Hello HA enthusiasts
A question to which the answer for me is not obvious, and there is not much material, at least so quickly to be found. Do you perhaps have any leads on a description of the protocol, e.g. ZigBee used by Tuya? Obviously the documents about ZigBee themselves are there, but I'm concerned with the implementation of data exchange by Tuya-compatible devices. Of course, the issue is security. ZigBee has some sort of encryption protocol there with a fixed key, so it's known how it is. But just because it supposedly has it implemented, doesn't immediately mean that the manufacturer also implements it and does it well. Just as with WiFi, it is not at all said that everything goes by WPA2, or even if it does, that the whole implementation is correct.
And since such devices can control quite important functions - e.g. doors, garage door, it is worth considering security. The problem of disconnection from the cloud itself has already been discussed and is a separate topic, but I am interested in the problem of security of the local network in which these devices operate.
A question to which the answer for me is not obvious, and there is not much material, at least so quickly to be found. Do you perhaps have any leads on a description of the protocol, e.g. ZigBee used by Tuya? Obviously the documents about ZigBee themselves are there, but I'm concerned with the implementation of data exchange by Tuya-compatible devices. Of course, the issue is security. ZigBee has some sort of encryption protocol there with a fixed key, so it's known how it is. But just because it supposedly has it implemented, doesn't immediately mean that the manufacturer also implements it and does it well. Just as with WiFi, it is not at all said that everything goes by WPA2, or even if it does, that the whole implementation is correct.
And since such devices can control quite important functions - e.g. doors, garage door, it is worth considering security. The problem of disconnection from the cloud itself has already been discussed and is a separate topic, but I am interested in the problem of security of the local network in which these devices operate.