Apple, Getting Started with iBeacon -Version 1.0, pp.2020-2025, 2014.

A. Musa and J. Eriksson, Tracking unmodified smartphones using wi-fi monitors, Proceedings of the 10th ACM conference on embedded network sensor systems, pp.281-294, 2012.

Y. S. Le-t-nguyen, P. Kim, J. Tague, and . Zhang, IdentityLink: userdevice linking through visual and RF-signal cues, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, pp.529-539, 2014.

E. Snowden and B. Huang, Against the law: Countering lawful abuses of digital surveillance, 2016.

I. Rouf, D. Robert, . Miller, A. Hossen, T. Mustafa et al., Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, USENIX Security Symposium, vol.10, 2010.

D. Milano, Content control: Digital watermarking and fingerprinting, 2012.

T. E. Varghese, Techniques for fraud monitoring and detection using application fingerprinting, US Patent, vol.8, p.278, 2014.

D. Formby, P. Srinivasan, A. Leonard, J. Rogers, and . Beyah, Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems, NDSS, 2016.

V. Brik, S. Banerjee, M. Gruteser, and S. Oh, Wireless device identification with radiometric signatures, Proceedings of the 14th ACM international conference on Mobile computing and networking, pp.116-127, 2008.

C. Adam, S. Polak, D. L. Dolatshahi, and . Goeckel, Identifying wireless users via transmitter imperfections, IEEE Journal on selected areas in communications, vol.29, issue.7, pp.1469-1479, 2011.

T. Vo-huu, T. Vo-huu, and G. Noubir, Fingerprinting Wi-Fi devices using software defined radios, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.3-14, 2016.

M. Vanhoef, C. Matte, M. Cunche, L. S. Cardoso, and F. Piessens, Why MAC address randomization is not enough: An analysis of Wi-Fi network discovery mechanisms, Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, pp.413-424, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01282900

A. Zomet and S. R. Urbach, Privacy-aware personalized content for the smart home, US Patent, vol.10, p.98, 2019.

, Assigned Numbers for Baseband, Bluetooth Special Interest Group, pp.2020-2025, 2020.

D. Geneiatakis, I. Kounelis, R. Neisse, I. Nai-fovino, G. Steri et al., Security and privacy issues for an IoT based smart home, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO), pp.1292-1297, 2017.

J. Martin, T. Mayberry, C. Donahue, L. Foppe, L. Brown et al., A study of MAC address randomization in mobile devices and when it fails, Proceedings on Privacy Enhancing Technologies, vol.2017, pp.365-383, 2017.

B. Greenstein, R. Gummadi, J. Pang, Y. Mike, T. Chen et al., Can Ferris Bueller Still Have His Day Off? Protecting Privacy in the Wireless Era, HotOS, 2007.

J. Scott-saponas, C. Lester, S. Hartung, T. Agarwal, and . Kohno, Devices That Tell on You: Privacy Trends in Consumer Ubiquitous Computing, USENIX Security Symposium, pp.55-70, 2007.

M. Langheinrich, Privacy by design -Principles of privacy-aware ubiquitous systems, International conference on Ubiquitous Computing, pp.273-291

. Springer, , 2001.

M. Gruteser and D. Grunwald, Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis, Mobile Networks and Applications, vol.10, issue.3, pp.315-325, 2005.

L. Hutchinson, iOS 8 to stymie trackers and marketers with MAC address randomization, 2014.

, Android Open Source Project, pp.2020-2025, 2020.

K. Skinner and J. Novak, Privacy and your app, 2015.

E. Grumbach, iwlwifi: mvm: support random MAC address for scanning. Linux commit effd05ac479b, 2014.

W. Wang, Wireless networking in Windows 10, Windows Hardware Engineering Community conference (WinHEC), 2015.

, 802.11aq-2018 -IEEE Standard for Information technology -Telecommunications and information exchange between systems Local and metropolitan area networks -Specific requirements Part, vol.11, 2018.

V. Srinivasan, J. Stankovic, and K. Whitehouse, Protecting your daily in-home activity information from a wireless snooping attack, Proceedings of the 10th international conference on Ubiquitous computing, pp.202-211, 2008.

K. Yoshigoe, W. Dai, M. Abramson, and A. Jacobs, Overcoming invasion of privacy in smart home environment with synthetic packet injection, 2015 TRON Symposium (TRONSHOW), pp.1-7, 2015.

L. Demir, M. Cunche, and C. Lauradoux, Analysing the privacy policies of Wi-Fi trackers, Proceedings of the 2014 workshop on physical analytics, pp.39-44, 2014.
URL : https://hal.archives-ouvertes.fr/hal-00968585

J. Freudiger, How talkative is your mobile device? An experimental study of Wi-Fi probe requests, Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.1-6, 2015.

C. Matte, F. Mathieu-cunche, M. Rousseau, and . Vanhoef, Defeating MAC address randomization through timing attacks, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, pp.15-20, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01330476

K. Johannes, D. Becker, D. Li, and . Starobinski, Tracking anonymized bluetooth devices, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.50-65, 2019.

D. Evans, The internet of things: How the next evolution of the internet is changing everything, vol.1, pp.1-11, 2011.

M. Rouse, Internet of things (IoT). IoT Agenda, 2016.

A. Molina-markham, P. Shenoy, K. Fu, E. Cecchet, and D. Irwin, Private memoirs of a smart meter, Proceedings of the 2nd ACM workshop on embedded sensing systems for energy-efficiency in building, pp.61-66, 2010.

J. H. Ziegeldorf, O. Garcia-morchon, and K. Wehrle, Privacy in the Internet of Things: threats and challenges. Security and Communication Networks, vol.7, pp.2728-2742, 2014.

H. Sundmaeker, P. Guillemin, P. Friess, and S. Woelfflé, Vision and challenges for realising the Internet of Things, Cluster of European Research Projects on the Internet of Things, vol.3, pp.34-36, 2010.

J. Anderson and L. Rainie, The Gurus Speak. Pew Research Center, 2014.

D. Leibenger, F. Möllers, A. Petrlic, R. Petrlic, and C. Sorge, Privacy challenges in the quantified self movement -an EU perspective, Proceedings on privacy enhancing technologies, vol.2016, pp.315-334, 2016.

H. Fereidooni, T. Frassetto, M. Miettinen, A. Sadeghi, and M. Conti, Fitness trackers: fit for health but unfit for security and privacy, 2017 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE), pp.19-24, 2017.

R. Alastair, F. Beresford, and . Stajano, Location privacy in pervasive computing, IEEE Pervasive computing, vol.2, issue.1, pp.46-55, 2003.

E. Union, Proposal for a Regulation on Privacy and Electronic Communications, pp.2020-2023, 2017.

, Privacy Impact Assessment (PIA) -Application to IoT devices, pp.2020-2023, 2018.

, Working Party 223. Opinion 8/2014 on the on Recent Developments on the Internet of Things, pp.2020-2023, 2014.

. Qwant, Qwant -The search engine that respects your privacy, pp.2020-2025, 2020.

. Silver-eco, Groupe La Poste: les Français et les objets connectés, pp.2020-2023, 2016.

C. Baraniuk, Surveillance: The hidden ways you're tracked, pp.2020-2023, 2014.

B. Gellman and A. Soltani, NSA tracking cellphone locations worldwide, Snowden documents show, The Washington Post, vol.4, 2013.

J. Scahill and G. Greenwald, The NSA's secret role in the US assassination program. The intercept, vol.10, 2014.

K. Mowery and H. Shacham, Pixel perfect: Fingerprinting canvas in HTML5, Proceedings of W2SP, pp.1-12, 2012.

P. Eckersley, How unique is your web browser?, International Symposium on Privacy Enhancing Technologies Symposium, pp.1-18, 2010.

C. Matte, Wi-Fi tracking: Fingerprinting attacks and counter-measures, 2017.
URL : https://hal.archives-ouvertes.fr/tel-01659783

D. Oscar, M. A. Lara, and . Labrador, A survey on human activity recognition using wearable sensors, IEEE communications surveys & tutorials, vol.15, issue.3, pp.1192-1209, 2012.

X. Su, H. Tong, and P. Ji, Activity recognition with smartphone sensors, Tsinghua science and technology, vol.19, issue.3, pp.235-249, 2014.

C. Narayanan, D. J. Krishnan, and . Cook, Activity recognition on streaming sensor data, Pervasive and mobile computing, vol.10, pp.138-154, 2014.

F. Wong and F. Stajano, Location privacy in bluetooth, European Workshop on Security in Ad-hoc and Sensor Networks, pp.176-188, 2005.

B. Bonné, A. Barzan, P. Quax, and W. Lamotte, WiFiPi: Involuntary tracking of visitors at mass events, 2013 IEEE 14th International Symposium on" A World of Wireless, Mobile and Multimedia Networks"(WoWMoM), pp.1-6, 2013.

T. Issoufaly and P. U. Tournoux, BLEB: Bluetooth Low Energy Botnet for large scale individual tracking, 2017 1st International Conference on Next Generation Computing Applications (NextComp), pp.115-120, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01816475

D. Oosterlinck, F. Dries, P. Benoit, N. Baecke, and . Van-de-weghe, Bluetooth tracking of humans in an indoor environment: An application to shopping mall visits, Applied geography, vol.78, pp.55-65, 2017.

, The Store Of The Future: 150+ Startups Transforming Brick-And-Mortar Retail In One Infographic, pp.2020-2024, 2017.

A. Meyers, Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units, pp.2020-2024, 2016.

?. Olejnik, Privacy of London Tube Wifi Tracking, pp.2020-2024, 2017.

E. Constantine, N. Kontokosta, and . Johnson, Urban phenology: Toward a real-time census of the city using Wi-Fi data. Computers, Environment and Urban Systems, vol.64, pp.144-153, 2017.

, Android Open Source Project. Privacy: MAC Randomization, 2020.

. Accessed, , pp.2020-2024

. Apple, About the security content of iOS 8, pp.2020-2024, 2020.

, Raspberry Pi Foundation. Teach, Learn, and Make with Raspberry Pi, pp.2020-2025, 2020.

U. Mini, C. Bluetooth, and . V4, USB Dongle Adapter Dual Mode Device for Windows 10 8 7 Vista, pp.2020-2025

. Bluez, BlueZ -Official Linux Bluetooth protocol stack, pp.2020-2023, 2020.

I. Harvey, bluepy -A Bluetooth LE interface for Python, pp.2020-2023, 2014.

S. Margaritelli, This Is Not a Post About BLE, Introducing BLEAH, pp.2020-2023, 2017.

S. Lester, The Emergence of Bluetooth Low Energy, pp.2020-2023, 2015.

M. Imran, J. , and J. Dungen, Low-power wireless advertising software library for distributed M2M and contextual IoT, IEEE 2nd World Forum on Internet of Things (WF-IoT), pp.597-602, 2015.

, Fichier des noms, pp.2020-2023, 2018.

, Fichier des prénoms, pp.2020-2023, 2019.

. Google and . Eddystone, , pp.2020-2023, 2018.

, AltBeacon Protocol Specification v1.0, pp.2020-2023, 2015.

K. Aveek, . Das, H. Parth, C. Pathak, P. Chuah et al., Uncovering privacy leakage in ble network traffic of wearable fitness trackers, Proceedings of the 17th International Workshop on Mobile Computing Systems and Applications, pp.99-104, 2016.

R. Indra-mohan-chakravarti, J. Govira-laha, and . Roy, Handbook of methods of applied statistics, vol.2, 1967.

. Tw-kirkman, Statistics to use: Kolmogorov-Smirnov test, 1996.

, Bluetooth Core Specification Supplement v9, Bluetooth Special Interest Group, pp.2020-2023, 2019.

. Apple, Use Continuity to connect your Mac, iPhone, iPad, iPod touch, and Apple Watch, pp.2020-2023, 2019.

. Microsoft, Connected Devices Platform Protocol Version 3

. Google and . Nearby, , pp.2020-2023, 2020.

. Google, Google Play services, pp.2020-2025, 2020.

. Google, Nearby -Connections API, pp.2020-2023, 2018.

. Google, Connectivity Samples Repository, pp.2020-2023, 2020.

. Google, Use Nearby to find Chromecast devices, pp.2020-2023, 2020.

C. Matte and M. Cunche, Wombat: An experimental wi-fi tracking system, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01679007

S. Bratus, C. Cornelius, D. Kotz, and D. Peebles, Active behavioral fingerprinting of wireless devices, Proceedings of the first ACM conference on Wireless network security, pp.56-61, 2008.

G. Gábor-györgy-gulyás, C. Acs, and . Castelluccia, Near-optimal fingerprinting with constraints, Proceedings on Privacy Enhancing Technologies, vol.2016, pp.470-487, 2016.

. Apple, Secure software updates overview, pp.2020-2026, 2020.

M. Haase and M. Handy, BlueTrack -Imperceptible tracking of bluetooth devices, Ubicomp Poster Proceedings, 2004.

T. Liebig and A. Wagoum, Modelling Microscopic Pedestrian Mobility using Bluetooth, ICAART (2), pp.270-275, 2012.

M. Versichele, T. Neutens, M. Delafontaine, and N. Van-de-weghe, The use of Bluetooth for analysing spatiotemporal dynamics of human movement at mass events: A case study of the Ghent Festivities, Applied Geography, vol.32, issue.2, pp.208-220, 2012.

N. Abedi, A. Bhaskar, and E. Chung, Bluetooth and Wi-Fi MAC address based crowd data collection and monitoring: benefits, challenges and enhancement, 2013.

A. Pfitzmann and M. Hansen, Anonymity, unlinkability, unobservability, pseudonymity, and identity management-a consolidated proposal for terminology, 2005.

. Kiminewt, PyShark -Python packet parser using wireshark's tshark, pp.2020-2024, 2020.

G. Combs, Wireshark -The world's foremost and widely-used network protocol analyzer, pp.2020-2024, 1998.

M. Furious, &. Security, and . Group, Furious MAC is a project to understand, map, and correlate wireless hardware identifiers, pp.2020-2026, 2020.

G. Hogben, Changes to Device Identifiers in Android, pp.2020-2024

N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens et al., Cookieless monster: Exploring the ecosystem of web-based device fingerprinting, 2013 IEEE Symposium on Security and Privacy, pp.541-555, 2013.

, Bluetooth Market Update, Bluetooth Special Interest Group, pp.2020-2024, 2020.

J. Hering, The BlueSniper 'rifle'. 12th DEFCON, 2004.

A. Laurie, M. Holtmann, M. Herfurt, and . Bluetooone, , pp.2020-2024, 2004.

, Company Identifiers -Assigned Numbers, Bluetooth Special Interest Group, pp.2020-2024, 2020.

J. Martin, E. Rye, and R. Beverly, Decomposition of MAC address structure for granular device inference, Proceedings of the 32nd Annual Conference on Computer Security Applications, pp.78-88, 2016.

. Google and . Google, Shopping: Buy on Google | Get good deals from your merchants, pp.2020-2026, 2020.

. Amazon and . Amazon, Online Shopping for Electronics, Apparel, Computers, Books, DVDs & more. 2020, pp.2020-2026

, 16 Bit UUIDs for Members -Assigned Numbers, Bluetooth Special Interest Group, pp.2020-2024, 2020.

, Hearing Aid Audio Support Using Bluetooth LE, pp.2020-2024, 2020.

F. Barriga, Open API of Sony SmartBand SWR-10, pp.2020-2024, 2015.

. Facebook, Facebook -Log in or sign up, pp.2020-2026, 2020.

. Instagram and . Instagram, , pp.2020-2026, 2020.

. Twitter, , pp.2020-2026

?. Olejnik, G. Acar, C. Castelluccia, and C. Diaz, The leaking battery, Data Privacy Management, and Security Assurance, pp.254-263

. Springer, , 2015.

J. Freeman, Models -The iPhone Wiki, pp.2020-2024, 2020.

. Apple, Identify your MacBook Pro model, pp.2020-2024, 2019.

, USB Implementers Forum. Membership Lookup & List. 2020, pp.2020-2024

, Apple. Apple Notification Center Service, pp.2020-2024, 2014.

A. Nikishaev, MiBand2 -Library to work with Xiaomi MiBand 2, pp.2020-2024, 2020.

M. Ossmann, Discovering the Bluetooth UAP, pp.2020-2024, 2014.

M. Basseville and I. V. Nikiforov, Detection of abrupt changes: theory and application, vol.104, 1993.
URL : https://hal.archives-ouvertes.fr/hal-00008518

W. Mckinney, pandas -Python Data Analysis Library, pp.2020-2024, 2020.

P. Borges, l2ping.c -BlueZ -Bluetooth protocol stack for Linux, pp.2020-2026, 2012.

. Apple and . Shazam, , pp.2020-2025, 2020.

A. Fidel, E-cigarette is better with Bluetooth, pp.2020-2026, 2019.

, Bluetooth Special Interest Group. Specifications -Assigned Numbers, pp.2020-2024, 2020.

. Mozilla, Download Firefox -Free Web Browser, pp.2020-2026, 2020.

. Apple, All your devices. One seamless experience, pp.2020-2024, 2020.

. Apple and . Mfi, , pp.2020-2024

. Apple, Home accessories. The list keeps getting smarter, pp.2020-2024, 2020.

. Apple, Apple Reports Record First Quarter Results, pp.2020-2024, 2020.

M. Mathieu-cunche, R. Kaafar, and . Boreli, Linking wireless devices using information contained in Wi-Fi probe requests, Pervasive and Mobile Computing, vol.11, pp.56-69, 2014.

. Apple, Apple Platform Security, pp.2020-2024, 2020.

. Apple, HomeKit Accessory Protocol Specification (Non-Commercial Version) -Release R2, pp.2020-2024, 2019.

P. Borges, hcitool.c -BlueZ -Bluetooth protocol stack for Linux, pp.2020-2024, 2012.

. A. Apple and . Developer, , pp.2020-2024, 2020.

V. Bénony, Hopper v4 -The macOS and Linux Disassembler, pp.2020-2024, 2020.

. Apple, AirDrop security, pp.2020-2024, 2020.

. Apple and . Handoff, , pp.2020-2024, 2020.

. Apple, , pp.2020-2024

A. Cui, M. Costello, and S. Stolfo, When firmware modifications attack: A case study of embedded exploitation, 2013.

. Apple, Connect and use your AirPods and AirPods Pro, pp.2020-2024, 2020.

D. Kewley, R. Fink, J. Lowry, and M. Dean, Dynamic approaches to thwart adversary intelligence gathering, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01, vol.1, pp.176-185, 2001.

. Apple and . Handoff, , pp.2020-2024, 2020.

. Apple, Use Handoff to continue a task on your other devices, pp.2020-2024, 2019.

. Apple, Instant Hotspot, pp.2020-2024, 2020.

. Apple, Use Instant Hotspot to connect to your Personal Hotspot without entering a password, pp.2020-2024, 2019.

C. Matthias, K. Sala, L. Partridge, and . Jacobson, An exploration into activityinformed physical advertising using PEST, International Conference on Pervasive Computing, pp.73-90, 2007.

B. Copos, K. Levitt, M. Bishop, and J. Rowe, Is anybody home? Inferring activity from smart home network traffic, 2016 IEEE Security and Privacy Workshops (SPW), pp.245-251, 2016.

J. Bonneau, The science of guessing: analyzing an anonymized corpus of 70 million passwords, 2012 IEEE Symposium on Security and Privacy, pp.538-552, 2012.

L. Demir, A. Kumar, M. Cunche, and C. Lauradoux, The pitfalls of hashing for privacy, IEEE Communications Surveys & Tutorials, vol.20, issue.1, pp.551-565, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01589210

M. Marx, E. Zimmer, T. Mueller, M. Blochberger, and H. Federrath, Hashing of personally identifiable information is not sufficient, 2018.

T. Hunt, The 773 Million Record "Collection #1" Data Breach, pp.2020-2024, 2019.

J. Elias and M. Petrova, Google's rocky path to email domination, pp.2020-2024, 2019.

, PETS. Symposium Attendance -PoPETs Acceptance Rates. 2020, pp.2020-2024

J. Steube and G. Gristina, hashcat -Advanced password recovery, pp.2020-2024, 2020.

, Autorité de Régulation des Communications Electroniques et des Postes. Marché des communications électroniques en France, pp.2020-2024, 2019.

J. Haitsma and T. Kalker, A Highly Robust Audio Fingerprinting System, Ismir, vol.2002, pp.107-115, 2002.

H. Knospe, Privacy-enhanced perceptual hashing of audio data, 2013 International Conference on Security and Cryptography (SECRYPT), pp.1-6, 2013.

K. Gopala-krishna-anumanchipalli, A. W. Prahallad, and . Black, Festvox: Tools for creation and analyses of large speech corpora, Workshop on Very Large Scale Phonetics Research, p.70, 2011.

. Sparhandy, Siri commands -Endless functions of your virtual assistant, pp.2020-2024, 2020.

H. Fu, A. Zhang, and X. Xie, Effective social graph deanonymization based on graph structure and descriptive information, ACM Transactions on Intelligent Systems and Technology (TIST), vol.6, issue.4, pp.1-29, 2015.

J. Sponas, Things You Should Know About Bluetooth Range

N. Gerber, B. Reinheimer, and M. Volkamer, Investigating People's Privacy Risk Perception, Proceedings on Privacy Enhancing Technologies, vol.2019, pp.267-288, 2019.

C. Arackaparambil, S. Bratus, A. Shubina, and D. Kotz, On the reliability of wireless fingerprinting using clock skews, Proceedings of the third ACM conference on Wireless network security, pp.169-174, 2010.

D. Antonioli, N. O. Tippenhauer, and K. Rasmussen, Nearby Threats: Reversing, Analyzing, and Attacking Google's 'Nearby Connections' on Android, Proceedings of the Network and Distributed System Security Symposium (NDSS), 2019.

M. Stute, S. Narain, A. Mariotto, A. Heinrich, D. Kreitschmann et al., A billion open interfaces for Eve and Mallory: MitM, DoS, and tracking attacks on iOS and macOS through Apple Wireless Direct Link, 28th USENIX Security Symposium (USENIX Security 19), pp.37-54, 2019.

M. Alaggan, M. Mathieu-cunche, and . Minier, Privacy-Preserving t-Incidence for WiFi-based Mobility Analytics, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01376798

E. Shin, Eun-Jeong Shin -Privacy Engineer of Google, pp.2020-2026, 2020.

. Apple and . Privacy--apple, , pp.2020-2026, 2020.

S. Ics and . Lyon, IoT & Privacy -Comment assurer la confidentialité sur les réseaux sans fil ? L'exemple du BLE, 2020.

. Mathieu-cunche, Télécommunications -Sécurité et vie privée, pp.2020-2025, 2020.

M. Furious and . Research-group, An Apple Continuity Protocol Reverse Engineering Project, pp.2020-2026, 2020.

J. Martin, D. Alpuche, K. Bodeman, L. Brown, E. Fenske et al., Reverse Engineering Apple's BLE Continuity Protocol for Tracking, OS Fingerprinting, and Behavioral Profiling, ShmooCon XVI, 2020.

S. Fanen, StopCovid : questions sur un mouchard de poche

, François Tonic. Programmez! podcast 17 : tracking et Covid19. 2020, pp.2020-2025

F. Innocente, Bluetooth : Continuité n'est pas assez étanche avec l'échange de données, 2019.

M. Naitmazi, Continuity d'Apple : une fuite du Bluetooth permet de récupérer vos informations, pp.2020-2025, 2019.

O. Hertel, Des chercheurs français découvrent des fuites d'informations sensibles sur les appareils Apple, pp.2020-2025, 2020.

D. Lepetitgaland, Connexions Apple : un étudiant de l'Insa Lyon détecte des failles, 2020.

. Accessed, , pp.2020-2025

, Commission Nationale de l'Informatique et des Libertés. LINC -Laboratoire d'Innovation Numérique de la CNIL, pp.2020-2025, 2020.

, Cancel my event with Mark.; Decrease brightness.; FaceTime Audio call to Alice.; Find number of dad.; How are the markets doing ?; How big is the biggest elephant ?; How far away is Mars ?; How far away is Tokyo ?.; How humid is it in Paris ?; How long do cats live ?; How many calories in an apple ?; How many days until Christmas ?; How many teeth does a cat have ?; How old is Madonna ?; How old is Peter ?; How tall is Paris Hilton ?; Increase brightness.; Inform my husband when I'm back home.; Inform my wife when I leave my home.; Is mom at home ?; Learn to pronounce my name.; Listen to Alicia Keys.; Locate my father.; Note: 'Susan will be late tonight'.; Open Instagram.; Open Spotify.; Play some music.; Play the rest of this album.; Read my new messages.; Remind me today: call Kevin.; Search Google for pictures of Thor.; Search the web for 'computer'.; Search the web for 'privacy'.; Send a message to Bob.; Send a message to Mark.; Send an e-mail to Susan.; Set a timer for 3 minutes.; Show all my photos.; Show me best family movies.; Show me my notes.; Show me my photos from London.; Show me my photos of last week.; Show me new e-mail from Peter.; Show me the latest tweets.; Show me the nearest cinema.; Show me tweets from Peter.; Show me videos of Avengers.; Show my favorite photos.; Show my selfies.; Square root of 49 ?, Activate Do Not Disturb

, Any new e-mail from Kevin ?; Call Abraham on speakerphone.; Call me a cab.; Call me king.; Cancel my event with Alice.; Compare Nikkei with Dow.; Deactivate Do Not Disturb.; Delete all alarms.; Delete the reminder 'project'.; Find some movie theaters near my home.; Flip a coin.; How many bones does a dog have ?; How many days until the birthday of dad ?, Andrew is my boyfriend

, Open Facebook.; Open mail.; Open settings.; Pause the timer.; Play me my latest voicemail.; Play the Titanic soundtrack.; Play the trailer for 'Pearl Harbor'.; Play this song from the beginning.; Play top 10 songs from Aya Nakamura.; Read Calendar.; Runtime of Titanic ?; Search Wikipedia for 'dog'.; Show me my photos from Lisbon.; Show me my photos of yesterday.; Show me pictures of Hulk.; Show me the appointments for next month.; Show me the traffic.; Tell me a story.; Text Susan: 'I will be late'; Translate 'cat' from English in Russian.; Turn on Cellular Data.; What is the time at home ?; What's the current dew point ?; What's the Nasdaq price ?; What's the pressure outside ?; What's the visibility outside ?; When died Freddie Mercury ?

, Mots-clés : Vie privée; Réseaux sans fil

, Traçage physique; Inférence d'informations utilisateurs; Bluetooth; BLE

T. Bernard,

B. Sonia and . Mokhtar,

J. Gorce,

, Vincent NICOMETTE (nicomett@insa-toulouse.fr)

V. Valérie and . Tong,

L. E. Daniel and . Métayer,

C. Mathieu,