One of the other things that the network sniffing revealed was that Powerlink communicates with one of Visonic's servers in Israel (184.108.40.206 = myhome.visonic.com), passing on information such as changes in the alarm's status. This alone is a reason good enough why any user should know the backdoor to be able to disable this "feature". Even worse, the communication is via unencrypted http meaning that not only do you tell Visonic whether you're at home or not, but anyone with access to the network between you and Visonic can (theoretically) spy on you. Some information can actually be deduced from the URL's which probably means that if you live in an EU/EEA country, your ISP is required to store all this information up to two years due to the infamous Data Retention Directive, so that your government can have a record of when you leave your house and when you get home, and when you go to bed and get up if you regularly arm to the "home" mode. Stasi would drool if they had been shown the technology.
Users browsing this forum: Yahoo [Bot] and 1 guest