Atmospheric automated lighting, cost-saving heating plans or intelligent security solutions – smart home products promise numerous advantages for consumers. On the other hand, many consumers have reservations about networked devices, primarily security concerns.
For this reason, smart home manufacturer Eve has paid particular attention to privacy and data protection when developing its product portfolio.
Comprehensive security approach of Eve Smart Home products
In accordance with the security-by-design approach, the security focus of the manufacturer was implemented from the very first steps of product development of the eve solutions. In addition, privacy and data protection were taken into account when selecting compatible smart home systems, which is why the Eve products can only be integrated into Apple HomeKit.Loss of data through connection with bridges or hubs, which are commonly used with other smart home solutions, is also excluded. Because each product can be used independently.
This way, information on presence and absence, consumption and history data as well as costs and other data remain private.
Local data storage
Data recorded by Eve products, such as temperature curves or other historical information, can be viewed in the app. They are stored locally on the devices and on the Apple product used for control, with the exchange between the two being fully encrypted. The information is not created in the cloud or on external servers and therefore remains private.
Since neither the creation of an account nor the registration of the devices is necessary to use the App, the protection of personal data is also guaranteed.
Full transparency and control
To provide complete confidence that privacy and data protection are protected, Apple discloses the technologies, protocols and policies it uses in a freely available white paper.For the future, Apple also plans to introduce so-called “HomeKit-enabled” routers, which allow users to determine whether to allow communication beyond HomeKit.
In this way, the user is always informed about the extent to which data is exchanged and for what purpose – and can decide for himself how freely he is willing to share this information.