Communications between devices that trigger activity is
of the highest concern to validate and secure. The timing
of response ultimately is what creates the beneficial
experience when the technology is functioning as
designed, it is always the unintended, overlooked, or
malicious capabilities that have to continue to inform
security and privacy design, and implementation.