technerd
Member
Interesting info Collin, especially with info on the Demark.CollinR said:...If you can disarm the control via the internet then possibly so can others. The data bus for Ademcos I am sure has been broken however I have searched and searched and never could find it. What you have basically done is make your local network and internet connection a weak link for not much reason. Arming is no big deal, no threat would arm the system unless their goal is to annoy.
This is a simple problem with POTS...
Ask if you can have the Demark relocated, in Tulsa I can have new construction done this way almost every time.
If you can't do that just add another demark with 24 hour no trouble zones inside both sides of the cable. You can also do both! You can backfeed the bogus demarks so even test equipment can't tell the correct one without disconnecting it. It's less then $100 one time per box.
You can do the same thing for CATV/cable internet.
This will work well no matter who monitors it and leave the few smart enough to try messing with the POTs stuff a little confused.
I would be interested to see whats in the box, so keep us up to date.
It is stupid that the POTS Demark is so easily and readily identified and accessible, I never thought about having it moved - I guess I never wanted to go through the hassle either.
With the web arming/dis-arming, I do understand it's another potential vulnerability, but I feel pretty good about it because I use only strong passwords generated by GRC's random password generator, to get access to my secure web pages. Also, from what I understand, the alarm key code is required to be used to arm/dis-arm via the web, so that makes it doubly secure.
I plan to get SMS also anytime my alarm is armed/disarmed, so I will know if someone other than me has changed the alarm state.
I'm home today awaiting my receipt of the package so I can't wait to get it.