Local hub access via https and blocking of http access

Its important to have this conversation and to understand the issues and risks, Hubitat is relatively well positioned ( have run a pen test or two on mine ) and a little good proactive care at home like network segregation and a little monitoring is all you need to be assured for a regular home network + be careful about what external ( cloud) systems you leverage .... That said most users have no idea what a firewall is let alone network segmentation = believe there is a responsibility to maintain a strong and appropriate security position and yea there is always port 80 but again that can be very tightly controlled by the skilled and not so much by the general punter ...

2 Likes

It is amusing, the conversation gets heated when we discuss security... many see it as a negative when in reality and if done right it actually makes things way more straight forward ... am using several local systems that integrate cloud based security into the local systems and their management enjoys the flex of the cloud approach wile gaining the benefit of local and independent deployment and they are really very straightforward to interact with ( a little more straight forward than hubitat believe it or not )....

Now thereโ€™s a data driven question, is there a correlation between those in the security space and those who are interested in the world of home automation.

I have no hard data on that either, but I would guess YES.

2 Likes

Could be... and think there is a correlation between the tech or engineering types and automation and the security guys are in many cases one or both... .

1 Like

Is there data to prove it one way or the other - NO

There are many companies working on this exact data gathering problem. There is also government agencies that track how severe and prevalent attacks are, for example https://nvd.nist.gov/ is a good place to start.

There are literally 100s of organizations (some who have been around for a long while) working to measure how prevalent different kinds of attacks are, and using data to drive which security flaws are more important to prioritize over others.