Category Archives: Security

What You Need to Know about the US and California IoT Security Laws

In light of several high-profile data breaches, data security is now at the forefront when it comes to internet regulation. From the UK’s General Data Protection Regulation (GDPR) to the US Consumer Privacy Act (CPA), governments around the world realize that data protection is increasingly important. This is no different in the rapidly expanding IoT […]

EU IoT Regulation: What Your Business Needs to Know

Europe’s IoT ecosystem is thriving. Thanks to European Commission initiatives such as the Alliance for Internet of Things Innovation, the IoT European Platforms Initiative, and working documents to advance Europe’s IoT industry, the continent is expected to account for 25% of worldwide IoT spending by the year 2024. However, since the World Bank deemed regulatory […]

How to Overcome IoT Security & Privacy Challenges

The world of IoT is getting bigger and bigger. And while this makes our lives much easier, it’s also leaving our personal information and data privacy at risk. You may be reading this and wonder why security and privacy in IoT are so important? Well, the more we’re connected to the world of the Internet […]

The 5 Best Practices For Cloud and IoT Security

The cloud has become an extremely popular place for developers to place IoT systems and devices. The strengths of the cloud lie in how easy it is to scale up and how straightforward it is for users. That being said, that doesn’t tell the whole story. As the Internet of Things (IoT) continues to grow, […]

How to make a small, low-cost, remote accessible security camera with an ESP32

In our former blog post ‘RTSP P2P streaming through Nabto‘, where we talked about how to create an app that enabled remote accesses to an RTSP camera, we used a large Linux-based camera. Later on, we have received many requests on how to do the same type of integration to a ‘low-cost’ WI-FI module-based camera […]

Pairing and Access Control: Part 2 – Client Implementation

This is the second blog post of the two posts about access control in Nabto. The first post introduced access control and described how to use the uNabto framework and the access control list (ACL) module to enforce access control and pair users. Recall, the overall flow is as follows: user creates an RSA keypair […]

Pairing and Access Control: Part 1 – Intro and Device

This blog post is the first of two that describe all the steps necessary to implement a paired public key authentication (PPKA) based Nabto solution. This first part introduces concepts, explains how access control works in Nabto and dives into the details of implementing the uNabto device side of access control. Device in this context […]

Secure App Access to Raspberry Pi Camera

In this post we will show you how to set up a standard USB webcam with a Raspberry Pi (RPI) and the Nabto platform for easy access and high security: There are already many good guides out there that demonstrate how to setup a webcam with the RPI – but they all leave the reader […]

Security in Nabto P2P/IoT solutions

Security in IoT and especially in home security solutions has been subject for several recent articles and debate, for instance see http://thenewstack.io/snooping-webcam-reveals-security-dangers-internet-things/. Since the article above covers the general security issues of P2P, the same concerns of course apply to Nabto based solutions – this post addresses these concerns and summarizes the security principles of our […]