this post was submitted on 20 Nov 2023
2 points (100.0% liked)

Home Automation

79 readers
2 users here now

Home automation is the residential extension of building automation.

It is automation of the home, housework or household activity.

Home automation may include centralized control of lighting, HVAC (heating, ventilation and air conditioning), appliances, security locks of gates and doors and other systems, to provide improved convenience, comfort, energy efficiency and security.

Warning: Working with electricity can result in injury, property damage, or even death if it is not done properly. Please keep this in mind while assisting others. If you are not sure about what you are doing, hire a licensed professional.

Rules

founded 11 months ago
MODERATORS
 

Introducing an open-source, auto-configured home automation system based on Home Assistant. The system sets up a robust, secure infrastructure in minutes, ensuring top-notch security and privacy.

It's user-friendly, cost-effective (around $50), and offers out-of-the-box support for a broad range of IoT devices including ZigBee, Ethernet, Wi-Fi, and Bluetooth.

The project is available on GitHub: https://github.com/lucadibello/zerotrust-your-home

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 10 months ago (2 children)

Impressive. It’s set up like a corporation would do it. Very much overkill for most folks, but still a wonderful writeup. Hopefully it doesn’t turn out to need an entire corporate team just to manage and support it.

What you’re doing here is essentially what I do in my setup, but I haven’t ever attempted to write any of it down or automate the configuration of it. The main differences are: I use two piholes with VRRP addresses as my primary DNS servers, and then IPA as the actual source of record for most of the internal zones. IPA also backs a keycloak cluster which in turn backs my Cloudflare Access config via SAML and thus functions as the SSO arbiter for the tunnels. Also, these days I don’t go nearly as far out of my way to put unnecessary monitoring or restrictions on things just for the sake of “hardening” because it’s just a pain in the ass on down the road unless you’re some high profile target. I get into enough of this stuff at work that I don’t care to deal with it in my personal life. Well-known defaults and best-practices are plenty safe for the average user. 

In general, great writeup. Hopefully it helps guide some of the less experienced folks into setting up something better than what they already have

[–] [email protected] 1 points 10 months ago

I'd be curious to know more about your real world setup. I agree that some overkill may be necessary, but not for the majority of us that just want to stay behind closed doors, and at least open them when we see fit.

I've started down the path of securing and anonymizing my network a few months ago, but it's tough finding a more well laid out plan.

[–] [email protected] 1 points 10 months ago

Yes, this project might be a bit overkill if used in a home-setting, but the norm if employed in offices / any other workplace.

Thank you very much for your feedback!