Origin uses best-in-class encryption for software updates, communication with ShaperHub, as well as data at rest.
The recent attacks on IoT devices target specific vulnerabilities that we've designed Origin to avoid. In particular:
- Origin ignores unauthorized requests, which is how attackers have been able to leverage unsecured IoT devices.
- Origin connects to Shaper servers using best-in-class authentication and encryption methods.
- Origin uses signed firmware updates to prevent the installation of malicious firmware.
We take your security very seriously, and that's why we've spent so much effort to keep Origin and your data secure.