<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Cybersecurity on Smart Home? Sure — But Secure!</title>
        <link>https://smarthome-aber-sicher.de/en/categories/cybersecurity/</link>
        <description>Recent content in Cybersecurity on Smart Home? Sure — But Secure!</description>
        <generator>Hugo -- gohugo.io</generator>
        <language>en</language>
        <lastBuildDate>Sun, 01 Mar 2026 00:00:00 +0100</lastBuildDate><atom:link href="https://smarthome-aber-sicher.de/en/categories/cybersecurity/index.xml" rel="self" type="application/rss+xml" /><item>
        <title>DJI robot vacuum hacked: 7,000 strangers&#39; living rooms via a master key</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2026/03/01/dji-robot-vacuum-hacked-7000-strangers-living-rooms-via-a-master-key/</link>
        <pubDate>Sun, 01 Mar 2026 00:00:00 +0100</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2026/03/01/dji-robot-vacuum-hacked-7000-strangers-living-rooms-via-a-master-key/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2026/03/01/dji-saugroboter-gehackt-7000-fremde-wohnzimmer-per-generalschl%C3%BCssel/cover.jpeg" alt="Featured image of post DJI robot vacuum hacked: 7,000 strangers&#39; living rooms via a master key" /&gt;&lt;p&gt;A few days ago a press release turned up in my feed. I skim a lot of them every day – most I just scroll past. Not this one.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;DJI. Robot vacuum. 7,000 strangers&amp;rsquo; living rooms. A master key.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;I read the article twice. And then I knew immediately: a follow-up video was needed.&lt;/p&gt;
&lt;h2 id=&#34;the-pattern-that-keeps-repeating&#34;&gt;The pattern that keeps repeating
&lt;/h2&gt;&lt;p&gt;If you&amp;rsquo;ve read my &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/sas/saugroboter&#34; &gt;robot vacuum article&lt;/a&gt;, you might be nodding right now. Back then it was Ecovacs. Hacked robots remotely controlled in real time, chasing pets and shouting slurs through their speakers. I tried to explain back then why that wasn&amp;rsquo;t an absurd one-off incident, but a structural problem with this entire product category.&lt;/p&gt;
&lt;p&gt;And now it&amp;rsquo;s happened again. Different manufacturer. Same category. Same fundamental vulnerability in principle.&lt;/p&gt;
&lt;p&gt;This bothers me – not because I want to vilify robot vacuums, but because I believe most people who buy one simply don&amp;rsquo;t know what&amp;rsquo;s actually happening with their data. With the &lt;strong&gt;floor plan of their home&lt;/strong&gt;. With &lt;strong&gt;camera footage&lt;/strong&gt;, if the model has one. With the question of who, besides themselves, could theoretically access all of that.&lt;/p&gt;
&lt;h2 id=&#34;what-happened-this-time&#34;&gt;What happened this time
&lt;/h2&gt;&lt;p&gt;It started innocuously. A French developer, a brand-new &lt;strong&gt;DJI robot vacuum&lt;/strong&gt;, a free evening. The idea: control the robot around the apartment with a &lt;strong&gt;PS5 controller&lt;/strong&gt;. Mario Kart in real life, but with dust bunnies.&lt;/p&gt;
&lt;p&gt;To connect the controller, he needed the key from the app – nothing illegal, it was his own device. But when he used that key with the &lt;strong&gt;DJI server&lt;/strong&gt;, the server didn&amp;rsquo;t just download his own data – it downloaded data from thousands of others. &lt;strong&gt;Over 7,000 robots across 24 countries.&lt;/strong&gt; Battery levels, home floor plans, live camera feeds from strangers&amp;rsquo; living rooms. The key wasn&amp;rsquo;t a normal key. It was a &lt;strong&gt;master key for the entire system.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;DJI patched the vulnerability after it was reported. That&amp;rsquo;s good. But it doesn&amp;rsquo;t change the underlying picture.&lt;/p&gt;
&lt;h2 id=&#34;why-i-keep-talking-about-this&#34;&gt;Why I keep talking about this
&lt;/h2&gt;&lt;p&gt;After making this video I naturally asked myself whether I&amp;rsquo;m starting to get repetitive. Robot vacuums again. Privacy again. Same topic again.&lt;/p&gt;
&lt;p&gt;But then I look at the comments under the old video. And I see how many people write that they simply hadn&amp;rsquo;t known how the technology behind it works. Not because they weren&amp;rsquo;t interested. But because hardly anyone explains it without immediately descending into panic or buzzwords.&lt;/p&gt;
&lt;p&gt;That&amp;rsquo;s exactly what I want to do differently. No moralising, no fearmongering. Just: here are the facts. Here&amp;rsquo;s what they mean. And here are three concrete things you can do – if you want to. What you do with a &lt;strong&gt;camera-equipped robot vacuum&lt;/strong&gt; in your home is your decision. I just want that decision to be an informed one.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/gQ7-loIWzzY&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;p&gt;If you already have a view on this – or you have a &lt;strong&gt;robot vacuum&lt;/strong&gt; at home and feel a quiet unease stirring – write it in the comments. I genuinely appreciate every perspective. And yes, every comment helps the video reach more people who are asking themselves exactly these questions for the first time.&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.heise.de/news/Sicherheitsluecke-bei-Saugrobotern-Tueftler-erhaelt-Zugriff-auf-tausende-Geraete-11179726.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Heise: Security vulnerability in robot vacuums – developer gains access to thousands of devices&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.golem.de/news/sicherheitsluecke-dji-saugroboter-gab-zugriff-auf-tausende-fremde-geraete-2502-195000.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Golem: Security vulnerability – DJI robot vacuum gave access to thousands of foreign devices&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
</description>
        </item>
        <item>
        <title>ESPHome After the Security Vulnerability: Irresponsible or Still Acceptable?</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/10/05/esphome-after-the-security-vulnerability-irresponsible-or-still-acceptable/</link>
        <pubDate>Sun, 05 Oct 2025 00:00:00 +0200</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/10/05/esphome-after-the-security-vulnerability-irresponsible-or-still-acceptable/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/10/05/esphome-nach-der-sicherheitsl%C3%BCcke-unverantwortlich-oder-noch-vertretbar/cover.png" alt="Featured image of post ESPHome After the Security Vulnerability: Irresponsible or Still Acceptable?" /&gt;&lt;p&gt;&amp;ldquo;Is it irresponsible to use ESPHome?&amp;rdquo; That was the question I posed after my last video about the critical ESPHome security vulnerability. The reactions were fascinating — and often sharply divided.&lt;/p&gt;
&lt;p&gt;Comments ranged from harshly critical to completely relaxed: from &amp;ldquo;There&amp;rsquo;s a lot more going wrong here — ESPHome developers have apparently never heard of HTTPS or password hashing&amp;rdquo; to &amp;ldquo;And what would be the reward for this extraordinary hacking effort? Turning on the light in my garage? 🤣&amp;rdquo;&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/gmeI5f-AnR0&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;p&gt;Who&amp;rsquo;s right? A balanced look at the community discussion and practical recommendations for ESPHome users.&lt;/p&gt;
&lt;h2 id=&#34;the-criticism-of-esphome-justified-or-overblown&#34;&gt;The Criticism of ESPHome: Justified or Overblown?
&lt;/h2&gt;&lt;h3 id=&#34;structural-security-problems&#34;&gt;Structural Security Problems
&lt;/h3&gt;&lt;p&gt;Many comments highlighted fundamental security issues in ESPHome, and this criticism is hard to dismiss:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Multiple authentication bugs over the years&lt;/strong&gt; — not exactly confidence-inspiring&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Lack of HTTPS support&lt;/strong&gt; and weak password hashing, both of which are long-established industry standards&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firmware upload via the web server&lt;/strong&gt; — possible regardless of password protection&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The frustration of many users is entirely understandable. HTTPS ensures that nobody on the local network can intercept HTTP traffic. Password hashing stores credentials not in plain text but as a cryptographic checksum. Both have been established security standards for years.&lt;/p&gt;
&lt;p&gt;As I explain in the video, ESPHome shows clear weaknesses here.&lt;/p&gt;
&lt;h3 id=&#34;open-source-curse-or-blessing&#34;&gt;Open Source: Curse or Blessing?
&lt;/h3&gt;&lt;p&gt;ESPHome illustrates a classic open-source dilemma: &lt;strong&gt;security is often not the top priority&lt;/strong&gt;. Developers typically focus on features and functionality — security considerations come later, if at all.&lt;/p&gt;
&lt;p&gt;At the same time, it&amp;rsquo;s a &lt;strong&gt;sign of a healthy, active community&lt;/strong&gt; when vulnerabilities are found and reported. The sheer number of disclosed issues says little about a project&amp;rsquo;s actual security posture. Other projects may contain just as many vulnerabilities — they just haven&amp;rsquo;t been discovered or made public yet.&lt;/p&gt;
&lt;p&gt;In the video I dig into this dilemma in detail and explain why the assessment isn&amp;rsquo;t straightforward.&lt;/p&gt;
&lt;h3 id=&#34;the-web-server-problem&#34;&gt;The Web Server Problem
&lt;/h3&gt;&lt;p&gt;One pattern stands out with ESPHome: &lt;strong&gt;most vulnerabilities affect the built-in web server&lt;/strong&gt;. This leads to a simple recommendation: only enable the web server if you actually need it.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Practical tip:&lt;/strong&gt; If you&amp;rsquo;re using ESPHome nodes with Home Assistant, the web server is generally not necessary. Communication runs directly through the ESPHome API. And these devices should never be exposed to the internet anyway — so absolutely no port forwarding for ESPHome nodes!&lt;/p&gt;
&lt;h2 id=&#34;my-home-network-is-secure--a-false-sense-of-safety&#34;&gt;&amp;ldquo;My Home Network Is Secure&amp;rdquo; — A False Sense of Safety
&lt;/h2&gt;&lt;h3 id=&#34;the-lan-illusion&#34;&gt;The LAN Illusion
&lt;/h3&gt;&lt;p&gt;A common argument goes: &amp;ldquo;The attacker would first have to get into my LAN — my local home network — so it&amp;rsquo;s fine.&amp;rdquo; Some people even dismiss the threat with quips like &amp;ldquo;Sure, someone might turn on my garage light.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;But that&amp;rsquo;s exactly where false security sets in.&lt;/strong&gt; Modern attack vectors make it surprisingly easy for attackers to get into home networks:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Infected IoT devices&lt;/strong&gt; as an entry point&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;XSS attacks in the browser&lt;/strong&gt; enabling remote access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Insecure router configurations&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Compromised smartphones or laptops&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In the video I show concrete examples of how quickly this supposed safety net becomes a trap.&lt;/p&gt;
&lt;h3 id=&#34;cross-site-scripting-explained&#34;&gt;Cross-Site Scripting Explained
&lt;/h3&gt;&lt;p&gt;XSS, or Cross-Site Scripting, works like this: an attacker builds a manipulated web page that executes foreign code in your browser. You notice nothing, but in the background the attacker can steal data or execute commands — almost as if they were directly inside your home network.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Example:&lt;/strong&gt; You click on what looks like a harmless link. In the background, a hidden JavaScript function sends requests to your ESPHome devices. Just like that — garage door open, heating off, lights on.&lt;/p&gt;
&lt;h2 id=&#34;network-architecture-theory-vs-practice&#34;&gt;Network Architecture: Theory vs. Practice
&lt;/h2&gt;&lt;h3 id=&#34;the-vlan-discussion&#34;&gt;The VLAN Discussion
&lt;/h3&gt;&lt;p&gt;One of the most interesting aspects of the community debate: &lt;strong&gt;network segmentation&lt;/strong&gt;. The theory is clear: IoT devices belong in separate networks, ideally VLANs — virtual networks that isolate devices from one another.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;This is definitely best practice.&lt;/strong&gt; But many users point out: &amp;ldquo;In reality, hardly anyone does this in private networks because it&amp;rsquo;s too complicated.&amp;rdquo; On top of that, true VLAN separation is often impossible with standard consumer hardware.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;That&amp;rsquo;s exactly the crux: theory versus practice.&lt;/strong&gt; I explore this discussion from the comments thoroughly in the video.&lt;/p&gt;
&lt;h3 id=&#34;practical-alternatives&#34;&gt;Practical Alternatives
&lt;/h3&gt;&lt;p&gt;When full network segmentation is too complex, there are practical alternatives:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Guest Wi-Fi for IoT devices&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Firewall rules&lt;/strong&gt; for IoT traffic&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Dedicated IoT routers&lt;/strong&gt; as a separate network layer&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Unifi, OPNsense, or pfSense&lt;/strong&gt; for advanced network features&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The effort should match the threat level — not everyone needs enterprise-level segmentation for their smart home.&lt;/p&gt;
&lt;h2 id=&#34;an-ota-password-alone-is-not-enough&#34;&gt;An OTA Password Alone Is Not Enough
&lt;/h2&gt;&lt;h3 id=&#34;a-false-sense-of-security&#34;&gt;A False Sense of Security
&lt;/h3&gt;&lt;p&gt;A common misconception: &amp;ldquo;I&amp;rsquo;ve set an OTA password, so I&amp;rsquo;m safe.&amp;rdquo; OTA stands for &amp;ldquo;Over-the-Air&amp;rdquo; — firmware updates delivered over the network.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unfortunately, no&lt;/strong&gt; — for the critical ESPHome vulnerability, the OTA password provided no protection whatsoever. The flaw wasn&amp;rsquo;t in the OTA module but in the web server module, which also offered firmware upload functionality.&lt;/p&gt;
&lt;p&gt;I explain in the video, with a practical demonstration, exactly why the OTA password was ineffective in this case.&lt;/p&gt;
&lt;h3 id=&#34;the-swiss-cheese-model&#34;&gt;The Swiss Cheese Model
&lt;/h3&gt;&lt;p&gt;In the end, the takeaway is this: &lt;strong&gt;apply updates promptly and combine multiple layers of protection&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;The Swiss Cheese Model describes this principle well: each individual security layer has holes, but stacked together they form effective protection.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Example layers of protection:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Router firewall&lt;/strong&gt; blocks external access&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Network segmentation&lt;/strong&gt; isolates IoT devices&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Strong passwords&lt;/strong&gt; defend against brute-force attacks&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Timely updates&lt;/strong&gt; close known vulnerabilities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Disabling the web server&lt;/strong&gt; reduces the attack surface&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;two-security-mindsets-paranoia-vs-pragmatism&#34;&gt;Two Security Mindsets: Paranoia vs. Pragmatism
&lt;/h2&gt;&lt;h3 id=&#34;the-two-camps&#34;&gt;The Two Camps
&lt;/h3&gt;&lt;p&gt;The comments reveal two clearly defined camps:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Team Security:&lt;/strong&gt; &amp;ldquo;You have to patch everything, segment everything, harden everything&amp;rdquo;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Team Pragmatism:&lt;/strong&gt; &amp;ldquo;The risk is too small — I don&amp;rsquo;t want to live my life in paranoia&amp;rdquo;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Both perspectives are understandable, but &lt;strong&gt;in IT security, gut feeling is rarely a reliable guide&lt;/strong&gt;. In the video I address both mindsets and explain why a fact-based assessment matters.&lt;/p&gt;
&lt;h3 id=&#34;the-facts-cvss-81&#34;&gt;The Facts: CVSS 8.1
&lt;/h3&gt;&lt;p&gt;The ESPHome vulnerability was rated &lt;strong&gt;8.1 under CVSS, classified as &amp;ldquo;High&amp;rdquo;&lt;/strong&gt;. CVSS is the standard scoring system for security vulnerabilities, ranging from 0 to 10, and 8.1 is firmly in the critical range.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;For reference:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;0–3.9:&lt;/strong&gt; Low (minor risk)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;4.0–6.9:&lt;/strong&gt; Medium (moderate risk)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;7.0–8.9:&lt;/strong&gt; High (high risk)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;9.0–10.0:&lt;/strong&gt; Critical (critical risk)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;At 8.1, this is a vulnerability you definitely should not ignore.&lt;/p&gt;
&lt;p&gt;A detailed breakdown of the CVSS score and what it means for ESPHome users is in the video.&lt;/p&gt;
&lt;h2 id=&#34;practical-recommendations-for-esphome-users&#34;&gt;Practical Recommendations for ESPHome Users
&lt;/h2&gt;&lt;h3 id=&#34;immediate-actions&#34;&gt;Immediate Actions
&lt;/h3&gt;&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Update ESPHome to the latest version&lt;/strong&gt; (&amp;gt;= 2024.6.2)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Enable the web server only when necessary&lt;/strong&gt; — not needed for Home Assistant integration&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Never expose ESPHome nodes to the internet&lt;/strong&gt; — no port forwarding!&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use strong, unique passwords&lt;/strong&gt; for OTA updates&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id=&#34;advanced-security-measures&#34;&gt;Advanced Security Measures
&lt;/h3&gt;&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Implement network segmentation&lt;/strong&gt; wherever possible&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use a VPN for remote access&lt;/strong&gt; instead of direct internet exposure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Keep all IoT devices updated&lt;/strong&gt; regularly&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Monitor network traffic&lt;/strong&gt; for suspicious activity&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 id=&#34;long-term-considerations&#34;&gt;Long-Term Considerations
&lt;/h3&gt;&lt;p&gt;&lt;strong&gt;Abandon ESPHome entirely?&lt;/strong&gt; That seems excessive to me. The platform offers enormous value for DIY smart home projects. With the right precautions, the risk can be reduced to an acceptable level.&lt;/p&gt;
&lt;p&gt;In the video I explain in detail why I still recommend ESPHome despite its security issues — but only under certain conditions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alternatives:&lt;/strong&gt; Tasmota, the Arduino framework directly, or commercial IoT devices. But these all come with their own security problems — perfect security doesn&amp;rsquo;t exist anywhere.&lt;/p&gt;
&lt;h2 id=&#34;conclusion-security-is-never-black-and-white&#34;&gt;Conclusion: Security Is Never Black and White
&lt;/h2&gt;&lt;p&gt;The community discussion makes one thing clear: &lt;strong&gt;security is never black and white&lt;/strong&gt;. There are best practices, but in practice you have to decide how much effort to invest for how much risk reduction.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;My personal take:&lt;/strong&gt; If an update is available, why wouldn&amp;rsquo;t you apply it? It&amp;rsquo;s the easiest way to add one more security layer.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The golden rule:&lt;/strong&gt; Stay informed, understand the threats, respond appropriately — but don&amp;rsquo;t tip into paranoia.&lt;/p&gt;
&lt;p&gt;Using ESPHome after the security vulnerability is not irresponsible, as long as you take the right precautions. The project does have security issues, but with a mindful approach it remains a valuable option for DIY smart home enthusiasts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The complete analysis of the community reactions and all practical tips for using ESPHome securely are in the video above.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;→ The specific vulnerability this article refers to is covered in a separate video with a live demonstration: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/post/esphome-cve-2025/&#34; &gt;ESPHome Security Vulnerability: Critical CVE Affects All ESP32 Devices&lt;/a&gt;&lt;/p&gt;





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
</description>
        </item>
        <item>
        <title>ESPHome Security Vulnerability: Critical CVE Affects All ESP32 Devices – Live Hack Demonstrates the Problem</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/09/14/esphome-security-vulnerability-critical-cve-affects-all-esp32-devices-live-hack-demonstrates-the-problem/</link>
        <pubDate>Sun, 14 Sep 2025 00:00:00 +0200</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/09/14/esphome-security-vulnerability-critical-cve-affects-all-esp32-devices-live-hack-demonstrates-the-problem/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/09/14/esphome-sicherheitsl%C3%BCcke-kritische-cve-betrifft-alle-esp32-ger%C3%A4te-live-hack-zeigt-das-problem/cover.png" alt="Featured image of post ESPHome Security Vulnerability: Critical CVE Affects All ESP32 Devices – Live Hack Demonstrates the Problem" /&gt;&lt;p&gt;A recently discovered security vulnerability in ESPHome 2025.8.0 affects ESP32 devices using the IDF Framework. The flaw allows attackers to bypass the built-in Basic Auth authentication and perform over-the-air updates without valid credentials.&lt;/p&gt;
&lt;p&gt;This means: even if you have properly protected your ESPHome devices with a username and password, attackers can under certain circumstances still push firmware updates and gain control of the device.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/VN9EI7uMSdE&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;h2 id=&#34;practical-demonstration-of-the-security-vulnerability&#34;&gt;Practical Demonstration of the Security Vulnerability
&lt;/h2&gt;&lt;h3 id=&#34;esphome-as-a-popular-diy-solution&#34;&gt;ESPHome as a Popular DIY Solution
&lt;/h3&gt;&lt;p&gt;ESPHome has established itself as one of the most popular solutions for DIY smart home projects. Its simple integration of ESP32 and ESP8266 controllers into the smart home makes it a widely used tool in the community.&lt;/p&gt;
&lt;p&gt;However, the recently discovered security vulnerability shows that even established software can have unexpected weaknesses. In the video, I demonstrate the practical exploitation of this flaw on a test device.&lt;/p&gt;
&lt;h3 id=&#34;live-demonstration-of-the-vulnerability&#34;&gt;Live Demonstration of the Vulnerability
&lt;/h3&gt;&lt;p&gt;In the video, I perform a controlled test in which I bypass the authentication of an ESP32 device. I use command-line tools to send an HTTP request with an empty Authorization header.&lt;/p&gt;
&lt;p&gt;The result: the ESP32 device accepts the firmware update even though no valid credentials were transmitted. The web server responds with &amp;ldquo;Update successful,&amp;rdquo; confirming that Basic Auth authentication is not working correctly in this version.&lt;/p&gt;
&lt;h2 id=&#34;who-is-affected-the-technical-details&#34;&gt;Who Is Affected? The Technical Details
&lt;/h2&gt;&lt;h3 id=&#34;esphome-version-202580-in-focus&#34;&gt;ESPHome Version 2025.8.0 in Focus
&lt;/h3&gt;&lt;p&gt;The security vulnerability primarily affects ESPHome version 2025.8.0, though the official vulnerability description also mentions &amp;ldquo;possibly older versions.&amp;rdquo; Particularly critical: the flaw exclusively affects ESP32 devices using the IDF Framework.&lt;/p&gt;
&lt;p&gt;In the video, I explain exactly why this combination is problematic and how to find out whether your devices are affected.&lt;/p&gt;
&lt;h3 id=&#34;esp32-vs-esp8266-an-important-distinction&#34;&gt;ESP32 vs ESP8266: An Important Distinction
&lt;/h3&gt;&lt;p&gt;There is some good news: ESP8266 controllers are NOT affected by this vulnerability. If you exclusively use ESP8266-based devices, you can breathe a little easier for now.&lt;/p&gt;
&lt;p&gt;That said, caution is warranted: most modern ESPHome projects use ESP32 controllers, since they are significantly more powerful and offer more features. These popular controllers are the ones affected by the flaw.&lt;/p&gt;
&lt;h2 id=&#34;the-attack-in-detail-how-the-hack-works&#34;&gt;The Attack in Detail: How the Hack Works
&lt;/h2&gt;&lt;h3 id=&#34;the-authorization-header-as-the-entry-point&#34;&gt;The Authorization Header as the Entry Point
&lt;/h3&gt;&lt;p&gt;What you see in the video is the practical exploitation of a vulnerability in HTTP Basic Authentication. Normally, attackers need to transmit valid credentials in the Authorization header. The security vulnerability, however, allows this protection to be bypassed with an empty header.&lt;/p&gt;
&lt;p&gt;The hack works via the &lt;code&gt;/update&lt;/code&gt; endpoint, which is normally used for over-the-air updates. An attacker can submit manipulated firmware to this endpoint and have it installed without authentication.&lt;/p&gt;
&lt;h3 id=&#34;potential-impact-of-the-vulnerability&#34;&gt;Potential Impact of the Vulnerability
&lt;/h3&gt;&lt;p&gt;Since the security vulnerability allows arbitrary firmware to be flashed, various attack scenarios are conceivable. An attacker could theoretically:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Capture and exfiltrate sensor data&lt;/li&gt;
&lt;li&gt;Use the device for further network scanning&lt;/li&gt;
&lt;li&gt;Preserve the original functionality to remain undetected&lt;/li&gt;
&lt;li&gt;Make modifications to the firmware&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The practical impact depends heavily on the individual network configuration and the security measures already in place.&lt;/p&gt;
&lt;h2 id=&#34;immediate-protective-measures-what-you-need-to-do-now&#34;&gt;Immediate Protective Measures: What You Need to Do NOW
&lt;/h2&gt;&lt;h3 id=&#34;step-1-update-esphome&#34;&gt;Step 1: Update ESPHome
&lt;/h3&gt;&lt;p&gt;The most important step: update your ESPHome installation to version 2025.8.1 or newer immediately. These versions contain the fix for the critical security vulnerability.&lt;/p&gt;
&lt;p&gt;In the video, I show you exactly where to find the current version and how to perform the update.&lt;/p&gt;
&lt;h3 id=&#34;step-2-reflash-all-esp32-devices&#34;&gt;Step 2: Reflash All ESP32 Devices
&lt;/h3&gt;&lt;p&gt;Even more important: you must reflash all your ESP32 devices with the updated ESPHome version. Updating the ESPHome software alone is not enough – the firmware on the devices themselves must be updated.&lt;/p&gt;
&lt;p&gt;The easiest way to do this is via the &amp;ldquo;Update&amp;rdquo; button in the ESPHome management interface. In the video, you can see the complete process and learn what to watch out for.&lt;/p&gt;
&lt;h3 id=&#34;step-3-when-in-doubt-update&#34;&gt;Step 3: When in Doubt, Update
&lt;/h3&gt;&lt;p&gt;If you are unsure whether your devices are affected: an update never hurts. It is better to update one time too many than to have a compromised device on your network.&lt;/p&gt;
&lt;h2 id=&#34;assessing-the-security-vulnerability&#34;&gt;Assessing the Security Vulnerability
&lt;/h2&gt;&lt;h3 id=&#34;trust-in-authentication-mechanisms&#34;&gt;Trust in Authentication Mechanisms
&lt;/h3&gt;&lt;p&gt;ESPHome users typically rely on the built-in Basic Auth authentication to protect their devices. This security vulnerability shows that even well-established authentication mechanisms can contain bugs.&lt;/p&gt;
&lt;p&gt;Many users run their ESP32 devices for extended periods without regular updates, since they are considered stable and reliable. However, this approach can become problematic when newly discovered security vulnerabilities emerge.&lt;/p&gt;
&lt;h3 id=&#34;security-on-the-home-network&#34;&gt;Security on the Home Network
&lt;/h3&gt;&lt;p&gt;A common assumption is that devices on the internal network are automatically protected. This vulnerability makes clear, however, that attackers with network access – for example via compromised devices or a guest Wi-Fi network – can exploit security flaws too.&lt;/p&gt;
&lt;p&gt;In the video, I discuss the importance of regular updates even for internally operated devices.&lt;/p&gt;
&lt;h2 id=&#34;lessons-from-the-security-vulnerability&#34;&gt;Lessons from the Security Vulnerability
&lt;/h2&gt;&lt;h3 id=&#34;updates-are-not-optional&#34;&gt;Updates Are Not Optional
&lt;/h3&gt;&lt;p&gt;This vulnerability underscores once again: regular updates are not a tiresome chore, but critical to the security of your smart home. Even well-established software like ESPHome can suddenly develop critical flaws.&lt;/p&gt;
&lt;h3 id=&#34;defense-in-depth&#34;&gt;Defense in Depth
&lt;/h3&gt;&lt;p&gt;A single layer of protection – no matter how well implemented – is not enough. The ESPHome vulnerability shows that even authentication can fail. Additional layers of protection such as network segmentation or VPN access can make the difference when it matters.&lt;/p&gt;
&lt;h2 id=&#34;what-you-will-learn-in-the-video&#34;&gt;What You Will Learn in the Video
&lt;/h2&gt;&lt;p&gt;The video offers far more than just theoretical knowledge. You will see:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Live hack demonstration&lt;/strong&gt; – understand the threat through a practical walkthrough&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Step-by-step update guide&lt;/strong&gt; – learn how to update your devices correctly&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Technical background&lt;/strong&gt; – understand why this vulnerability is so dangerous&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Preventive security measures&lt;/strong&gt; – protect yourself against future threats&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Community discussion&lt;/strong&gt; – find out how others are dealing with the problem&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The practical demonstration in the video illustrates how the vulnerability works and shows concretely how the authentication can be bypassed. This helps in understanding the technical details and assessing the risk for your own installation.&lt;/p&gt;
&lt;h2 id=&#34;your-role-in-smart-home-security&#34;&gt;Your Role in Smart Home Security
&lt;/h2&gt;&lt;h3 id=&#34;community-responsibility&#34;&gt;Community Responsibility
&lt;/h3&gt;&lt;p&gt;Security vulnerabilities like this affect not only you personally, but the entire smart home community. Share your knowledge, inform other users, and make sure this important information reaches the people affected.&lt;/p&gt;
&lt;h3 id=&#34;a-proactive-security-stance&#34;&gt;A Proactive Security Stance
&lt;/h3&gt;&lt;p&gt;Use this security vulnerability as an opportunity to rethink your overall smart home security. Which other devices have not received updates in a long time? Which systems rely too heavily on a single layer of protection?&lt;/p&gt;
&lt;h2 id=&#34;conclusion-security-requires-continuous-attention&#34;&gt;Conclusion: Security Requires Continuous Attention
&lt;/h2&gt;&lt;p&gt;The ESPHome security vulnerability underscores the importance of regular updates even for established software. It shows that even proven solutions can have unexpected weaknesses.&lt;/p&gt;
&lt;p&gt;The video demonstrates the practical exploitation of the vulnerability and explains the necessary protective measures – from immediate updates to preventive security strategies.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/VN9EI7uMSdE&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;p&gt;→ In a follow-up article, I analyzed the community&amp;rsquo;s reaction to this vulnerability and address the question of whether ESPHome is still justifiable: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/post/esphome-unsicher/&#34; &gt;ESPHome After the Security Vulnerability: Irresponsible or Still Worth It?&lt;/a&gt;&lt;/p&gt;





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
</description>
        </item>
        <item>
        <title>The Perfect Home Assistant Password</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/07/13/the-perfect-home-assistant-password/</link>
        <pubDate>Sun, 13 Jul 2025 00:00:00 +0200</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/07/13/the-perfect-home-assistant-password/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/07/13/das-perfekte-home-assistant-passwort/cover.png" alt="Featured image of post The Perfect Home Assistant Password" /&gt;&lt;p&gt;Imagine it&amp;rsquo;s the middle of the night and suddenly your smart speaker blasts music at full volume. The lights are flashing like crazy, and your heating turns itself up to maximum. At first you think it&amp;rsquo;s a technical glitch — but then you realize: someone else has taken control of your smart home!&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/5MI_iz7xRkw&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;p&gt;What sounds like a horror scenario isn&amp;rsquo;t actually that far-fetched. Users in the Home Assistant forum have shared their experiences:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://community.home-assistant.io/t/i-have-been-hacked/53723&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;A user reported in 2018&lt;/a&gt; that their system was controlling lights without authorization — they had Home Assistant running with an open HTTP port and no password&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://community.home-assistant.io/t/i-shut-down-my-ha-after-many-intrusion-attempts-only-to-ha/837817&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Another case from January 2025&lt;/a&gt;: Immediate and massive login attacks right after opening the default port 8123&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;The alarming reality:&lt;/strong&gt; According to recent studies, &lt;strong&gt;over 80% of all successful cyberattacks are attributed to weak or reused passwords&lt;/strong&gt; (source: &lt;a class=&#34;link&#34; href=&#34;https://www.weforum.org/stories/2023/05/cybersecurity-passwords-boomers-genz&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;World Economic Forum/LastPass, 2023&lt;/a&gt;). Using services like Shodan, attackers find open smart home instances within seconds. The result: someone connects to your Home Assistant installation and — at best — just plays a prank like this.&lt;/p&gt;
&lt;p&gt;That&amp;rsquo;s why a strong password for Home Assistant is absolutely critical. Unfortunately, many people still use trivial passwords that are easy to remember but just as easy to guess. And here&amp;rsquo;s what makes Home Assistant special: &lt;strong&gt;there is no built-in password policy&lt;/strong&gt;. No requirements for how long or complex your password must be.&lt;/p&gt;
&lt;p&gt;A serious mistake? On the contrary! I&amp;rsquo;ll explain why this is actually a good thing — and why the perfect Home Assistant password isn&amp;rsquo;t the same for everyone.&lt;/p&gt;
&lt;h2 id=&#34;what-makes-a-good-password&#34;&gt;What Makes a Good Password?
&lt;/h2&gt;&lt;p&gt;You&amp;rsquo;ve probably rolled your eyes more than once when a site demanded &amp;ldquo;at least 8 characters, one uppercase letter, one number, and a special character.&amp;rdquo; Many people assume a password is automatically secure just because it looks complicated — but that&amp;rsquo;s not quite right. What really matters is &lt;strong&gt;entropy&lt;/strong&gt; — how unpredictable and extensive the character combination is. And the rule here is: &lt;strong&gt;length beats complexity&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A long password with 20 characters is generally far more secure than a short one with 8, even if the shorter one contains every possible special character. Why? Because each additional character exponentially increases the number of possible combinations — and that&amp;rsquo;s worth more than a wide variety of character types.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A practical example:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;code&gt;Home123!&lt;/code&gt; dutifully meets all complexity rules and looks &amp;ldquo;secure&amp;rdquo; at first glance&lt;/li&gt;
&lt;li&gt;In reality, many people follow exactly this pattern — a word with a capital letter, the number sequence 123, and an exclamation mark at the end&lt;/li&gt;
&lt;li&gt;Passwords like this can be cracked very quickly or guessed through dictionary attacks&lt;/li&gt;
&lt;li&gt;&lt;code&gt;myhomeassistantisawesome&lt;/code&gt; would take years to crack, even though it uses only lowercase letters&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;➡️ &lt;strong&gt;Test it yourself:&lt;/strong&gt; &lt;a class=&#34;link&#34; href=&#34;https://howseecureismypassword.net&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;howseecureismypassword.net&lt;/a&gt;&lt;/p&gt;
&lt;h3 id=&#34;sources&#34;&gt;Sources:
&lt;/h3&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63b.pdf&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;NIST SP 800‑63B (PDF)&lt;/a&gt; – See Section 5.1.1.2: No more mandatory regular password changes + focus on length over complexity.&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.ncsc.gov.uk/blog-post/problems-forcing-regular-password-expiry&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;NCSC: Problems forcing regular password expiry&lt;/a&gt; – Warns against cyclic password changes as they lead to predictable patterns.&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.theguardian.com/commentisfree/2024/oct/09/charade-change-passwords-cyberattacks&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;The Guardian: Rejoice! The charade of having to change our passwords every few months is coming to an end&lt;/a&gt; – Reports on NIST &amp;amp; NCSC guidelines against frequent password changes and in favor of passphrases.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 id=&#34;the-problem-with-password-policies&#34;&gt;The Problem with Password Policies
&lt;/h3&gt;&lt;p&gt;Those seemingly &amp;ldquo;complicated&amp;rdquo; passwords can actually end up being insecure because they follow predictable patterns. Strict password policies often mislead users and tempt them into reusing passwords. Be honest: when you had to fight your way through an annoying password policy, didn&amp;rsquo;t you just reach for your standard password that ticks all the boxes?&lt;/p&gt;
&lt;p&gt;You&amp;rsquo;re not alone — the numbers are alarmingly clear:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;89% know that password reuse is risky, but only 12% use a unique password for every account&lt;/strong&gt; (source: &lt;a class=&#34;link&#34; href=&#34;https://spacelift.io/blog/password-statistics&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Spacelift, 2025&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;62% of US users report frequently or always reusing passwords&lt;/strong&gt; (source: &lt;a class=&#34;link&#34; href=&#34;https://nordpass.com/blog/stop-reusing-passwords&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;NordPass, April 2025&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Especially striking for Gen Z: 72% reuse passwords even though 79% know the risk&lt;/strong&gt; (source: &lt;a class=&#34;link&#34; href=&#34;https://bitwarden.com/resources/world-password-day&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Bitwarden World Password Day, 2025&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Even after data breaches, 59% of Gen Z recycle their passwords&lt;/strong&gt; (source: &lt;a class=&#34;link&#34; href=&#34;https://www.helpnetsecurity.com/2025/05/02/passwords-update-security-risks&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;HelpNetSecurity, May 2025&lt;/a&gt;)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This is a genuine &lt;strong&gt;internal conflict&lt;/strong&gt;: we know what&amp;rsquo;s right, but act differently out of convenience or habit. Experts call this a cognitive dissonance between knowledge and behavior.&lt;/p&gt;
&lt;h3 id=&#34;the-better-alternative-passphrases&#34;&gt;The Better Alternative: Passphrases
&lt;/h3&gt;&lt;p&gt;Current recommendations are clear: &lt;strong&gt;forget complexity requirements — what counts is length and uniqueness&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In plain terms: use a long passphrase you can actually remember, rather than cryptic eight-character gibberish. You may know the famous &lt;a class=&#34;link&#34; href=&#34;https://xkcd.com/936/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;xkcd comic&lt;/a&gt; on this — four simple words like &amp;ldquo;correct horse battery staple&amp;rdquo; together form a nearly uncrackable password that you can still remember fairly easily.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What matters:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Length&lt;/li&gt;
&lt;li&gt;Randomness&lt;/li&gt;
&lt;li&gt;Uniqueness&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Every additional character makes your password exponentially stronger. And of course it shouldn&amp;rsquo;t be a known word or pattern — &amp;ldquo;Password123!&amp;rdquo; is long and looks complex, but it&amp;rsquo;s still guessed quickly.&lt;/p&gt;
&lt;h2 id=&#34;specifics-for-home-assistant&#34;&gt;Specifics for Home Assistant
&lt;/h2&gt;&lt;p&gt;Let&amp;rsquo;s get concrete about Home Assistant: what role do passwords actually play here? Home Assistant is your self-hosted smart home hub. You set up user accounts and assign passwords for logging into the web frontend — and with that, full access to all devices connected to your Home Assistant.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Important:&lt;/strong&gt; Home Assistant does not dictate what your passwords should look like. There&amp;rsquo;s no minimum length, no special character requirement, nothing of the sort. And that&amp;rsquo;s intentional. &lt;a class=&#34;link&#34; href=&#34;https://community.home-assistant.io/t/your-password-seems-insecure-why-is-this-longish-read/65512?utm_source=chatgpt.com&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;There used to be a warning&lt;/a&gt; when a password was too short. These warnings no longer exist — the developers realized it wasn&amp;rsquo;t productive. Why?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The requirements for a password depend heavily on the specific use case:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;When I record videos for this channel, I&amp;rsquo;m always glad I don&amp;rsquo;t have to set a complex password for Home Assistant test instances&lt;/li&gt;
&lt;li&gt;Someone who never exposes their smart home to the internet and has no guests on their home network can afford lower password requirements&lt;/li&gt;
&lt;li&gt;A Home Assistant installation that is publicly accessible on the internet is subject to completely different standards&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;With Home Assistant, you are the administrator and must take responsibility yourself.&lt;/strong&gt; If you&amp;rsquo;re not comfortable with that, a password manager is probably the best choice for you.&lt;/p&gt;
&lt;p&gt;The moment your system is online, it becomes a potential target for automated attacks. And then things get serious fast. Home Assistant does have a built-in &lt;strong&gt;brute-force defense&lt;/strong&gt; (&lt;a class=&#34;link&#34; href=&#34;https://en.wikipedia.org/wiki/Brute-force_attack&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Wikipedia article&lt;/a&gt;): after a certain number of failed login attempts, the user&amp;rsquo;s IP address is temporarily blocked. That&amp;rsquo;s helpful, but not a cure-all:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Many attackers simply spread their attempts across many different IP addresses&lt;/li&gt;
&lt;li&gt;A weak password is often guessed after just a few tries&lt;/li&gt;
&lt;li&gt;The IP block therefore offers only limited protection&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Additional risks:&lt;/strong&gt; Even Home Assistant with Nabu Casa has had critical security vulnerabilities — in 2023, a flaw (&lt;a class=&#34;link&#34; href=&#34;https://nvd.nist.gov/vuln/detail/CVE-2023-27482&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;CVE-2023-27482&lt;/a&gt;) with the highest severity score of 10/10 was disclosed, enabling an authentication bypass.&lt;/p&gt;
&lt;p&gt;➡️ &lt;strong&gt;More on securing Home Assistant:&lt;/strong&gt; &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2024/12/13/securing-home-assistant-5-security-mistakes-to-avoid-in-your-smart-home/&#34; &gt;Home Assistant absichern: 5 Tipps für mehr Sicherheit&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;➡️ &lt;strong&gt;Why port forwarding is problematic:&lt;/strong&gt; &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2025/04/10/why-port-forwarding-into-your-smart-home-is-so-dangerous/&#34; &gt;Portfreigaben vermeiden: So geht sicherer Fernzugriff&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion
&lt;/h2&gt;&lt;p&gt;There is no single perfect Home Assistant password — it depends on your use case. &lt;strong&gt;But the numbers speak clearly: over 80% of all cyberattacks succeed through weak or reused passwords.&lt;/strong&gt; At the same time, 89% of people know the risk, yet only 12% act consistently.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;What matters:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Length over complexity:&lt;/strong&gt; A long password is better than a short complex one&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Uniqueness:&lt;/strong&gt; Every system gets its own password — &lt;strong&gt;no exceptions!&lt;/strong&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Proportionality:&lt;/strong&gt; Match your security requirements to your setup&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Additional measures:&lt;/strong&gt; When internet-facing, use 2FA and secure connections&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use a password manager:&lt;/strong&gt; This breaks the cycle of password reuse&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;The solution is simple:&lt;/strong&gt; A long passphrase or a password manager. That puts you in the 12% who do it right — rather than the 62% who accept security risks out of convenience.&lt;/p&gt;
&lt;p&gt;Home Assistant gets it right by putting the responsibility in your hands. Use that freedom wisely!&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;A look ahead:&lt;/strong&gt; The next generation of authentication is &lt;strong&gt;passkeys&lt;/strong&gt; — a passwordless technology based on cryptographic keys that is significantly more secure than traditional passwords. Unfortunately, Home Assistant does not yet support passkeys, but the future of authentication may well head in that direction. Until then, strong, unique passwords and 2FA remain our best defense.&lt;/p&gt;





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
</description>
        </item>
        <item>
        <title>BSI Tips Clearly Explained: How to PROPERLY Secure Your Smart Home!</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/07/06/bsi-tips-clearly-explained-how-to-properly-secure-your-smart-home/</link>
        <pubDate>Sun, 06 Jul 2025 00:00:00 +0200</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/07/06/bsi-tips-clearly-explained-how-to-properly-secure-your-smart-home/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/07/06/bsi-tipps-verst%C3%A4ndlich-erkl%C3%A4rt-so-sch%C3%BCtzt-du-dein-smart-home-richtig/cover.png" alt="Featured image of post BSI Tips Clearly Explained: How to PROPERLY Secure Your Smart Home!" /&gt;&lt;p&gt;Who voluntarily reads through the lengthy publications of Germany&amp;rsquo;s Federal Office for Information Security (BSI)? I did it for you and distilled the most important tips for your smart home – explained clearly, assessed critically, and backed up with real-world examples, just like in the video!&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/kRYvdjtwc9U&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;h2 id=&#34;introduction-who-actually-reads-the-bsi&#34;&gt;Introduction: Who Actually Reads the BSI?
&lt;/h2&gt;&lt;p&gt;The BSI publishes a lot of solid advice on how to secure your smart home. But honestly – who willingly reads through pages of text on a government website? That&amp;rsquo;s why you&amp;rsquo;ll find the most important recommendations here, explained in plain language and put into perspective.&lt;/p&gt;
&lt;p&gt;➡️ You can find the official BSI recommendations here: &lt;a class=&#34;link&#34; href=&#34;https://www.bsi.bund.de/DE/Themen/Verbraucherinnen-und-Verbraucher/Informationen-und-Empfehlungen/Internet-der-Dinge-Smart-leben/Smart-Home/smart-home_node.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;BSI Smart Home Tips&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;1-choose-strong-passwords&#34;&gt;1. Choose Strong Passwords
&lt;/h2&gt;&lt;p&gt;It sounds obvious, but weak passwords are one of the most common entry points for attacks. Many users simply leave the default password in place – &amp;ldquo;admin&amp;rdquo;, &amp;ldquo;123456&amp;rdquo;, or even no password at all are unfortunately far from rare. The BSI advises: no real words, no simple number sequences or keyboard patterns. My tip: use a unique, strong password for every device, ideally managed with a password manager like KeePass or Bitwarden. It keeps things both easy and secure.&lt;/p&gt;
&lt;h2 id=&#34;2-keep-software-up-to-date&#34;&gt;2. Keep Software Up to Date
&lt;/h2&gt;&lt;p&gt;Updates patch security vulnerabilities. Enable automatic updates wherever possible. Not every device offers this – in that case, there&amp;rsquo;s only one option: check manually on a regular basis, for example once a month. If a device hasn&amp;rsquo;t received updates in years, you should consider replacing it. Pay attention to the manufacturer&amp;rsquo;s update policy before you buy!&lt;/p&gt;
&lt;p&gt;➡️ To see what can happen when devices stop receiving updates, check out the video about a robot vacuum with a security flaw: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2025/05/15/robot-vacuums-in-the-smart-home-the-underestimated-data-hog/&#34; &gt;Robot Vacuum Hack: This Is How Easy Access Is!&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;3-secure-your-router--home-network&#34;&gt;3. Secure Your Router &amp;amp; Home Network
&lt;/h2&gt;&lt;p&gt;Your router is the gateway between your home network and the internet. Change the admin password, disable unnecessary services like UPnP, and enable the firewall. That said, the best firewall is of little use if you don&amp;rsquo;t know what you&amp;rsquo;re doing. Even more importantly: avoid port forwarding for smart home services. Use a VPN (e.g. WireGuard) or a Cloudflare Tunnel instead. It&amp;rsquo;s also a good idea to put smart devices on a separate guest network.&lt;/p&gt;
&lt;p&gt;➡️ For detailed tips on securing Home Assistant and your home network, see: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2024/12/13/securing-home-assistant-5-security-mistakes-to-avoid-in-your-smart-home/&#34; &gt;Securing Home Assistant: 5 Tips for Better Security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;➡️ How to set up secure remote access without port forwarding: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2025/04/10/why-port-forwarding-into-your-smart-home-is-so-dangerous/&#34; &gt;Avoid Port Forwarding: Secure Remote Access Made Easy&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;4-buy-only-from-trusted-sources&#34;&gt;4. Buy Only from Trusted Sources
&lt;/h2&gt;&lt;p&gt;No-name products from overseas are often cheap, but poorly documented and without ongoing updates. The BSI recommends: buy only from reputable retailers, look for CE marking (though be cautious – it&amp;rsquo;s not a guarantee!), and pay attention to the manufacturer&amp;rsquo;s update commitment. Reviews in community forums are often far more revealing than marketing promises.&lt;/p&gt;
&lt;p&gt;➡️ Cloud or local? What to look for when buying smart devices: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2025/01/03/cloud-integrations-vs.-local-integrations/&#34; &gt;Cloud or Local? Running Smart Devices Securely&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;5-use-the-cloud-deliberately&#34;&gt;5. Use the Cloud Deliberately
&lt;/h2&gt;&lt;p&gt;The cloud is convenient, but it comes with risks. Manufacturers have to maintain cloud servers – that costs money, and corners are often cut. Only use cloud-dependent features when you truly need them, and isolate cloud-connected devices from the rest of your network (e.g. via a guest network). Many devices also work locally, for example with Home Assistant.&lt;/p&gt;
&lt;p&gt;➡️ More on cloud vs. local control and privacy: &lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/en/blog/2025/01/03/cloud-integrations-vs.-local-integrations/&#34; &gt;Cloud or Local? Running Smart Devices Securely&lt;/a&gt;&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion
&lt;/h2&gt;&lt;p&gt;The BSI&amp;rsquo;s tips are solid, even if they can sometimes feel a bit abstract. You don&amp;rsquo;t have to implement everything at once – but every step makes your home a little more secure. Watch the video for the full details and practical examples.&lt;/p&gt;





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
</description>
        </item>
        <item>
        <title>SSH Access with YubiKey: How to Properly Secure Your Smart Home Server</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/06/08/ssh-access-with-yubikey-how-to-properly-secure-your-smart-home-server/</link>
        <pubDate>Sun, 08 Jun 2025 09:00:00 +0200</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/06/08/ssh-access-with-yubikey-how-to-properly-secure-your-smart-home-server/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/06/08/ssh-zugriff-mit-yubikey-so-sicherst-du-deinen-smart-home-server-richtig-ab/cover.png" alt="Featured image of post SSH Access with YubiKey: How to Properly Secure Your Smart Home Server" /&gt;&lt;h2 id=&#34;why-securing-ssh-in-your-smart-home-matters&#34;&gt;Why Securing SSH in Your Smart Home Matters
&lt;/h2&gt;&lt;p&gt;Sound familiar? You&amp;rsquo;re about to leave for vacation and quickly want to change something in your system – only to find that remote access suddenly stops working. Many people then simply open their SSH port to the internet or use the Home Assistant Web Terminal add-on in the browser. That sounds convenient, but it&amp;rsquo;s extremely dangerous: often a single password is all it takes for someone to gain full access to your entire system.&lt;/p&gt;
&lt;p&gt;In this video, I&amp;rsquo;ll show you how to properly secure your SSH access with a YubiKey. It&amp;rsquo;s easier than you think – and I&amp;rsquo;ll walk you through it step by step.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/vqE-uHGZUsI&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;h2 id=&#34;what-is-a-yubikey-and-why-is-it-so-secure&#34;&gt;What Is a YubiKey and Why Is It So Secure?
&lt;/h2&gt;&lt;p&gt;The YubiKey is a small USB stick that works like a digital key for you. It stores your access credentials in a way that they never reside on your computer and can&amp;rsquo;t be stolen. For SSH, the YubiKey uses the modern security standard FIDO2. Even if someone knows your password, they can&amp;rsquo;t access your server without the YubiKey. You plug in the stick, tap it – and you&amp;rsquo;re securely logged in. This is far more secure and convenient than traditional passwords or certificate files stored on your machine.&lt;/p&gt;
&lt;h2 id=&#34;where-to-buy-a-yubikey&#34;&gt;Where to Buy a YubiKey
&lt;/h2&gt;&lt;p&gt;You can get a YubiKey through my recommended links:&lt;/p&gt;
&lt;p&gt;The following models are suitable for this project:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;👉 &lt;a class=&#34;link&#34; href=&#34;https://amzn.to/3TdTTZT&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;YubiKey 5 NFC USB-A&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;👉 &lt;a class=&#34;link&#34; href=&#34;https://amzn.to/4jJfofT&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;YubiKey 5C USB-C&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;👉 &lt;a class=&#34;link&#34; href=&#34;https://amzn.to/3TdU9YR&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;YubiKey C NFC USB-C&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;👉 &lt;a class=&#34;link&#34; href=&#34;https://amzn.to/3TdTTZT&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;More keys&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;strong&gt;Tip:&lt;/strong&gt; Always order from the official retailer or a trusted shop to ensure you receive a genuine, sealed device.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Note: These are affiliate links. If you order through them, you support my blog – at no extra cost to you. Thank you!&lt;/em&gt;&lt;/p&gt;
&lt;h2 id=&#34;the-three-ways-to-ssh-login--and-why-yubikey-is-the-best-choice&#34;&gt;The Three Ways to SSH Login – and Why YubiKey Is the Best Choice
&lt;/h2&gt;&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Password:&lt;/strong&gt; Simple, but insecure – passwords can be guessed, intercepted, or shared.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Certificate (key pair):&lt;/strong&gt; Much more secure, but if someone gains access to your computer, they can copy the private key.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;YubiKey:&lt;/strong&gt; The private key doesn&amp;rsquo;t live on your computer – it&amp;rsquo;s securely stored on the YubiKey. Access is only possible with the physical stick and your confirmation.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;step-by-step-setting-up-a-yubikey-for-ssh-using-termius-as-an-example&#34;&gt;Step by Step: Setting Up a YubiKey for SSH (Using Termius as an Example)
&lt;/h2&gt;&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Choose your YubiKey:&lt;/strong&gt; There are various models (USB-A, USB-C, NFC, Lightning). Think about which devices you&amp;rsquo;ll be using the stick with.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Install Termius:&lt;/strong&gt; This app makes the setup particularly straightforward. (OpenSSH, PuTTY, etc. also work.)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add the YubiKey:&lt;/strong&gt; In Termius, go to &amp;ldquo;Keychain&amp;rdquo; → &amp;ldquo;FIDO2&amp;rdquo;, select the stick, enter your PIN, name and generate the key. Enable &amp;ldquo;Require user presence&amp;rdquo;, disable &amp;ldquo;Require PIN code&amp;rdquo;, and leave the passphrase empty.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Copy the public key to the server:&lt;/strong&gt; Termius offers an export function that automatically adds the key to &lt;code&gt;~/.ssh/authorized_keys&lt;/code&gt;. You can also do this manually.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Test the connection:&lt;/strong&gt; Start a new SSH session, tap the YubiKey – done!&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Disable password login:&lt;/strong&gt; Set &lt;code&gt;PasswordAuthentication no&lt;/code&gt; in &lt;code&gt;/etc/ssh/sshd_config&lt;/code&gt; and restart the SSH service.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;important-notes--tips&#34;&gt;Important Notes &amp;amp; Tips
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;When setting up your YubiKey for the first time, you&amp;rsquo;ll need to set a PIN. This protects against misuse if someone finds the stick.&lt;/li&gt;
&lt;li&gt;The private key is split into two parts: one stays on the computer, one on the YubiKey. For a new machine, you&amp;rsquo;ll need to generate a new key pair and register the public key on the server.&lt;/li&gt;
&lt;li&gt;&amp;ldquo;Resident keys&amp;rdquo; (keys stored directly on the YubiKey) are a special case and aren&amp;rsquo;t yet widely supported by many tools.&lt;/li&gt;
&lt;li&gt;It&amp;rsquo;s best to set up a second YubiKey as a backup right away, so you don&amp;rsquo;t lock yourself out.&lt;/li&gt;
&lt;li&gt;If everything does go wrong: you can always access your machine directly with a monitor and keyboard.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;yubikey-in-everyday-use-much-more-than-just-ssh&#34;&gt;YubiKey in Everyday Use: Much More Than Just SSH
&lt;/h2&gt;&lt;p&gt;The YubiKey can do much more: two-factor authentication for Google, Microsoft, Facebook, Dropbox, Amazon, password managers like Bitwarden or 1Password, online banking, email accounts, and much more. Once set up, it becomes a real everyday companion for everything that matters to you.&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion
&lt;/h2&gt;&lt;p&gt;With a YubiKey, you make your SSH access – and many other logins – not only more secure, but also more convenient. You protect yourself against password theft, phishing, and many other attacks, all with a small stick that fits in any pocket.&lt;/p&gt;
</description>
        </item>
        <item>
        <title>Robot Vacuums in the Smart Home - The Underestimated Data Hog</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/05/15/robot-vacuums-in-the-smart-home-the-underestimated-data-hog/</link>
        <pubDate>Thu, 15 May 2025 00:00:00 +0000</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/05/15/robot-vacuums-in-the-smart-home-the-underestimated-data-hog/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/05/15/saugroboter-im-smart-home-die-untersch%C3%A4tzte-datenkrake/cover.png" alt="Featured image of post Robot Vacuums in the Smart Home - The Underestimated Data Hog" /&gt;&lt;h2 id=&#34;introduction&#34;&gt;Introduction
&lt;/h2&gt;&lt;p&gt;Imagine your robot vacuum knows more about you than your closest friends — even though it&amp;rsquo;s only supposed to clean the floor. It drives through your home, scans your rooms, listens to your conversations, and you think it&amp;rsquo;s really just vacuuming? Sounds like a horror movie, but that&amp;rsquo;s exactly reality.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/urSW9Rah0fc&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;h2 id=&#34;the-ecovacs-incident-of-2024&#34;&gt;The Ecovacs Incident of 2024
&lt;/h2&gt;&lt;p&gt;In October 2024, hacked Ecovacs robot vacuums in the US turned into full-blown &lt;a class=&#34;link&#34; href=&#34;https://tarnkappe.info/artikel/cyberangriffe/gehackte-ecovacs-saugroboter-beleidigen-besitzer-302752.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;stalkers&lt;/a&gt; &lt;sup id=&#34;fnref:1&#34;&gt;&lt;a href=&#34;#fn:1&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;1&lt;/a&gt;&lt;/sup&gt;. They &lt;a class=&#34;link&#34; href=&#34;https://www.tomsguide.com/home/smart-home/hacked-ecovacs-vacuums-went-haywire-across-the-us&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;chased pets and hurled racist insults at their owners&lt;/a&gt;, terrorizing entire households &lt;sup id=&#34;fnref:2&#34;&gt;&lt;a href=&#34;#fn:2&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;2&lt;/a&gt;&lt;/sup&gt;. But how did it get to this point? The attackers exploited a &lt;a class=&#34;link&#34; href=&#34;https://www.theverge.com/2024/10/12/24268508/hacked-ecovacs-deebot-x2-racial-slurs-chase-pets&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;glaring security vulnerability&lt;/a&gt; in the robots&amp;rsquo; software. The security PIN that was supposed to prevent unauthorized access was only verified in the app, not on the device itself — a fatal flaw that hackers knew how to exploit &lt;sup id=&#34;fnref:3&#34;&gt;&lt;a href=&#34;#fn:3&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;3&lt;/a&gt;&lt;/sup&gt;.&lt;/p&gt;
&lt;p&gt;What makes this case particularly alarming: common security measures like strong passwords or two-factor authentication would not have helped here. The manufacturer had made such a fundamental programming error that even best-practice security measures were rendered useless.&lt;/p&gt;
&lt;h2 id=&#34;the-underestimated-problem-of-profiling&#34;&gt;The Underestimated Problem of Profiling
&lt;/h2&gt;&lt;p&gt;But even if your robot vacuum isn&amp;rsquo;t hacked, there is another massive problem: profiling. Many people might think, what could a robot vacuum really know about me? The answer is: frighteningly much.&lt;/p&gt;
&lt;p&gt;To understand how powerful data analysis can be, here is a &lt;a class=&#34;link&#34; href=&#34;https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;real-world example from the US&lt;/a&gt;: In 2012, a teenager suddenly started receiving ads for baby products from the retail chain Target. Her outraged father complained to Target about the alleged harassment of his daughter — only to find out a few days later that his daughter was actually pregnant. The algorithm had detected subtle changes in purchasing behavior and drawn the right conclusions before the family even knew &lt;sup id=&#34;fnref:4&#34;&gt;&lt;a href=&#34;#fn:4&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;4&lt;/a&gt;&lt;/sup&gt;.&lt;/p&gt;
&lt;h3 id=&#34;what-does-this-mean-for-robot-vacuums&#34;&gt;What Does This Mean for Robot Vacuums?
&lt;/h3&gt;&lt;p&gt;Your robot vacuum links movement patterns, camera images, and sounds. It knows:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;When you sleep&lt;/li&gt;
&lt;li&gt;When you come home&lt;/li&gt;
&lt;li&gt;Whether your routines change&lt;/li&gt;
&lt;li&gt;Which rooms are used and how often&lt;/li&gt;
&lt;li&gt;What conversations take place in your home&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;why-this-matters&#34;&gt;Why This Matters
&lt;/h2&gt;&lt;p&gt;&amp;ldquo;Why would anyone spy on me? I&amp;rsquo;m not important at all.&amp;rdquo; This thought is understandable, but it misses the core of the problem. It&amp;rsquo;s not about targeted surveillance of individuals — it&amp;rsquo;s about mass data collection:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Companies don&amp;rsquo;t specifically target your data&lt;/li&gt;
&lt;li&gt;They simply collect everything, because storage is cheap&lt;/li&gt;
&lt;li&gt;What seems harmless today can become highly sensitive tomorrow through AI analysis&lt;/li&gt;
&lt;li&gt;The value lies not in any single household, but in the sheer volume of data&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This data can feed algorithms that make decisions about:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Health insurance eligibility&lt;/li&gt;
&lt;li&gt;Credit scoring&lt;/li&gt;
&lt;li&gt;Personalized advertising&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;concrete-recommendations&#34;&gt;Concrete Recommendations
&lt;/h2&gt;&lt;p&gt;What can you actually do to protect yourself?&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Basic security measures:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use strong passwords&lt;/li&gt;
&lt;li&gt;Install updates regularly&lt;/li&gt;
&lt;li&gt;Put devices on a guest network&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Consider before buying:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Think twice before getting devices with cameras or microphones&lt;/li&gt;
&lt;li&gt;Be especially critical of cloud-based data processing&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Alternative solutions:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The Valetudo project offers open-source firmware for some robot vacuum models&lt;/li&gt;
&lt;li&gt;This lets you keep control over your own data&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion
&lt;/h2&gt;&lt;p&gt;Even large, seemingly trustworthy brands are not immune to data breaches — as the &lt;a class=&#34;link&#34; href=&#34;https://www.auto-motor-und-sport.de/verkehr/massives-datenleck-volkwagen-meb-nutzerdaten-chaos-computer-club/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Volkswagen incident of 2024&lt;/a&gt; illustrates, where data from over 400,000 electric vehicles ended up unprotected on the internet &lt;sup id=&#34;fnref:5&#34;&gt;&lt;a href=&#34;#fn:5&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;5&lt;/a&gt;&lt;/sup&gt;.&lt;/p&gt;
&lt;p&gt;Making a genuinely reliable purchase recommendation for a &amp;ldquo;secure&amp;rdquo; robot vacuum is nearly impossible. The most pragmatic approach seems to be avoiding models with cameras and microphones and accepting the reduced feature set. An alternative for tech-savvy users is the &lt;a class=&#34;link&#34; href=&#34;https://valetudo.cloud/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Valetudo project&lt;/a&gt; &lt;sup id=&#34;fnref:6&#34;&gt;&lt;a href=&#34;#fn:6&#34; class=&#34;footnote-ref&#34; role=&#34;doc-noteref&#34;&gt;6&lt;/a&gt;&lt;/sup&gt;, which provides an open-source alternative to the manufacturer&amp;rsquo;s firmware. Because in the end, protecting your privacy matters more than the supposed convenience of extra features.&lt;/p&gt;
&lt;div class=&#34;footnotes&#34; role=&#34;doc-endnotes&#34;&gt;
&lt;hr&gt;
&lt;ol&gt;
&lt;li id=&#34;fn:1&#34;&gt;
&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://tarnkappe.info/artikel/cyberangriffe/gehackte-ecovacs-saugroboter-beleidigen-besitzer-302752.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Tarnkappe.info: Hacked Ecovacs robot vacuums insult their owners&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:1&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:2&#34;&gt;
&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.tomsguide.com/home/smart-home/hacked-ecovacs-vacuums-went-haywire-across-the-us&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Tom&amp;rsquo;s Guide: Hacked Ecovacs vacuums went haywire across the US&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:2&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:3&#34;&gt;
&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.theverge.com/2024/10/12/24268508/hacked-ecovacs-deebot-x2-racial-slurs-chase-pets&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;The Verge: Hacked Ecovacs robot vacuums spewed racial slurs and chased pets&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:3&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:4&#34;&gt;
&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Forbes: How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:4&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:5&#34;&gt;
&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://www.auto-motor-und-sport.de/verkehr/massives-datenleck-volkwagen-meb-nutzerdaten-chaos-computer-club/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Auto Motor und Sport: Massive data leak at Volkswagen&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:5&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li id=&#34;fn:6&#34;&gt;
&lt;p&gt;&lt;a class=&#34;link&#34; href=&#34;https://valetudo.cloud/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Valetudo - Cloud-free control of robot vacuums&lt;/a&gt;&amp;#160;&lt;a href=&#34;#fnref:6&#34; class=&#34;footnote-backref&#34; role=&#34;doc-backlink&#34;&gt;&amp;#x21a9;&amp;#xfe0e;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
</description>
        </item>
        <item>
        <title>Remote Access with Cloudflare – Done Right!</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/04/18/remote-access-with-cloudflare-done-right/</link>
        <pubDate>Fri, 18 Apr 2025 00:00:00 +0000</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/04/18/remote-access-with-cloudflare-done-right/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/04/18/fernzugriff-mit-cloudflare-richtig-sicher/cover.jpg" alt="Featured image of post Remote Access with Cloudflare – Done Right!" /&gt;&lt;p&gt;Many people set up a Cloudflare Tunnel, see that Home Assistant is reachable from anywhere — and stop right there. The problem: the tunnel is encrypted, but anyone can access it. No login, no access control, nothing. It&amp;rsquo;s like locking your apartment door while the building&amp;rsquo;s front door is wide open.&lt;/p&gt;
&lt;p&gt;I&amp;rsquo;ll show you how to do this properly: set up the tunnel, secure access — and at the end, make an honest assessment of what you&amp;rsquo;re trusting Cloudflare with.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/-5ekUIhSIaM&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;h2 id=&#34;the-false-sense-of-security-through-https&#34;&gt;The False Sense of Security Through HTTPS
&lt;/h2&gt;&lt;p&gt;Many people think: &amp;ldquo;If I use HTTPS, I&amp;rsquo;m safe.&amp;rdquo; But that&amp;rsquo;s a misconception. SSL encrypts the connection — it does not prevent your Home Assistant from being visible and vulnerable on the internet. That&amp;rsquo;s exactly what happens when you only set up a tunnel and do nothing else.&lt;/p&gt;
&lt;p&gt;Today we go one crucial step further: Cloudflare Tunnel plus access control. If you&amp;rsquo;ve already set up the tunnel, you can skip ahead to the next section.&lt;/p&gt;
&lt;p&gt;Info: The hands-on step-by-step walkthrough is in the video above. You&amp;rsquo;ll need your own domain to follow along. If you don&amp;rsquo;t have one yet, I recommend Netcup based in Karlsruhe:&lt;/p&gt;









&lt;blockquote&gt;
    &lt;p&gt;&lt;figure&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/img/netcup_logo.png&#34; width=&#34;20%&#34;&gt;
&lt;/figure&gt;
&lt;p&gt;Netcup is a German hosting provider I&amp;rsquo;ve been a customer of since &lt;strong&gt;2011&lt;/strong&gt; — now with &lt;strong&gt;nine products&lt;/strong&gt; (domains, web hosting, vServers and root servers). I&amp;rsquo;ve been consistently satisfied over all those years. I particularly want to highlight the &lt;strong&gt;reliable infrastructure&lt;/strong&gt;, &lt;strong&gt;excellent support&lt;/strong&gt;, and &lt;strong&gt;transparent pricing&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A real standout feature: &lt;strong&gt;special offers at Netcup are often permanent&lt;/strong&gt;. That sets Netcup clearly apart from other providers where the price typically rises after the first year.&lt;/p&gt;
&lt;p&gt;If you want to support me and my content, I&amp;rsquo;d be happy if you book through my referral link:
👉 &lt;a class=&#34;link&#34; href=&#34;https://www.netcup.com/de/?ref=21226&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.netcup.com/de/?ref=21226&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I also have &lt;strong&gt;vouchers for new customers&lt;/strong&gt; for various Netcup products. Just reach out — I&amp;rsquo;m happy to help!&lt;/p&gt;
&lt;p&gt;Thank you for your support! It helps me keep creating content for you.&lt;/p&gt;
&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;


&lt;h2 id=&#34;the-weak-spot-in-many-cloudflare-setups&#34;&gt;The Weak Spot in Many Cloudflare Setups
&lt;/h2&gt;&lt;p&gt;Your smart home is now reachable from the internet — and many people stop there, satisfied. But there is one critical problem with this setup: while the tunnel connection is encrypted, &lt;em&gt;anyone&lt;/em&gt; can access it.&lt;/p&gt;
&lt;p&gt;It&amp;rsquo;s like locking your apartment door while the front door of the building stands wide open. Today we do better and add an additional layer of protection.&lt;/p&gt;
&lt;p&gt;Info: The hands-on step-by-step walkthrough is in the video above.&lt;/p&gt;
&lt;h2 id=&#34;how-trustworthy-is-cloudflare&#34;&gt;How Trustworthy Is Cloudflare?
&lt;/h2&gt;&lt;p&gt;So now, to stay with the analogy, the front door is also securely locked and only someone with keys to both doors can get through. Right? Unfortunately, no. Because there&amp;rsquo;s one player you may not have on your radar — and that&amp;rsquo;s Cloudflare itself.&lt;/p&gt;
&lt;p&gt;We&amp;rsquo;ve set up two layers of protection: the authentication in Home Assistant and Cloudflare Access. For a hacker to access your smart home now, they&amp;rsquo;d need to successfully bypass both security mechanisms — Cloudflare&amp;rsquo;s and Home Assistant&amp;rsquo;s. The odds of that are orders of magnitude lower than if the system were just sitting open on the internet. Sounds like a perfect setup? Almost — because there&amp;rsquo;s one small but important catch.&lt;/p&gt;
&lt;p&gt;Cloudflare itself has unencrypted access to everything passing through the connection in this setup. And Cloudflare is a US company, which means it is not subject to the strict data protection regulations that apply here in Europe. You therefore have to place a certain degree of trust in the company behind Cloudflare. If that makes you uncomfortable — what are the alternatives? You could set up your own VPN access with WireGuard or Tailscale — technically a bit more demanding, but privacy-friendly. Or you use Home Assistant Cloud — it&amp;rsquo;s a paid service, but offers a straightforward and secure solution with considerably more concrete privacy rules than Cloudflare. However, you still have to extend some trust here too, because Nabu Casa — the company behind Home Assistant Cloud — is also a US company and is not bound by EU rules. That said, they do advertise that they don&amp;rsquo;t log user activity or analyze it for advertising purposes. That may matter to some of you.&lt;/p&gt;
&lt;h2 id=&#34;my-take&#34;&gt;My Take
&lt;/h2&gt;&lt;p&gt;If you use Cloudflare correctly — with Tunnel &lt;em&gt;and&lt;/em&gt; Access — you have a free, highly secure solution for remote access to Home Assistant, without opening a single port.&lt;/p&gt;
&lt;p&gt;Cloudflare is, however, a US company with unencrypted access to your connection. If that&amp;rsquo;s not acceptable to you, consider WireGuard, Tailscale, or Home Assistant Cloud instead. More on those coming soon here on &amp;ldquo;Smart Home? But Secure!&amp;rdquo;&lt;/p&gt;
</description>
        </item>
        <item>
        <title>Why Port Forwarding into Your Smart Home Is So Dangerous</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/04/10/why-port-forwarding-into-your-smart-home-is-so-dangerous/</link>
        <pubDate>Thu, 10 Apr 2025 00:00:00 +0000</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/04/10/why-port-forwarding-into-your-smart-home-is-so-dangerous/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/04/10/so-gef%C3%A4hrlich-sind-portfreigaben-ins-smart-home/cover.png" alt="Featured image of post Why Port Forwarding into Your Smart Home Is So Dangerous" /&gt;&lt;p&gt;I&amp;rsquo;ve been diving deep into the topic of remote access to smart home systems lately – and one thing quickly becomes clear: there are now quite a few interesting options available, depending on your security needs, budget, and technical expertise.&lt;/p&gt;
&lt;p&gt;Which makes it all the more alarming that many users still simply rely on port forwarding to make their home network services accessible from the internet. Why is that dangerous? Let&amp;rsquo;s take a closer look.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/ExyqoW_Sslo&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;p&gt;Hi and welcome! My name is Joachim and this is Smart Home? But Secure! I originally just wanted to put together a video showing you how I&amp;rsquo;ve been handling secure remote access to Home Assistant for years.
But in my research, I realized: there are now quite a few ways to solve the remote access problem elegantly and securely. Yet there are still a large number of users who rely on simple port forwarding (more technically known as port forwarding) to access their smart home systems while on the go. And honestly, that surprised me a bit.&lt;/p&gt;
&lt;p&gt;If you&amp;rsquo;re thinking: &amp;ldquo;Sure, old news – you don&amp;rsquo;t need to explain that to me!&amp;rdquo; – then I&amp;rsquo;d invite you to subscribe to the channel. I have a feeling this topic has potential for more than one video, and there will definitely be a few more technical deep-dives to come.
But if you&amp;rsquo;re thinking: &amp;ldquo;Huh? What&amp;rsquo;s actually the problem with port forwarding?&amp;rdquo; – then let&amp;rsquo;s take a closer look right now.&lt;/p&gt;
&lt;h2 id=&#34;why-port-forwarding-is-so-popular&#34;&gt;Why Port Forwarding Is So Popular
&lt;/h2&gt;&lt;p&gt;First of all: it&amp;rsquo;s understandable why so many users go this route. It&amp;rsquo;s simple, quick to set up, and generally involves no additional costs.
And even the problem of a dynamic IP address can be solved quickly using a dynamic DNS service. But:
You have to be aware of what you&amp;rsquo;re doing: you&amp;rsquo;re putting your service – for example Home Assistant or OpenHAB – directly onto the internet, exposed exactly the same way it is on your local network.&lt;/p&gt;
&lt;h2 id=&#34;first-risk-the-protection-layer-of-your-home-network-disappears&#34;&gt;First Risk: The Protection Layer of Your Home Network Disappears
&lt;/h2&gt;&lt;p&gt;Even if you&amp;rsquo;ve set a strong password for your service: your home network itself is an additional layer of protection. In general, far fewer malicious actors are lurking there than on the open internet.
With port forwarding, you remove exactly that protective layer. Your service is now directly reachable from the internet – for millions of users, hackers, and other bad actors.
And even if you use a secure password and 2FA – nobody can guarantee that a new security vulnerability doesn&amp;rsquo;t already exist that bypasses authentication entirely. Sure, you can install updates diligently, but those only protect against known and already-patched vulnerabilities.
That&amp;rsquo;s why you should replace that second protective layer – your home network – with something else whenever you want to expose your services on the internet.&lt;/p&gt;
&lt;h2 id=&#34;second-risk-unencrypted-connections&#34;&gt;Second Risk: Unencrypted Connections
&lt;/h2&gt;&lt;p&gt;There&amp;rsquo;s another factor to consider. As soon as your data travels over the internet, it must be encrypted – otherwise anyone can read or manipulate it.
Take Home Assistant as an example: the default connection is not encrypted. If you simply open a port to the internet, access is unsecured – just like at home, where that&amp;rsquo;s usually less of a concern.
Of course, you can secure it – for example with a free Let&amp;rsquo;s Encrypt certificate. But that means additional software and configuration. The &amp;ldquo;simple&amp;rdquo; port forwarding quickly turns into a complex software project – and that makes it not only more error-prone but often more insecure as well. A vicious cycle.&lt;/p&gt;
&lt;h2 id=&#34;my-recommendation&#34;&gt;My Recommendation
&lt;/h2&gt;&lt;p&gt;My clear recommendation: don&amp;rsquo;t use port forwarding to make your smart home accessible from the internet.
Even if you don&amp;rsquo;t have particularly high security requirements, there are better alternatives:&lt;/p&gt;
&lt;h3 id=&#34;vpn&#34;&gt;VPN
&lt;/h3&gt;&lt;p&gt;VPN: If you have a FRITZ!Box or another router that supports it, a VPN can be a great choice. It&amp;rsquo;s free, significantly more secure, and usually easy to set up. The VPN authentication provides the second protective layer that I believe is so important for internet access.&lt;/p&gt;
&lt;h3 id=&#34;home-assistant-cloud&#34;&gt;Home Assistant Cloud
&lt;/h3&gt;&lt;p&gt;Home Assistant Cloud: The service from the HA team at Nabu Casa is easy to set up and takes care of encryption for you. You don&amp;rsquo;t have to deal with dynamic DNS either. But: it costs a monthly subscription fee – though at least that money goes to the company developing Home Assistant. The downside is that the second protective layer is still missing – the login screen is directly reachable from the internet, which you&amp;rsquo;ll quickly notice from &amp;ldquo;login failed&amp;rdquo; messages in your Home Assistant log.&lt;/p&gt;
&lt;h3 id=&#34;cloudflare&#34;&gt;Cloudflare
&lt;/h3&gt;&lt;p&gt;Reverse proxies such as Cloudflare: here you build an encrypted tunnel from your home network to the proxy. There are already many great videos about this from the big smart home channels on YouTube, but I strongly recommend enabling an additional authentication layer on the proxy (called &amp;ldquo;Access&amp;rdquo; in Cloudflare) – that gives you your second protective layer here as well. Cloudflare is a US-based provider, which may be a dealbreaker for those with privacy concerns. In my research I haven&amp;rsquo;t found a comparable European alternative – if you know of one, let me know in the comments!&lt;/p&gt;
&lt;h3 id=&#34;twingate&#34;&gt;Twingate
&lt;/h3&gt;&lt;p&gt;Twingate is a provider that enables zero-trust networking and promises a modern VPN alternative. Setup is surprisingly straightforward, clients are available for all platforms, and access to individual services can be controlled in a very granular way. Even though the service is primarily aimed at businesses, it can be interesting in a smart home context – especially if you want to secure multiple devices or users.&lt;/p&gt;
&lt;h3 id=&#34;tailscale&#34;&gt;Tailscale
&lt;/h3&gt;&lt;p&gt;Tailscale takes a different approach: using WireGuard, it builds a private mesh network in which all your devices can reach each other directly – wherever they are. Particularly interesting is the newer Tailscale Funnel feature: it lets you expose a home network service publicly over the internet, including HTTPS and access control. Funnel isn&amp;rsquo;t available everywhere yet, but it&amp;rsquo;s a promising approach – especially for technically minded users.&lt;/p&gt;
&lt;p&gt;I haven&amp;rsquo;t taken a closer look at either of these two options (Twingate and Tailscale) myself yet.&lt;/p&gt;
&lt;p&gt;What role does remote access play in your smart home setup? Which solution are you using – or which one are you considering? Leave a comment below.&lt;/p&gt;
&lt;h2 id=&#34;what-i-use-personally&#34;&gt;What I Use Personally
&lt;/h2&gt;&lt;p&gt;I&amp;rsquo;ve set up my own reverse proxy with the German hosting provider &lt;strong&gt;netcup&lt;/strong&gt;. From my home network I establish an SSH tunnel that exposes only selected services toward the reverse proxy. The proxy itself is responsible for authentication and controls who can access what. I&amp;rsquo;ve configured it so that a client certificate is required for authentication. That&amp;rsquo;s how I&amp;rsquo;ve implemented my second protective layer – without opening any ports. At the same time it&amp;rsquo;s incredibly convenient, because authentication happens in the background and I don&amp;rsquo;t need to connect to a VPN or enter additional passwords. It&amp;rsquo;s certainly not the right solution for everyone – but for technically experienced users, it&amp;rsquo;s in my opinion a very elegant approach for the level of protection it provides.&lt;/p&gt;









&lt;blockquote&gt;
    &lt;p&gt;&lt;figure&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/img/netcup_logo.png&#34; width=&#34;20%&#34;&gt;
&lt;/figure&gt;
&lt;p&gt;Netcup is a German hosting provider I&amp;rsquo;ve been a customer of since &lt;strong&gt;2011&lt;/strong&gt; — now with &lt;strong&gt;nine products&lt;/strong&gt; (domains, web hosting, vServers and root servers). I&amp;rsquo;ve been consistently satisfied over all those years. I particularly want to highlight the &lt;strong&gt;reliable infrastructure&lt;/strong&gt;, &lt;strong&gt;excellent support&lt;/strong&gt;, and &lt;strong&gt;transparent pricing&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;A real standout feature: &lt;strong&gt;special offers at Netcup are often permanent&lt;/strong&gt;. That sets Netcup clearly apart from other providers where the price typically rises after the first year.&lt;/p&gt;
&lt;p&gt;If you want to support me and my content, I&amp;rsquo;d be happy if you book through my referral link:
👉 &lt;a class=&#34;link&#34; href=&#34;https://www.netcup.com/de/?ref=21226&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://www.netcup.com/de/?ref=21226&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I also have &lt;strong&gt;vouchers for new customers&lt;/strong&gt; for various Netcup products. Just reach out — I&amp;rsquo;m happy to help!&lt;/p&gt;
&lt;p&gt;Thank you for your support! It helps me keep creating content for you.&lt;/p&gt;
&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;


&lt;h2 id=&#34;whats-next&#34;&gt;What&amp;rsquo;s Next
&lt;/h2&gt;&lt;p&gt;In the upcoming videos we&amp;rsquo;ll take a detailed look at each of these alternatives – so you can find the right solution for your situation.&lt;/p&gt;
</description>
        </item>
        <item>
        <title>Cloud Integrations vs. Local Integrations</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2025/01/03/cloud-integrations-vs.-local-integrations/</link>
        <pubDate>Fri, 03 Jan 2025 00:00:00 +0000</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2025/01/03/cloud-integrations-vs.-local-integrations/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2025/01/03/cloud-integrationen-vs.-lokale-integrationen/cover.png" alt="Featured image of post Cloud Integrations vs. Local Integrations" /&gt;&lt;p&gt;Bose simply pulled the plug. Overnight, SoundTouch speakers that cost well over €1,000 turned into expensive paperweights – because the manufacturer shut down its cloud service. Vorwerk did the same thing with Neato robot vacuums. The list keeps growing.&lt;/p&gt;
&lt;p&gt;This is the fundamental problem with cloud integrations in a smart home: you buy a device, but you don&amp;rsquo;t really own the functionality behind it. That belongs to the manufacturer – and they can take it back at any time. Here I&amp;rsquo;ll look at what that means in practice, and when cloud integrations still make sense.&lt;/p&gt;









&lt;blockquote&gt;
    &lt;p&gt;&lt;figure&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/img/tibber_logo.svg&#34; width=&#34;20%&#34;&gt;
&lt;/figure&gt;
&lt;p&gt;&lt;strong&gt;ATTENTION: For a limited time until mid-January 2025, you and I will receive not just €50 but €100 at Tibber as a bonus!&lt;/strong&gt; Just scroll to the end of this article to find out whether a dynamic electricity tariff might be for you.&lt;/p&gt;&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
 
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/35az2bnC174&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;h2 id=&#34;what-are-cloud-and-local-integrations&#34;&gt;What are cloud and local integrations?
&lt;/h2&gt;&lt;p&gt;Cloud integrations connect your devices to external servers over the internet. This lets you access them from anywhere in the world. Examples include Google Nest, Amazon Alexa, and Ring cameras. The cloud offers convenience, but it also comes with risks.&lt;/p&gt;
&lt;p&gt;Local integrations, by contrast, run directly in your home network – with no internet connection required. Typical examples are Zigbee devices or ESPHome sensors controlled via a local hub. Local integrations give you more control and independence.&lt;/p&gt;
&lt;h2 id=&#34;risks-of-cloud-integrations&#34;&gt;Risks of cloud integrations
&lt;/h2&gt;&lt;h3 id=&#34;privacy-and-data-security&#34;&gt;Privacy and data security
&lt;/h3&gt;&lt;p&gt;Many cloud devices send sensitive data to manufacturer servers. A prominent example is the VW data leak in 2024, where a vulnerability exposed the data of 800,000 customers. Security gaps like this can give unauthorized third parties access to your private data.&lt;/p&gt;
&lt;h3 id=&#34;vendor-dependency&#34;&gt;Vendor dependency
&lt;/h3&gt;&lt;p&gt;Another risk is dependence on the manufacturer&amp;rsquo;s services. A well-known example is the Revolv Smart Home Hub, whose servers were shut down by Google in 2016. Users were suddenly left with useless hardware.&lt;/p&gt;
&lt;h3 id=&#34;attack-surface-for-hackers&#34;&gt;Attack surface for hackers
&lt;/h3&gt;&lt;p&gt;Insecure cloud connections can serve as an entry point into your home network. Once an attacker gains access to a cloud-connected device, they could potentially compromise other devices on your network.&lt;/p&gt;
&lt;h3 id=&#34;dependence-on-internet-connectivity&#34;&gt;Dependence on internet connectivity
&lt;/h3&gt;&lt;p&gt;Cloud devices rely on a stable internet connection. If a server goes down or your internet is disrupted, they often stop working entirely. This can cause serious problems with security-critical applications like smart door locks.&lt;/p&gt;
&lt;h2 id=&#34;advantages-of-local-integrations&#34;&gt;Advantages of local integrations
&lt;/h2&gt;&lt;h3 id=&#34;full-data-control&#34;&gt;Full data control
&lt;/h3&gt;&lt;p&gt;With local integrations, all data stays within your home network. You&amp;rsquo;re not relying on a third party&amp;rsquo;s data security practices and you minimize the risk of data leaks.&lt;/p&gt;
&lt;h3 id=&#34;independence-from-external-services&#34;&gt;Independence from external services
&lt;/h3&gt;&lt;p&gt;Local integrations work even without an internet connection. A Zigbee light switch, for example, keeps working even if your internet goes down.&lt;/p&gt;
&lt;h3 id=&#34;smaller-attack-surface&#34;&gt;Smaller attack surface
&lt;/h3&gt;&lt;p&gt;Because there&amp;rsquo;s no connection to the internet, there are fewer ways for attackers to compromise your network.&lt;/p&gt;
&lt;h3 id=&#34;fast-response-times&#34;&gt;Fast response times
&lt;/h3&gt;&lt;p&gt;Local systems react instantly, since no data has to travel over the internet. This is a decisive advantage for automations and scenarios that depend on precise timing.&lt;/p&gt;
&lt;h2 id=&#34;how-to-make-cloud-integrations-more-secure&#34;&gt;How to make cloud integrations more secure
&lt;/h2&gt;&lt;p&gt;If you want or need to use cloud integrations, there are steps you can take to minimize the risk:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Two-factor authentication (2FA):&lt;/strong&gt; Enable 2FA to make unauthorized access to your accounts harder.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Strong passwords:&lt;/strong&gt; Use complex, unique passwords for every service.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Regular updates:&lt;/strong&gt; Keep all devices and apps up to date to close security vulnerabilities.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Use a separate network:&lt;/strong&gt; Place cloud devices on a guest network to protect your main network.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;when-should-you-choose-cloud-or-local&#34;&gt;When should you choose cloud or local?
&lt;/h2&gt;&lt;p&gt;Cloud integrations are a good fit if you want to access your devices from anywhere or need complex additional features that depend on external services.&lt;/p&gt;
&lt;p&gt;Local integrations are the better choice if you prioritize privacy, security, and reliability.&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion
&lt;/h2&gt;&lt;p&gt;The choice between cloud and local integrations depends heavily on your individual needs. Both approaches have their pros and cons, but with the right security measures you can minimize the risks. My recommendation: use local integrations wherever possible, and secure your cloud devices carefully. That makes your smart home not just smarter – but also more secure.&lt;/p&gt;
&lt;p&gt;








&lt;blockquote&gt;
    &lt;p&gt;&lt;figure&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/img/tibber_logo.svg&#34; width=&#34;20%&#34;&gt;
&lt;/figure&gt;
&lt;p&gt;Do you already have a dynamic electricity tariff? Tibber is one of the first providers to offer such a tariff in Germany. I&amp;rsquo;ve been a customer since October 2022, and it&amp;rsquo;s been a thoroughly positive experience. Tibber offers a clearly structured, modern app where you always have full oversight of your electricity tariff and costs. Pricing is very transparent: Tibber only charges what electricity actually costs on the exchange at any given moment (plus standard grid fees, etc.), plus a service fee of just €3.99 per month.&lt;/p&gt;
&lt;p&gt;If Tibber sounds like an option for you, I&amp;rsquo;d be glad if you sign up via &lt;a class=&#34;link&#34; href=&#34;https://invite.tibber.com/vkccaupl&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;my referral link&lt;/a&gt;. That gets both you and me &lt;strong&gt;€100 for the Tibber Store&lt;/strong&gt;, where you can buy various IoT hardware for your smart home. If you&amp;rsquo;re already a Tibber customer and haven&amp;rsquo;t used a referral link, you can &lt;a class=&#34;link&#34; href=&#34;https://support.tibber.com/de/articles/4601431-tibber-freund-innen-bonus#h_ae8df266c0&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;still do so within 14 days&lt;/a&gt; — use code &lt;code&gt;vkccaupl&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Have questions or still unsure? Don&amp;rsquo;t hesitate to reach out. I&amp;rsquo;m happy to help you figure out whether Tibber is the right choice for you. And if it turns out it isn&amp;rsquo;t — you can cancel Tibber month by month at any time!&lt;/p&gt;
&lt;p&gt;Thank you for your support! It makes it possible for me to keep creating videos for you.&lt;/p&gt;
&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
 





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/p&gt;
&lt;h2 id=&#34;related-articles&#34;&gt;Related articles
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/post/cloud-ausgeschaltet/&#34; &gt;When your smart home suddenly turns dumb – and what you can do about it&lt;/a&gt; – Concrete examples of manufacturers shutting down their cloud: Bose SoundTouch, Neato, and more.&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/post/backups-2025/&#34; &gt;Home Assistant Backups in 2025 – Your data safe and recoverable at any time&lt;/a&gt; – If you rely on local control, you should also back up your data locally.&lt;/li&gt;
&lt;/ul&gt;
</description>
        </item>
        <item>
        <title>Securing Home Assistant - 5 Security Mistakes to Avoid in Your Smart Home</title>
        <link>https://smarthome-aber-sicher.de/en/blog/2024/12/13/securing-home-assistant-5-security-mistakes-to-avoid-in-your-smart-home/</link>
        <pubDate>Fri, 13 Dec 2024 00:00:00 +0000</pubDate>
        
        <guid>https://smarthome-aber-sicher.de/en/blog/2024/12/13/securing-home-assistant-5-security-mistakes-to-avoid-in-your-smart-home/</guid>
        <description>&lt;img src="https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/cover.jpeg" alt="Featured image of post Securing Home Assistant - 5 Security Mistakes to Avoid in Your Smart Home" /&gt;








&lt;blockquote&gt;
    &lt;p&gt;&lt;figure&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/img/tibber_logo.svg&#34; width=&#34;20%&#34;&gt;
&lt;/figure&gt;
&lt;p&gt;&lt;strong&gt;ATTENTION: For a limited time until mid-January 2025, you and I will receive not just €50 but €100 at Tibber as a bonus!&lt;/strong&gt; Just scroll to the end of this article to find out whether a dynamic electricity tariff might be for you.&lt;/p&gt;&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
 
&lt;p&gt;In the Home Assistant forum, someone opened their port 8123 in January 2025 – and described how login attacks started within minutes. Massive, automated, relentless. This is not an isolated case. Using services like Shodan, attackers can find open Home Assistant instances in seconds.&lt;/p&gt;
&lt;p&gt;Most of these attacks are preventable. Not through complicated measures, but through five things that many people simply never set up.&lt;/p&gt;
&lt;div class=&#34;video-wrapper&#34;&gt;
    &lt;div class=&#34;video-placeholder&#34; onclick=&#34;loadIframe(this)&#34;&gt;
        &lt;img src=&#34;https://smarthome-aber-sicher.de/img/sas_youtube.png&#34; alt=&#34;YouTube Video&#34;&gt;
        &lt;div class=&#34;play-button&#34;&gt;&lt;/div&gt;
        &lt;div class=&#34;privacy-notice&#34;  style=&#34;color: var(--card-text-color-main);&#34;&gt;
            To load the video, please click the image. Please note that by doing so, data will be transmitted to YouTube.
        &lt;/div&gt;
    &lt;/div&gt;
&lt;/div&gt;
&lt;script&gt;
    function loadIframe(element) {
        var iframe = document.createElement(&#39;iframe&#39;);
        iframe.setAttribute(&#39;loading&#39;, &#39;lazy&#39;);
        iframe.setAttribute(&#39;src&#39;, &#39;https://www.youtube-nocookie.com/embed/yjVJnARQbbU&#39;);
        iframe.setAttribute(&#39;allowfullscreen&#39;, &#39;&#39;);
        iframe.setAttribute(&#39;title&#39;, &#39;YouTube Video&#39;);
        element.parentNode.replaceChild(iframe, element);
    }
&lt;/script&gt;
&lt;style&gt;
    .video-placeholder {
        position: relative;
        cursor: pointer;
    }
    .video-placeholder img {
        width: 100%;
        height: auto;
    }
    .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .video-placeholder:hover .play-button {
        position: absolute;
        top: 50%;
        left: 50%;
        transform: translate(-50%, -50%);
        width: 60px;
        height: 60px;
        background: url(&#39;/img/youtube_button_hover.svg&#39;) no-repeat center center;
        background-size: contain;
    }
    .privacy-notice {
        position: absolute;
        bottom: 50px;
        width: 100%;
        left: 50%;
        transform: translateX(-50%);
        background-color: rgba(0, 0, 0, 0.7);
        color: white;
        padding: 5px 10px;
        border-radius: 5px;
        font-size: 12px;
        text-align: center;
    }
&lt;/style&gt;

&lt;p&gt;Home Assistant was built with privacy and IT security in mind, letting you run your smart home completely locally and independently of manufacturers. The local approach minimizes the risk of data leaks. With options like &lt;a class=&#34;link&#34; href=&#34;https://www.home-assistant.io/docs/configuration/securing/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;SSL&lt;/a&gt;, &lt;a class=&#34;link&#34; href=&#34;https://www.home-assistant.io/docs/authentication/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;user management&lt;/a&gt;, and &lt;a class=&#34;link&#34; href=&#34;https://www.home-assistant.io/faq/release/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;regular updates&lt;/a&gt;, you can make Home Assistant one of the most secure vendor-independent solutions available – if you use the security features correctly.&lt;/p&gt;
&lt;p&gt;Many users overlook important security features or don&amp;rsquo;t take full advantage of what Home Assistant offers. The problem: this creates unnecessary attack surfaces, so-called &lt;a class=&#34;link&#34; href=&#34;https://en.wikipedia.org/wiki/Attack_vector&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;attack vectors&lt;/a&gt;, through which hackers could break into your smart home. Whether it&amp;rsquo;s weak passwords, unsecured connections, or outdated software – it&amp;rsquo;s often small oversights that can have major consequences.&lt;/p&gt;
&lt;p&gt;In this article, I&amp;rsquo;ll show you 5 typical security mistakes and how to avoid them. I&amp;rsquo;ll give you tips to make Home Assistant even more secure. Whether you&amp;rsquo;re just setting up your smart home or have been using it for a while – these tips will help you identify potential vulnerabilities and better protect your home.&lt;/p&gt;
&lt;h2 id=&#34;mistake-1-using-weak-passwords-or-default-passwords&#34;&gt;Mistake 1: Using Weak Passwords or Default Passwords
&lt;/h2&gt;&lt;p&gt;A classic that is still underestimated: weak or even pre-set default passwords. Many smart home devices connected to Home Assistant come with simple default passwords like &amp;lsquo;admin&amp;rsquo; or &amp;lsquo;1234&amp;rsquo;. And the problem is: these passwords are not only easy to remember, they&amp;rsquo;re also easy to hack. Attackers use automated programs that try exactly these default passwords in seconds.&lt;/p&gt;
&lt;p&gt;Why is this dangerous? A weak password can allow attackers not only to gain access to your smart home, but through Home Assistant to all your devices and automations. Imagine someone being able to control your lights, access cameras, or even disable alarm systems – that would be an absolute nightmare.&lt;/p&gt;
&lt;p&gt;The solution is fortunately simple: change default passwords immediately after setting up your device. Use a strong password with at least 12 characters – length is more important than complexity here. Lowercase letters and digits are often perfectly sufficient, as long as the length is right.&lt;/p&gt;
&lt;p&gt;Even better is using a password manager like &lt;a class=&#34;link&#34; href=&#34;https://keepass.info/download.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;KeePass&lt;/a&gt;. It not only generates secure passwords but also stores them securely, so you only need to remember one master password.&lt;/p&gt;
&lt;p&gt;My tip: Give every user and every service in your smart home its own password. This minimizes the risk of a single compromised password putting your entire smart home at risk.&lt;/p&gt;
&lt;h2 id=&#34;mistake-2-ignoring-firmware-and-add-on-updates&#34;&gt;Mistake 2: Ignoring Firmware and Add-on Updates
&lt;/h2&gt;&lt;p&gt;Another major mistake that&amp;rsquo;s made frequently: not performing updates regularly. Home Assistant itself, as well as the devices you control with it, run on software that needs to be updated regularly – not just to get new features, but above all to close security vulnerabilities.&lt;/p&gt;
&lt;p&gt;Why is this so important? Outdated software is a goldmine for hackers. When vulnerabilities become known – and this happens more often than you might think based on media coverage – attackers can specifically search for devices with those security gaps. One &lt;a class=&#34;link&#34; href=&#34;http://www.insecam.org&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;website&lt;/a&gt;, for example, automatically lists surveillance cameras found to be unprotected from access.&lt;/p&gt;
&lt;p&gt;The good news: Home Assistant makes it easy to stay up to date. You can immediately see when updates are available on the dashboard. And with one click, you can install them. The same applies to &lt;em&gt;custom components&lt;/em&gt; you&amp;rsquo;ve installed through the Home Assistant Community Store (HACS).&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/ha_updates.png&#34;
	width=&#34;2430&#34;
	height=&#34;1272&#34;
	srcset=&#34;https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/ha_updates_hu13590989682832313209.png 480w, https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/ha_updates_hu8140414271161431925.png 1024w&#34;
	loading=&#34;lazy&#34;
	
		alt=&#34;Home Assistant displays available updates clearly&#34;
	
	
		class=&#34;gallery-image&#34; 
		data-flex-grow=&#34;191&#34;
		data-flex-basis=&#34;458px&#34;
	
&gt;&lt;/p&gt;
&lt;p&gt;My tip: Schedule regular maintenance windows for your smart home – at least once a month. Set aside 15 minutes to apply all available updates for Home Assistant, your add-ons, and devices. This not only makes your system more secure but also ensures everything runs smoothly.&lt;/p&gt;
&lt;h2 id=&#34;mistake-3-not-setting-up-a-separate-network-for-smart-home-devices&#34;&gt;Mistake 3: Not Setting Up a Separate Network for Smart Home Devices
&lt;/h2&gt;&lt;p&gt;A common mistake many smart home users make: connecting all their devices – from lights to thermostats to cameras – to the same network used by their laptops, smartphones, and tablets. This sounds convenient at first, but it&amp;rsquo;s exactly what can become a problem.&lt;/p&gt;
&lt;p&gt;What risks does this create? Smart home devices often have fewer security mechanisms than your laptop or smartphone. Many devices are only minimally secured or are based on older technologies that are vulnerable to attacks. If a hacker compromises a single device on your network – for example, a cheap smart plug or an unsecured camera – they gain the same access to your home network as a visitor in your home to whom you&amp;rsquo;ve given access to your private Wi-Fi.&lt;/p&gt;
&lt;p&gt;The solution? Set up a separate network for your smart home devices. This sounds complicated, but it&amp;rsquo;s easier than you might think.&lt;/p&gt;
&lt;p&gt;Most modern routers offer the option to create a so-called &lt;a class=&#34;link&#34; href=&#34;https://avm.de/service/wissensdatenbank/dok/FRITZ-Box-7590/294_WLAN-Gastzugang-in-FRITZ-Box-einrichten/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;guest network&lt;/a&gt;. You can use this not only for visitors but also for smart home devices that communicate via the manufacturer&amp;rsquo;s cloud – because those are exactly the ones critical to the security of your home network.&lt;/p&gt;
&lt;p&gt;Your Home Assistant installation, on the other hand, should be placed in your regular home network along with the smart home devices that don&amp;rsquo;t require internet communication. If you want to be extra safe, you can block those devices from accessing the internet through your router settings.&lt;/p&gt;
&lt;p&gt;Some routers like FritzBoxes ([buy here – affiliate link])(&lt;a class=&#34;link&#34; href=&#34;https://amzn.to/3W6bgOr&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://amzn.to/3W6bgOr&lt;/a&gt;) or UniFi Access Points ([buy here – affiliate link])(&lt;a class=&#34;link&#34; href=&#34;https://amzn.to/4foMsb8&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;https://amzn.to/4foMsb8&lt;/a&gt;) make it especially easy to set up guest networks and block access to the main network.&lt;/p&gt;
&lt;p&gt;You can tell whether a smart home device communicates via the cloud in Home Assistant by checking the relevant integration. If it says &amp;ldquo;Dependent on the internet,&amp;rdquo; that integration and its associated device is such a candidate. Devices that don&amp;rsquo;t communicate with the internet but directly with your Home Assistant installation cannot be reached by a hacker from the internet and are therefore less critical.&lt;/p&gt;
&lt;h2 id=&#34;mistake-4-not-using-two-factor-authentication&#34;&gt;Mistake 4: Not Using Two-Factor Authentication
&lt;/h2&gt;&lt;p&gt;A frequent mistake that often happens out of convenience or lack of awareness: not enabling two-factor authentication – or 2FA for short. Yet 2FA is one of the simplest and most effective measures to prevent unauthorized access to important systems like your Home Assistant installation and thus your smart home.&lt;/p&gt;
&lt;p&gt;Why should you care? Imagine someone gets hold of your password – through phishing, a data leak, or because you reuse the password across services. Without 2FA, attackers can immediately access your Home Assistant and control your entire smart home: capture camera feeds, manipulate automations, or view sensitive data. With 2FA, however, they also need a second confirmation code generated only on your device – which makes it nearly impossible for hackers to hijack your account.&lt;/p&gt;
&lt;p&gt;The good news: Home Assistant supports 2FA and makes setup straightforward. Simply go to &lt;em&gt;Settings&lt;/em&gt; under &lt;em&gt;Users&lt;/em&gt; and enable two-factor authentication. Use an authenticator app such as Google Authenticator, Authy, or Microsoft Authenticator. These apps generate new one-time codes every 30 seconds that you need to log in. Important: store the backup codes that Home Assistant generates in a safe place – for example, as a printout in a folder. This lets you recover your account if you lose access to the authenticator app.&lt;/p&gt;
&lt;p&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/ha_2fa.png&#34;
	width=&#34;2314&#34;
	height=&#34;1220&#34;
	srcset=&#34;https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/ha_2fa_hu12173406125923294381.png 480w, https://smarthome-aber-sicher.de/blog/2024/12/13/home-assistant-absichern-5-fehler-die-du-in-deinem-smarthome-vermeiden-solltest/ha_2fa_hu4074197406216766483.png 1024w&#34;
	loading=&#34;lazy&#34;
	
		alt=&#34;Two-factor authentication can be enabled under user settings&#34;
	
	
		class=&#34;gallery-image&#34; 
		data-flex-grow=&#34;189&#34;
		data-flex-basis=&#34;455px&#34;
	
&gt;&lt;/p&gt;
&lt;p&gt;My tip: Enable 2FA not just for your admin account, but for all users who have access to Home Assistant – especially for accounts other than your own. This gives you the assurance that nobody can unauthorized manipulate your system, regardless of the permissions of the associated user or how carelessly other users handle their passwords.&lt;/p&gt;
&lt;h2 id=&#34;mistake-5-integrating-insecure-or-unknown-devices-into-home-assistant&#34;&gt;Mistake 5: Integrating Insecure or Unknown Devices into Home Assistant
&lt;/h2&gt;&lt;p&gt;One of the biggest advantages of Home Assistant is that you can integrate devices from a wide variety of manufacturers. This makes your smart home extremely flexible, but it also comes with risks. Many users buy cheap smart home devices from unknown or questionable manufacturers without checking how secure they actually are.&lt;/p&gt;
&lt;p&gt;Why is this a problem? Insecure devices can act like a Trojan horse: if they are poorly programmed or intentionally built with backdoors, hackers can use these devices as an entry point into your network. Some cheap devices even send data unencrypted to servers you can&amp;rsquo;t control. This allows attackers not only to spy on your private data but also to gain access to other devices on your network.&lt;/p&gt;
&lt;p&gt;The solution? Buy devices from reputable manufacturers: make sure they provide regular firmware updates and support established standards like Zigbee, Z-Wave, or Matter.&lt;/p&gt;
&lt;p&gt;Check data transmission: use local integrations that communicate directly with Home Assistant, rather than devices dependent on a cloud. Platforms like Zigbee2MQTT or ESPHome are ideal because they give you full control over your data.
Block unnecessary traffic: with tools like a modern router or firewall, you can prevent devices from communicating with the internet without authorization.&lt;/p&gt;
&lt;p&gt;My tip: Be cautious with extremely cheap devices or products that offer little documentation or support. Infrequent updates can also be a warning sign. If you&amp;rsquo;re unsure, check reviews or community discussions about a device before buying – you&amp;rsquo;ll find out whether there are known vulnerabilities, whether the device should be considered potentially problematic, and how often updates are released.&lt;/p&gt;
&lt;h2 id=&#34;conclusion&#34;&gt;Conclusion
&lt;/h2&gt;&lt;p&gt;Avoiding these five security mistakes takes you a big step toward a more secure smart home. Which security measures are you already using? If you have additional tips, feel free to share them in the comments.&lt;/p&gt;
&lt;p&gt;








&lt;blockquote&gt;
    &lt;p&gt;&lt;figure&gt;&lt;img src=&#34;https://smarthome-aber-sicher.de/img/tibber_logo.svg&#34; width=&#34;20%&#34;&gt;
&lt;/figure&gt;
&lt;p&gt;Do you already have a dynamic electricity tariff? Tibber is one of the first providers to offer such a tariff in Germany. I&amp;rsquo;ve been a customer since October 2022, and it&amp;rsquo;s been a thoroughly positive experience. Tibber offers a clearly structured, modern app where you always have full oversight of your electricity tariff and costs. Pricing is very transparent: Tibber only charges what electricity actually costs on the exchange at any given moment (plus standard grid fees, etc.), plus a service fee of just €3.99 per month.&lt;/p&gt;
&lt;p&gt;If Tibber sounds like an option for you, I&amp;rsquo;d be glad if you sign up via &lt;a class=&#34;link&#34; href=&#34;https://invite.tibber.com/vkccaupl&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;my referral link&lt;/a&gt;. That gets both you and me &lt;strong&gt;€100 for the Tibber Store&lt;/strong&gt;, where you can buy various IoT hardware for your smart home. If you&amp;rsquo;re already a Tibber customer and haven&amp;rsquo;t used a referral link, you can &lt;a class=&#34;link&#34; href=&#34;https://support.tibber.com/de/articles/4601431-tibber-freund-innen-bonus#h_ae8df266c0&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;still do so within 14 days&lt;/a&gt; — use code &lt;code&gt;vkccaupl&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;Have questions or still unsure? Don&amp;rsquo;t hesitate to reach out. I&amp;rsquo;m happy to help you figure out whether Tibber is the right choice for you. And if it turns out it isn&amp;rsquo;t — you can cancel Tibber month by month at any time!&lt;/p&gt;
&lt;p&gt;Thank you for your support! It makes it possible for me to keep creating videos for you.&lt;/p&gt;
&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;
 





&lt;blockquote&gt;
    &lt;p&gt;Note: Links marked with &lt;em&gt;affiliate link&lt;/em&gt; are affiliate links. As an Amazon Associate I earn from qualifying purchases. This means I receive a small commission if you purchase through these links — at no extra cost to you. The revenue helps me run this blog and YouTube channel and keep creating content. Thank you for your support!&lt;/p&gt;&lt;span class=&#34;cite&#34;&gt;&lt;span&gt;― &lt;/span&gt;&lt;span&gt;Joachim&lt;/span&gt;&lt;cite&gt;&lt;/cite&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;/p&gt;
&lt;h2 id=&#34;related-articles&#34;&gt;Related Articles
&lt;/h2&gt;&lt;ul&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/post/ha-5-automation-fehler/&#34; &gt;These 5 Automation Mistakes Every Home Assistant User Has Made&lt;/a&gt; – Before security is solid, automations need to be reliable&lt;/li&gt;
&lt;li&gt;&lt;a class=&#34;link&#34; href=&#34;https://smarthome-aber-sicher.de/post/ha-5-neue-automation-fehler/&#34; &gt;5 More Home Assistant Automation Mistakes – Are You Affected?&lt;/a&gt; – Newer pitfalls around trigger IDs, script modes, and AI-generated automations&lt;/li&gt;
&lt;/ul&gt;
</description>
        </item>
        
    </channel>
</rss>
