Why we need Apple’s HomeKit-enabled routers

How secure are the connected smart devices you keep in your home and at work? How much protection have you put in place, and have you even taken a minute to change your default router password?
Computer says no
The truth is many smart home device users (and those running connected devices in smart offices, enterprises, manufacturing and beyond) may not yet have taken stock of their security.
This is a particular problem when it comes to older smart devices, many of which are still in use even though a large number of them shipped with weak or non-replaceable factory default passcodes.
The proliferation of poorly protected smart devices– in conjunction with weak router security – is a potential gold mine for hackers, who are eagerly attempting to crack into IoT networks in order to create botnets for future use.
That’s in addition to the inevitable threat that criminals will use poorly protected IoT devices as access points to penetrate networks, harvest personal and payment data, and more.
How HomeKit-approved routers will work
Apple’s promised HomeKit-enabled routers may improve protection.
One of the many iCloud enhancements Apple is attempting to bring to market in 2019, the routers are designed to protect your accessories with a firewall at router level. You can see some screen shots of how this works here, while this report explains a little more concerning how this protection works.
In use, you’ll be able to assign each of your HomeKit devices security permissions as follows:
- Restrict to Home: HomeKit-enabled devices will only be able to speak with each other, which means you won’t be able to access them at all from outside your network.
- Automatic: Accessories can connect to the home router/hub, accessories around the home and approved services on the web.
- No Restrictions.
You set this preference individually for each HomeKit device. Apple is also introducing a HomeKit Secure Video service, which adds layers of protection around CCTV video.
Why does this matter?
To help understand the scale of the threat – and why…
www.computerworld.com