For digital assistants to be able to carry out the function they do, it is necessary to record conversations, searches, and images along with other information such as our location, and even track our behaviors. Because these devices connect to our smartphones, which allows such digital assistants to track some key metrics (Dara, 2019). Another concern is that they are prone to technical and even security vulnerabilities. If we imagine that a third party was able to access information via a vulnerability, we have a second concern. For example, there was a case in Germany where a user was able to access the Alexa recordings of another user, unknown to him. He was able to access enough information about that user to reach out and gain a good picture of the stranger. It started when one user attempted to access his data, under the EU’s GDPR (General Data Protection) legislation. Owing to a flaw, he gained this information on another user (Dark Reading, 2018). What this case does illustrate, is that we are not aware of how much data is being collected on us daily, and it can certainly be interpreted as an invasion of our