Dojo security pebble protects all your smart home devices from hackers accessing your personal data. Considering are homes seem to be filling up with more and more smart home devices every day, the Dojo IoT might have quite a few fans out there. The new device, in the shape of a pebble, offers an Internet of Things security startup that can protect all of the smart devices inside the home.
The purpose of the Dojo pebble is to monitor all of the consumer’s home IoT devices around the clock in order to identify possible odd behaviors in order to fend off cyber-attacks. A simple color coded series of rings dispayed on the device will alert the user either that the problem has been identified and fixed by the pebble by displaying the orange ring or that the problem has been identified and needs to be fixed, in which case it will display a red ring.
When everything is fine with the smart devices in the home the Dojo will show a green ring to signal that no threats have been detected. The device is basically a black orb and resembles a pebble, it is wireless and battery powered and can be controlled by the Dojo’s client device via Bluetooth.
Although IoT security systems are a growing market in terms of the progress that is being made in the development of the devices, many people are still not convinced by the products. Reasons for people’s hesitation towards these products include the fact that the market itself is still torn when it comes to how the devices communicate with each other and the security threat that some buyers fear, considering that some of their home devices, such as baby monitors, are vulnerable to hacking as is.
But while many consumers chose specialized companies for their digital security because they have already tested products created by that company, such as antivirus software, the same kind of protection could be offered by the IoT and the devices have been gaining a bit of ground.
The Dojo pebble acts as an observer, analyzing the metadata concerning who devices communicate to and how, but does not look at the content that is being communicated over the network. This could come in handy as the device is focused on checking device activity so it can alert the client when abnormal behavior is detected. The client can then communicate with the device using his or her mobile phone and decide to either allow or block the activity that the device has marked as unusual.
Image source: https://pixabay.com