J. Rifkin, The Third Industrial Revolution: How Lateral Power is Transforming Energy, the Economy, and the World, p.9780230341975, 2013.

P. Corcoran and A. Andrae, Emerging Trends in Electricity Consumption for Consumer ICT, 2013.

G. Cook, J. Lee, T. Tsai, A. Kong, J. Deans et al., Clicking Clean: Who Is Winning the Race to Build a Green Internet?, 2017.

S. G. Anders, T. Andrae, and . Edler, On Global Electricity Usage of Communication Technology: Trends to 2030, vol.6, pp.117-157, 2015.

J. Morley, K. Widdicks, M. Hazas, and . Digitalisation, Energy and Data Demand: The Impact of Internet Traffic on Overall and Peak Electricity Consumption, Energy Research & Social Science, vol.38, p.22146296, 2018.

R. Hischier, C. Vlad, D. Coroama, M. Schien, and . Achachlouei, Advances in Intelligent Systems and Computing, Grey Energy and Environmental Impacts of ICT Hardware », in: ICT Innovations for Sustainability, pp.171-189, 2015.

K. Devine and M. Brennan, « Music Streaming Has a Far Worse Carbon Footprint than the Heyday of Records and CDs -New Findings, The Conversation, 2019.

, Universal Declaration of Human Rights, Art. 12, United Nations, 1948.

, The Europeran Parliament and the Council of the European Union, General Data Protection Regulation (GDPR), Council regulation (EU) no 2016/679, vol.7, 2016.

, First Sanction against Google Following Our Collective Complaints, 2019.

Y. Al-saggaf and «. The, Use of Data Mining by Private Health Insurance Companies and Customers' Privacy: An Ethical Analysis, Cambridge Quarterly of Healthcare Ethics, vol.24, issue.3, pp.1469-2147, 2015.

E. Nakashima, J. Warrick, N. For, and . Chief, Terrorist Threat Drives Passion to 'Collect It All', pp.190-8286, 2013.

D. Greene and K. Rodriguez, NSA Mass Surveillance Programs: Unnecessary and Disproportionate, tech. rep., Electronic Frontier Foundation (EFF), p.23, 2014.

, NSA Utah Data Center -Serving Our Nation's Intelligence Community

C. Cadwalladr, « 'I Made Steve Bannon's Psychological Warfare Tool': Meet the Data War Whistleblower, The Guardian, 2018.

M. Kosinski, D. Stillwell, and T. Graepel, Private Traits and Attributes Are Predictable from Digital Records of Human Behavior, pp.27-8424, 2013.

W. Youyou, M. Kosinski, and D. Stillwell, « Computer-Based Personality Judgments Are More Accurate than Those Made by Humans, Proceedings of the National Academy of Sciences, vol.112, pp.27-8424, 2015.

S. C. Matz, M. Kosinski, G. Nave, and D. J. Stillwell, « Psychological Targeting as an Effective Approach to Digital Mass Persuasion, Proceedings of the National Academy of Sciences, pp.27-8424, 2017.

M. Weiser and . The, Computer for the 21st Century, Scientific American, vol.265, pp.36-8733, 1991.

M. Weiser and J. Seely-brown, The Coming Age of Calm Technolgy, Beyond Calculation, pp.0-38794932, 1997.

G. Giaconi, D. Gunduz, and H. Vincent-poor, Privacy-Aware Smart Metering: Progress and Challenges, vol.35, pp.59-78, 2018.

A. Greenberg, Hackers Remotely Kill a Jeep on the Highway-With Me in It », in: Wired, pp.1059-1028, 2015.

G. Paul and J. Irvine, Proceedings of the 7th International Conference on Security of Information and Networks, SIN '14, vol.117, pp.978-979, 2014.

«. Healthcare, Wearables to Reach $60bn by 2023, 2019.

L. Roa, Sexual Activity Tracked By Fitbit Shows Up In Google Search Results, 2011.

Y. Bromberg, P. Grace, L. Réveillère, and G. S. Blair, Bridging the Interoperability Gap: Overcoming Combined Application and Middleware Heterogeneity », in: Middleware, vol.7049, pp.390-409, 2011.

G. Blair, Y. Bromberg, G. Coulson, Y. Elkhatib, L. Réveillère et al., Towards a Systematic Approach to Composing Systems of Systems, Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware -ARM 2015, pp.1-6, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01245251

A. Huf and F. Siqueira, « Composition of Heterogeneous Web Services: A Systematic Review, vol.143, pp.1084-8045, 2019.

C. A. Souza, J. N. Correa, M. M. Oliveira, A. Aagaard, and M. Presser, « IoT Driven Business Model Innovation and Sustainability: A Literature Review and a Case Study in Brazil, Global IoT Summit (GIoTS), pp.1-6, 2019.

, Cory Doctorow, Makers, 2010.

P. Torrone, 25 Million + Raspberry Pi Computers Sold, 2019.

, Cisco Visual Networking Index: Forecast and Trends, 2017.

, Ethical design manifesto

C. Troncoso, M. Isaakidis, G. Danezis, and H. Halpin, Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments, vol.4, pp.2299-0984, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673295

M. Raynal, Distributed Algorithms for Message-Passing Systems, Berlin, Heidelberg, 2013.

P. Mell and T. Grance, The NIST Definition of Cloud Computing, 2011.

E. Rescorla, The Transport Layer Security (TLS) Protocol Version 1.3, RFC 8446, RFC Editor, 2018.

J. Iyengar and M. Thomson, QUIC: A UDP-Based Multiplexed and Secure Transport, Work in Progress, 2019.

C. Gentry and . Fully, Homomorphic Encryption Using Ideal Lattices, Proceedings of the 41st Annual ACM Symposium on Symposium on Theory of Computing -STOC '09, pp.978-979, 2009.

N. Borisov, G. Danezis, I. Goldberg, and «. Dp5, A Private Presence Service, Proceedings on Privacy Enhancing Technologies, vol.2, pp.2299-0984, 2015.

K. Banawan and S. Ulukus, « The Capacity of Private Information Retrieval From Coded Databases, IEEE Transactions on Information Theory, vol.64, pp.18-9448, 2018.

D. Chialva and A. Dooms, Conditionals in Homomorphic Encryption and Machine Learning Applications, 2018.

P. Eckersley and . How, Unique Is Your Web Browser?, Privacy Enhancing Technologies, vol.6205, pp.1-18, 2010.

A. Gómez-boix, P. Laperdrix, and B. Baudry, « Hiding in the Crowd: An Analysis of the Effectiveness of Browser Fingerprinting at Large Scale, Proceedings of the 2018 World Wide Web Conference on World Wide Web -WWW '18, pp.309-318, 2018.

D. Cole, We Kill People Based on Metadata, 2014.

S. Baker and B. Jacob, Public WebGL] about the VENDOR, RENDERER, and VERSION Strings, 2010.

K. Mowery and H. Shacham, « Pixel Perfect: Fingerprinting Canvas in HTML5, Proceedings of W2SP 2012, 2012.

C. Grothoff and «. System, , 2017.

M. Satyanarayanan, P. Bahl, R. Caceres, and N. Davies, « The Case for VM-Based Cloudlets in Mobile Computing, IEEE Pervasive Computing, vol.8, issue.4, pp.1536-1268, 2009.

M. Satyanarayanan and . The, Computer, vol.50, pp.30-39, 2017.

N. Li, C. Tsigkanos, Z. Jin, S. Dustdar, Z. Hu et al., 2019 IEEE International Conference on Pervasive Computing and Communications, pp.1-10, 2019.

M. Moh and R. Raju, Using Machine Learning for Protecting the Security and Privacy of Internet of Things (IoT) Systems », in: Fog and Edge Computing, pp.223-257, 2019.

P. G. Lopez, A. Montresor, D. Epema, A. Datta, T. Higashino et al., Centric Computing: Vision and Challenges, vol.45, pp.37-42, 2015.

J. Klensin, Simple Mail Transfer Protocol, RFC 2821, 2001.

P. Saint-andre, Extensible Messaging and Presence Protocol (XMPP): Core, RFC, vol.6120, 2011.

C. Webber, J. Tallon, . Activitypub, and . Recommendation, , vol.3, 2018.

. Mastodon,

. Peertube,

. Nextcloud,

, THe Fediverse Network

U. Eco and E. S. Sonzogno, A: Gruppo Editoriale Fabbri-Bompiani, pp.978-978, 1980.

C. Soghoian and S. Stamm, Certified Lies: Detecting and Defeating Government Interception Attacks against SSL (Short Paper) », in: Financial Cryptography and Data Security, pp.250-259, 2012.

B. Schneier, New NSA Leak Shows MITM Attacks Against Major Internet Services -Schneier on Security, 2013.

R. Singel and . Law, Enforcement Appliance Subverts SSL, pp.1059-1028, 2010.

L. David and . Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, vol.2, p.5, 1981.

D. M. Goldschlag, M. G. Reed, and P. F. Syverson, « Hiding Routing Information », in: Information Hiding, vol.1174, pp.137-150, 1996.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, tech. rep, 2004.

B. Cohen, The BitTorrent Protocol Specification, tech. rep, 2008.

P. Maymounkov, D. Mazieres, and . Kademlia, A Peer-to-Peer Information System Based on the Xor Metric, International Workshop on Peer-to-Peer Systems, pp.53-65, 2002.

I. Baumgart, S. Mies, and «. Kademlia, A Practicable Approach towards Secure Key-Based Routing, 2007 International Conference on Parallel and Distributed Systems, pp.1-8, 2007.

G. Urdaneta, G. Pierre, and M. Van-steen, A Survey of DHT Security Techniques, vol.43, 2011.

Q. Wang and N. Borisov, Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference On, pp.325-334, 2012.

A. Loewenstern and A. Norberg, The BitTorrent DHT Protocol, tech. rep., BitTorrent Inc, 2008.

J. Benet, IPFS -Content Addressed, Versioned, P2P File System, p.11, 2014.

M. Ogden and . Dat, Distributed Dataset Synchronization And Versioning, 2018.

A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson et al., Epidemic Algorithms for Replicated Database Maintenance, 1987.

M. Raynal, Distributed Algorithms for Message-Passing Systems, 2013.
URL : https://hal.archives-ouvertes.fr/hal-00922219

M. Jelasity, R. Guerraoui, A. Kermarrec, «. Maarten-van-steen, and . The, Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations, Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware, Middleware '04, pp.978-981, 2004.

M. Jelasity, S. Voulgaris, R. Guerraoui, A. Kermarrec, and M. Van-steen, Gossip-based peer sampling, vol.25, p.8, 2007.

A. Bakker, M. Steen, and «. Puppetcast, A Secure Peer Sampling Protocol, 2008 European Conference on Computer Network Defense, pp.3-10, 2008.

E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, A. Shraer et al., Byzantine Resilient Random Membership Sampling, vol.53, p.13891286, 2009.

G. P. Jesi, A. Montresor, and M. Van-steen, « Secure Peer Sampling, Computer Networks, vol.54, p.13891286, 2010.

, Secure Scuttlebutt -a Decent(Ralised) Secure Gossip Platform, 2018.

C. Tschudin and «. Broadcast-only, ACM SIGCOMM Computer Communication Review, vol.49, p.1464833, 2019.

D. Tarr, Scalable Secure Scuttlebutt, 2019.

S. Nakamoto and . Bitcoin, A Peer-to-Peer Electronic Cash System, p.9, 2008.

H. Halpin and «. Nextleap, Decentralizing Identity with Privacy for Secure Messaging, Proceedings of the 12th International Conference on Availability, Reliability and Security -ARES '17, pp.1-10, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01673292

A. Kiayias, A. Russell, B. David, R. Oliynykov, and . Ouroboros, A Provably Secure Proof-of-Stake Blockchain Protocol, Advances in Cryptology -CRYPTO 2017, vol.10401, pp.357-388, 2017.

. Ethereum,

V. Costan and S. Devadas, IACR Cryptology ePrint Archive 2016, p.86, 2016.

S. Kim, J. Han, J. Ha, T. Kim, D. Han et al., A Secure and Practical Tor Anonymity Network With SGX Enclaves, vol.26, pp.1558-2566, 2018.

S. Contiu, R. Pires, S. Vaucher, M. Pasin, P. Felber et al., Cryptographic Group Access Control Using Trusted Execution Environments, 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), pp.207-218, 2018.

T. Liu, Z. Tariq, J. Chen, and B. Raghavan, Proceedings of the 16th ACM Workshop on Hot Topics in Networks, HotNets-XVI, pp.72-79, 2017.

G. Danezis, I. Goldberg, and . Sphinx, A Compact and Provably Secure Mix Format, 30th IEEE Symposium on Security and Privacy, pp.269-282, 2009.

C. Chen, D. E. Asoni, D. Barrera, G. Danezis, A. Perrig et al., High-Speed Onion Routing at the Network Layer, 2015.

Z. Amsden, The Libra Blockchain, p.29, 2019.

. Nym, Libra Is Blockchain Virtue-Signalling at Its Worst -Centralised, Not Private, and Good for Facebook, 2019.

H. Debnath, N. Gehani, X. Ding, R. Curtmola, C. Borcea et al., Distributed Sensor Virtualization for Mobile Apps, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom), pp.1-9, 2018.

J. Park, R. Chitchyan, A. Angelopoulou, J. Murkin, and «. Block-free, Distributed Ledger for P2P Energy Trading: Case with IOTA?, Advanced Information Systems Engineering, pp.111-125, 2019.

A. K. Karlson, B. R. Meyers, A. Jacobs, P. Johns, and S. K. Kane, « Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker, International Conference on Pervasive Computing, pp.398-405, 2009.

. Google, The new multi-screen world: Understanding cross-platform consumer behavior, 2012.

F. Kawsar and A. J. , Bernheim Brush, « Home Computing Unplugged: Why, Where and when People Use Different Connected Devices at Home, UBI-COMP'13, pp.627-636

H. Müller, J. L. Gove, J. S. Webb, and A. Cheang, Proceedings of the Annual Meeting of the Australian Special Interest Group for Computer Human Interaction, OzCHI '15, pp.427-436, 2015.

T. Jokela, J. Ojala, and T. Olsson, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI '15, pp.3903-3912, 2015.

D. T. Wagner, A. Rice, A. R. Beresford, and . Analyzer, Understanding Smartphone Usage, International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp.195-208, 2013.

, The Tablet Boom Is Long Over | Statista

J. Steven, . Vaughan-nichols, . Goodbye, and . Tablets, , 2019.

L. Michal, Designing Multi-Device Experiences, p.1449340385, 2014.

A. Cordova,

. Nativestript,

. Facebook-react-native,

M. Xamarin,

A. Phonegap,

G. Flutter,

E. R. Fisher, S. K. Badam, and N. Elmqvist, « Designing Peer-to-peer Distributed User Interfaces: Case Studies on Building Distributed Applications, Int. J. Hum.-Comput. Stud, vol.72, issue.1, pp.100-110, 2014.

J. Melchior, D. Grolaux, J. Vanderdonckt, P. Van-roy, and «. , Toolkit for Peer-to-peer Distributed User Interfaces: Concepts, Implementation, and Applications, The 1st ACM SIGCHI Symposium on Engineering Interactive Computing Systems, EICS '09, pp.69-78, 2009.

A. Gallidabino and C. Pautasso, Deploying Stateful Web Components on Multiple Devices with Liquid.js for Polymer, pp.85-90, 2016.

A. Handoff,

R. Sync,

. Syncthing,

L. Lamport and . Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, pp.558-565, 1978.

K. P. Birman, M. Hayden, O. Ozkasap, Z. Xiao, M. Budiu et al., « Bimodal Multicast, 1998.

A. Kermarrec, L. Massoulié, and A. J. Ganesh, Reliable Probabilistic Communication in Large-Scale Information Dissemination Systems, tech. rep, 2000.

;. M. Friedemann-mattern and . Cosnard, Parallel and Distributed Algorithms: proceedings of the International Workshop on Parallel & Distributed Algorithms, pp.215-226, 1989.

A. Kermarrec, L. Massoulié, and A. J. Ganesh, « Probabilistic reliable dissemination in large-scale systems, IEEE Transactions on Parallel and Distributed systems, vol.14, pp.248-258, 2003.

M. E. Newman, « Power laws, Pareto distributions and Zipf's law », in: Cities, vol.30, p.2642751, 2013.

J. Oh, J. Kwon, H. Park, and S. Moon, Migration of Web Applications with Seamless Execution, pp.173-185, 2015.

M. Frigge, D. C. Hoaglin, and B. Iglewicz, « Some Implementations of the Boxplot, The American Statistician, vol.43, pp.50-54, 1989.

. Consul and . Hashicorp,

A. Lipowski and D. Lipowska, « Roulette-wheel selection via stochastic acceptance, Physica A: Statistical Mechanics and its Applications, vol.391, p.3784371, 2012.

D. Stutzbach and R. Rejaie, « Understanding Churn in Peer-to-peer Networks, Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06, 2006.

T. Kalbarczyk, C. Julien, and . Omni, An Application Framework for Seamless Device-to-Device Interaction in the Wild, Proceedings of the 19th International Middleware Conference on -Middleware '18, pp.161-173, 2018.

T. B. Charles, . Garrocho, J. Maurício, R. A. Da-silva, and . Oliveira, « D2D Pervasive Communication System with Out-of-Band Control Autonomous to 5G Networks: Project and Evaluation of a Middleware for Networking and Content Exchange to D2D Communication without Human Interaction, Wireless Networks, pp.1572-8196, 2018.

D. Dearman and J. S. Pierce, « It's on My Other Computer!: Computing with Multiple Devices, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '08, pp.767-776, 2008.

T. Sohn, K. A. Li, W. G. Griswold, and J. D. Hollan, « A Diary Study of Mobile Information Needs, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI'08, pp.433-442, 2008.

R. Harper, T. Rodden, Y. Rogers, and A. Sellen, Being Human: Human-Computer Interaction in the Year 2020, 2008.

S. Oh, H. Yoo, D. R. Jeong, D. H. Bui, I. Shin et al., Multi-device Mobile Platform for Cross-device Functionality Sharing, Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys '17, 2017.

N. Marquardt, R. Diaz-marino, S. Boring, and S. Greenberg, Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, UIST '11, 2011.

D. Harnik, B. Pinkas, and A. Shulman-peleg, Side Channels in Cloud Services: Deduplication in Cloud Storage, vol.8, pp.40-47, 2010.

J. Stisa and G. , American Spies: Modern Surveillance, Why You Should Care, and What to Do About It, pp.53-66, 2017.

I. Clarke, O. Sandberg, B. Wiley, T. W. Hong, and . Freenet, A Distributed Anonymous Information Storage and Retrieval System, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp.46-66, 2001.

J. Michael, R. Freedman, . Morris, and . Tarzan, A Peer-to-peer Anonymizing Network Layer, Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS '02, 2002.

M. Rennhard and B. Plattner, « Introducing MorphMix: Peer-to-peer Based Anonymous Internet Usage with Collusion Detection, Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES '02, 2002.

J. Michael, R. Freedman, . Morris, and . Tarzan, A Peer-to-Peer Anonymizing Network Layer, p.14, 2002.

A. Nambiar, M. Wright, and . Salsa, A Structured Approach to Largescale Anonymity, Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS '06, pp.1-59593, 2006.

D. L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, issue.2, pp.84-90, 1981.

D. Stevens-le-blond, W. Choffnes, P. Zhou, H. Druschel, P. Ballani et al., « Towards Efficient Traffic-Analysis Resistant Anonymity Networks, Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, SIGCOMM '13, pp.978-979, 2013.

J. Van-den, D. Hooff, M. Lazar, N. Zaharia, . Zeldovich et al., Proceedings of the 25th Symposium on Operating Systems Principles -SOSP '15, pp.137-152, 2015.

A. M. Piotrowska, J. Hayes, T. Elahi, S. Meiser, and G. Danezis, 26th USENIX Security Symposium (USENIX Security 17, pp.1199-1216, 2017.

J. P. Podolanko, R. Pobala, H. Mucklai, G. Danezis, M. Wright et al., , pp.978-979, 2017.

X. Cai, X. Cheng-zhang, B. Joshi, and R. Johnson, Proceedings of the 2012 ACM Conference on Computer and Communications Security -CCS '12, p.605, 2012.

J. Stuart, P. Russell, and . Norvig, Artificial Intelligence, A Modern Approach. Second Edition, p.835, 2003.

S. Voulgaris, D. Gavidia, «. Maarten-van-steen, and . Cyclon, Inexpensive Membership Management for Unstructured P2P Overlays, Journal of Network and Systems Management, vol.13, issue.2, pp.197-217, 2005.

A. Fiat and M. Naor, Advances in Cryptology -CRYPTO' 93, pp.480-491, 1993.

. Douglas-r-stinson, Cryptography: theory and practice, 2005.

B. Libert, K. G. Paterson, and E. A. Quaglia, Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, vol.7293, pp.206-224, 2012.

A. Barth, D. Boneh, and B. Waters, « Privacy in encrypted content distribution using private broadcast encryption, International Conference on Financial Cryptography and Data Security, pp.52-64, 2006.

J. A. Lockitt, A. G. Gatfield, and T. R. Dobyns, 3rd International Conference on Digital Satellite Communications, pp.189-195, 1975.

E. Weldon, « An Improved Selective-Repeat ARQ Strategy, vol.30, pp.90-6778, 1982.

L. Larry, B. S. Peterson, and . Davie, Computer Networks: A Systems Approach, pp.97-110, 2003.

X. Zhu and Y. Badr, « Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions, Sensors 18, vol.12, p.4215, 2018.

. Nym, Building the next generation of privacy infrastructure, 2019.