Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

We are using industry standard encryption algorithms for all of our wireless traffic. We are also consulting with external security experts, in addition to the expertise we have in-house.

All of our over-the-air firmware updates are cryptographically signed.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: