Z-Shave. Exploiting Z-Wave downgrade attacks
2018-05-28
Z-Wave uses a shared network key to secure traffic. This key is exchanged between the controller and the client devices (‘nodes’) when the devices are paired. The keys are usedRead More →