Network security and authentication
Initially we will use unencrypted communication without authentication, which requires physically isolated networks.
In the future we should look into these limitations, e.g. by using DTLS or mqttt.
Initially we will use unencrypted communication without authentication, which requires physically isolated networks.
In the future we should look into these limitations, e.g. by using DTLS or mqttt.
added protocol + 1 deleted label
removed 1 deleted label
changed milestone to %future