The Rolling Proximity Identifier used in the Apple/Google Exposure Notification API beta through 2020-05-29 enables attackers to circumvent Bluetooth Smart Privacy because there is a secondary temporary UID. An attacker with access to Beacon or IoT networks can seamlessly track individual device movement via a Bluetooth LE discovery mechanism.
blog.google/documents/70/Exposure_Notification_-_Bluetooth_Specification_v1.2.2.pdf
github.com/google/exposure-notifications-internals/commit/8f751a666697
github.com/google/exposure-notifications-internals/commit/8f751a666697c3cae0a56ae3464c2c6cbe31b69e
github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200611.pdf
github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200616-2.pdf
github.com/normanluhrmann/infosec/raw/master/exposure-notification-vulnerability-20200616.pdf