Security

3 posts

Essential security information for KNX members and customers

The KNX Association now offers a web-based security check so that you can control whether your KNX installation is fully protected from malicious contacts over the Internet. The tool works under tightly controlled conditions by trying to connect to your installation from KNX secure servers. If any breach of security is found, you will be given guidelines on how to secure your installation. To run your secure web-based security check, click here: https://securitycheck.knx.org/en/index.html Sometimes, remote access is needed in an installation, which is why we have complimented the offline functionality of our Aragon smart speaker with an integrated Tailscale feature. […]

It is time to take your privacy seriously

Why we are no longer supporting Alexa We have made a conscious choice not to ship hardware with direct support for the online voice assistants Alexa or Google Assistant. Our Privacy Philosophy Benefits You. We believe that: Therefore, as of Sep 1, 2023, our “realKNX servers” will no longer support Alexa, Google Assistant, or remoteConnect. What happens to the systems we have delivered so far? 1)  Siri, NodeRed, Dashboard, AR, data logging and scheduler will of course continue to work. Siri will continue to work as a voice assistant because the communication is done via the Apple Cloud – for […]

Security and Privacy Review of Online Smart Home Assistants

Read the full article on LinkedIn: https://www.linkedin.com/post/edit/6661978072369123329/ Conclusion Home automation has been developed to simplify our daily lives. The use of Smart Home Personal Assistants allows us to enjoy an increased comfort level, and as an added bonus, save a large amount of energy when compared to traditional manual operation of appliances such as lights and heating. However as this review has highlighted, in the case of the majority of Smart Home Personal Assistants on the market today, hand-in-hand with this convenience, serious privacy issues are being brought into play. The ability of malicious actors to attack these systems in […]