Lots of eyes on these discussions, I am particularly interested.

The old heat-pump finally bit the dust.  The new unit is a Trane, that uses a 
Trane thermostat but it’s connected to the internet via Nexia.

There is an App in the Apple store for this BUT I had to give them access to my 
network for the thermostat to work.  The inside unit has a computer board that 
is continually blinking as it performs it’s functions…and believe me they can 
tell every detail about the status.  Another board in the outside unit, and the 
thermostat is as sophisticated  as our Mac’s.  I had always thought I would 
want a Nest thermostat, but this is far more powerful.

However now they are into my network and I need to have Lee or someone else 
tell me the best way to keep the info on the computers secure.  

Setting a difficult password to get into the computers may help but Lee do I 
want to encrypt the entire system?

The MacPro has 4 drives, do I encrypt each one or if you tell the system to 
encrypt through FileVault will it encrypt ALL the drives?

I didn’t want to allow this but with this unit I didn’t really have a 
choice….on the positive side I can set the temp from my phone, I can set up 
geofencing so when I get within the distance i specify to the residence it will 
change the temp.  It allows me to set runtime schedules, view the runtime 
history for heat and cool.  set the fan, turn on emergency heat, gives me 
recent activity, tells me the temp in the house, the outside temp, and the 
humidity…..all on the iPhone.

But it is disconcerting, 

I had wanted to set this up on the second network “guest” but if I put this on 
that network OR change my computers to the guest network then I won’t have 
access to the system….is that right?

If so then encryption is the only way I can think to keep my data safe.

Suggestions appreciated.


John




> On Apr 28, 2017, at 9:43 AM, Lee Larson <leelar...@me.com> wrote:
> 
> 
>> On Apr 27, 2017, at 9:59 PM, Jonathan Fletcher <li...@fletcherdata.com 
>> <mailto:li...@fletcherdata.com>> wrote:
>> 
>> Be afraid. Or smart. There are no other options.
> 
> 
> I read the article and the comments… encryption was never mentioned. All 
> encryption schemes include digital signatures, which are almost impossible to 
> spoof.
> 
> L^2
> 
> ---
> ‌Lee Larson‌
> ‌leelar...@me.com <mailto:leelar...@me.com>‌
> 
> ‌I hate to advocate drugs, alcohol, violence, or insanity to anyone, but 
> they've always worked for me. ‌— Hunter S. Thompson, 
> ‌‌
> 
> 
> 
> 
> 
> _______________________________________________
> MacGroup mailing list
> Posting address: MacGroup@erdos.math.louisville.edu
> Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/>
> Answers to questions: <http://erdos.math.louisville.edu/macgroup/>

_______________________________________________
MacGroup mailing list
Posting address: MacGroup@erdos.math.louisville.edu
Archive: <http://www.mail-archive.com/macgroup@erdos.math.louisville.edu/>
Answers to questions: <http://erdos.math.louisville.edu/macgroup/>

Reply via email to