Tempest Device Security Follow
Security and privacy are as important as functionality and usability. We take it seriously at every level: device-to-device, device-to-app, device-to-cloud, cloud-to-app. Our devices run a purpose-built, embedded operating system that doesn't have the weaknesses and potential attack points that a general-purpose OS has. There are no open ports or protocols and no way to "log in". Without that, there's no way to "hack into" them. Further, all network communication is initiated by our device. The only communication is to our servers. There is no way for a malicious user to hack our device because the only way for any software to get on it would be to update the firmware. And all firmware must be downloaded from our servers, using a secure channel. And the firmware is encrypted with a per-device key, which is validated before install on the local device, meaning that any firmware downloaded from a malicious source would be rejected by the device.
Comments
0 comments
Article is closed for comments.