How do you protect the configuration from unauthorized modification?

How do you protect the configuration from unauthorized modification?

2022-06-01

The
debug interface has been closed, and unauthorized users cannot access it, and
Wi-Fi and BLE interface can’t be access without authorization.

1.Physical
protection: There isn’t any external interfaces on device that allows reading /
writing firmware data or configuration data.

2.Network
connection protection: There is authentication mechanisms sitting in both
cloud, application and device to prevent any malicious/unauthenticated
connections.

COMPARTILHAR