Star Range Operating Manual copy

Security of Data

Wireless range If you are in your forties or older, you probably have had poor experiences with wireless. The simple wall button wireless switching in caravans uses older garage door opening technology and we have heard many stories of lights coming on unintentionally in a large caravan park; likely triggered by adjacent users. Plus early experiences with Bluetooth connectivity had very poor range. Wireless range performance has changed progressively. There is no “sudden moment” with an increase in wireless range. It just got better and better as the technology improved. Both the Bluetooth and WiFi is 100m line of sight. Our testing of wireless from 40m away reading and writing from sensors and switches inside a full enclosed Airstream aluminium caravan was faultless. Wireless Security I hope you like reading big numbers! For STAR Bluetooth devices, there are 340 undecillion (or approximately 3.4 x 10^38) possible unique Wireless UUIDs in Bluetooth. That is 2 to the 128 power = this number: 340,282,366,920,938,463,463,374,607,431,768,211,456 This ensures that UUIDs are uniquely assigned without risk of duplication. For STAR Controllers with IPV6 endpoints, the uniquely assigned endpoints are the same: So, there are 340 undecillion (approximately 3.4 x 10^38) possible IPv6 addresses. This vast number of addresses ensures that IPv6 can provide unique addresses for a nearly unlimited number of devices. When a switch is programmed, the STAR controller will ONLY accept a signal from the UUID of that switch after it is programmed. No other Bluetooth device will be read and used. Other Bluetooth signals are filtered out. Blockchain Security of STAR controllers with Matter The security of blockchain encryption has decentralization, immutability, and cryptographic guarantees which focus on privacy and secure communication for smart IOT devices. When we look out 3-5-10-20 years from now, security of data is paramount. It will become the number one requirement: Image or video security of data is required for privacy. It will be available with blockchain security from 2025. Traditional power systems with a single point of secure access will be too vulnerable and too “old School” The combination of blockchain encryption with the Matter protocol provides a highly secure, decentralized, and privacy-focused ecosystem for smart devices. This architecture offers a superior security model for IoT ecosystems, addressing many of the risks associated with centralized systems, such as single points of failure, data manipulation, and privacy violations.

8

WWW.SAFIERY.COM

Powered by