For the BLE protocol, we use standard Bluetooth security methods. For OTA we will use a Private-Public key encryption method with ECC to make sure no one is able to update your devices with malicious code.
For the BLE protocol, we use standard Bluetooth security methods. For OTA we will use a Private-Public key encryption method with ECC to make sure no one is able to update your devices with malicious code.