Supposed to be integrated with Siri so would be really nice if it's workable. :)
--
You received this message because you are subscribed to the Google Groups "openhab" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openhab+u...@googlegroups.com.
To post to this group, send email to ope...@googlegroups.com.
Visit this group at http://groups.google.com/group/openhab.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to a topic in the Google Groups "openhab" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/openhab/VuRsZ5AkvmE/unsubscribe.
To unsubscribe from this group and all its topics, send an email to openhab+u...@googlegroups.com.
You received this message because you are subscribed to the Google Groups "openhab" group.
To unsubscribe from this group and stop receiving emails from it, send an email to openhab+u...@googlegroups.com.
So, we have end-to-end encryption between iOS and accessories so that it doesn't matter who's listening in the middle.
Nobody can intercept, inter, inject or understand the messages that are being sent back and forth between an accessory and iOS device.
The initial setup of the accessory is secured directly between the iOS device and the accessory.
So, we use a setup code that you will have to provide on your accessory.
It can be on packaging, it could be on the accessory, that could be randomly generated if you have an LCD.
It could be on a label or engraved on the accessory.
The user enters that setup code to perform the initial pairing of your accessory to HomeKit.
This ensures that we have a very strong basis for our cryptographic relationship between iOS and the accessory.
Our protocol also has perfect-forward secrecy.
If you are a security or encryption guru you know what this means, but I'll summarize quickly.
It means that the encryption key that we use for sending messages back and forth cannot be used to decrypt messages from any previous session or any future session.
So, every communication session has a unique encryption key.
To implement all of this, we use standard encryption algorithms because it's always best to have lots of scrutiny on the encryption that you're using.
So, we use these algorithms.
There's much more detail about how these algorithms are used in implementing HomeKit Accessory Protocol in our specifications, and if you do have questions about this, you can bring those questions to our lab on Thursday, the HomeKit Lab, and of course there's support available through the MFi program for you to get this security right."
[...]
Any update here?
--
You received this message because you are subscribed to a topic in the Google Groups "openhab" group.
To unsubscribe from this topic, visit https://groups.google.com/d/topic/openhab/VuRsZ5AkvmE/unsubscribe.
To unsubscribe from this group and all its topics, send an email to openhab+u...@googlegroups.com.
To post to this group, send email to ope...@googlegroups.com.
Visit this group at http://groups.google.com/group/openhab.
To view this discussion on the web visit https://groups.google.com/d/msgid/openhab/f42381b2-690c-41b5-8d2a-31053c3f9da4%40googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/openhab/22eca328-99ad-45f2-954a-19098cb9591c%40googlegroups.com.