This leak though, despite the location which should have made it almost instantly obvious, happens almost within 5 minutes of a torrential downpour that lasted better than an hour. Or appears that way, the squirrel lost his appetite after biting enough of a hole that there was a leak from above. Our attic had a new uninvited guest, and apparently PEX piping is very tasty. The idiot owners of this house (before us, not the current idiot owners) decided that the easiest place to put new plumbing was in the ceiling (maybe they were too fat too?). I am also very nearly too fat to crawl under the house, let alone do emergency plumbing while there.Īnother incident involved a squirrel. There were several more copper pinholes, but they were noticed as muddy places in the crawlspace while fixing the first, or just spidey-sensed. The water bill wasn't unusually high, or maybe it just frog-boiled its way up where we couldn't. Until they got bad enough that we had no hot water (which was about the time the floor started warping), there doesn't seem to be anyway that we might have noticed. Copper pipe pinholes, caused I don't know how much damage (including several ruined water heater elements, maybe even causing the water heater to fail prematurely). several under the house in the crawl space. Of all the leaks I've had these past 10 years, only two have been appliances, and one was high pressure (water heater). It is difficult to imagine the incentive structure that would make that possible.įinally, once this personal data has been harvested by either government, there is nothing to stop these governments or rogue elements within these governments from trading or sharing that data with your own government or other actors. I'd also question that a device that is by-design-compromised is otherwise secure from bad actors. While a foreign government is less likely to be interested in you personally and likely less able to directly cause you harm, you also have less recourse against them than against your own government and their interests are less likely to be aligned with yours.Īdditionally, your government may be able to co-opt the compromised devices anyway and would certainly have an incentive to do so. You should choose the devices that are the most secure, using the information you have available at the time.Ĭhoosing a foreign government to spy on you rather than your own government isn't a clear choice. > - HomeAssistant server hardware with Zigbee radio built in. > - USB adapter for Zigbee from HomeAssistant you can plug into any box you like. Your home's lights functioning properly ideally should not depend on bulbs/switches being able to get an IP address etc (sigh). I would take Zigbee home automation devices over crappy wifi ones any day of the week - its a vastly better protocol/methodology for hooking these sorts of devices up. I'm using a bunch of these Aquara Zigbee sensors with the open source Home Assistant software and hardware, they are for the most part fantastic. There is no WiFi/Ethernet or internet involved with anything Xiaomi here. The Zigbee sensors themselves have no network connection and therefore noway to warrant privacy concerns really. Thanks to Zigbee being a standard, you can use a Zigbee hub/adapter from any vendor you like. They have repeatedly proven to be a major privacy concern.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |