Connect with us

Technology

Nanoleaf finally launches a smart switch after eight years of trying

Published

on

Nanoleaf finally launches a smart switch after eight years of trying

After nearly a decade of development, Nanoleaf’s smart switch is finally here. You can pre-order the $30 Sense Plus Smart Wireless “Anywhere” Switch today, and it should ship in October. But to get to this point, Nanoleaf had to pivot from its adoption of Thread and create a new, proprietary protocol called Litewave.

The battery-powered device brings physical control to Nanoleaf’s smart lighting system, allowing you to press a button to turn lights on or off, dim or brighten, or change colors. Plus, built-in motion and light sensors let the Sense adjust your lighting based on room conditions.

“We needed to make sure that our products would work reliably with less dependence on the platforms,” Gimmy Chu

The Sense, a version of which was first announced in 2020 and then again in 2023, has been long anticipated by fans of the company’s RGB lighting line. The wireless smart switch allows you to control all the lights in one room or multiple rooms without using voice or pulling out your phone. It’s a similar concept to Philips Hue’s wireless dimmer switch or Lutron Caseta’s Pico remote, and can also be mounted on a wall plate like a traditional light switch or used as a portable remote.

I got some hands-on time with the Sense at the IFA tech show. It has six buttons: on/off, dim/brighten, and the two configurable buttons. It’s a tad bulky but lightweight.
Photo by Jennifer Pattison Tuohy / The Verge
Advertisement

However, in addition to standard lighting controls, the Sense features two configurable buttons that can be programmed in Nanoleaf’s app or set up to work with Apple Home and Samsung SmartThings through Matter.

This lets you create automations with other devices to have, say, a “Movie Time” scene that closes the shades, dims the lights, and adjusts the thermostat with the press of a button. But, because not all Matter platforms support smart buttons yet, the Sense’s Matter integration is currently in an early access program.

The Sense uses two protocols simultaneously to connect with Nanoleaf’s lights. Matter over Thread and Litewave, a technology the company developed specifically for this product. A proprietary local protocol that works over the same 802.15.4 radio as Bluetooth/Thread, Litewave allows the switch to communicate with all Nanoleaf lights, whether they use Thread, Bluetooth, or Wi-Fi.

1/2

The Sense works with all Nanoleaf’s current smart lights, regardless of their protocol. These Essentials bulbs and light strips use Thread and Bluetooth.
Image: Nanoleaf
Advertisement

According to Nanoleaf co-founder and CEO Gimmy Chu, finding the right technology to produce a reliable wireless switch experience has taken eight years. “We needed a low-power networking solution, like Thread, and we also needed a common communication protocol — like Matter,” he says. However, while the company is a big proponent and early adopter of Thread, it has struggled with its Matter over Thread implementation. This led it to develop the proprietary protocol to ensure its new smart switch would work reliably with all its smart lights. 

In an interview with The Verge, Chu attributes some of these struggles to the complexity of Matter and its multiple platforms. “We don’t have control over the Matter controller, which is responsible for making sure that things like pairing work correctly and that Thread network is being maintained correctly,” he says. “We needed to make sure that our products would work reliably with less dependence on the platforms.” 

Chu says Litewave provides a robust and reliable local connection that enables instantaneous control — as fast as flipping a light switch. “With it, we can simultaneously be part of the Matter over Thread mesh network and also support our communication,” he says. Litewave also doesn’t require a Thread border router or Matter controller to work, making setup simpler for users. You only need those additional devices if you choose to enable Matter.

Advertisement

Over Litewave, the Sense controls multiple Nanoleaf lights immediately with no “popcorn” effect (where lights pop on one after another). Chu showed me this in action during our video interview: a dozen downlights turned on and off instantly as he pressed the button. “We’ve tested it with over 100 devices across 10,000 square feet, and everything is instantaneous with about 100 percent reliability,” he says.

In another shift away from relying solely on Thread, Nanoleaf is releasing its first Matter over Wi-Fi light bulb — all its current bulbs use Thread. The full-color and tunable white Essentials Matter Wi-Fi A19 Smart Bulb is developed for Walmart and costs $29.99 for a two-pack (you can also buy it at Nanoleaf’s webstore for $49.99 for four).

Chu says they decided to go with Wi-Fi because they feel like Thread is still too niche for the Walmart customer. “The mass market does not know what Thread is,” he says. “When launching into a place like Walmart, we wanted to make sure we were catering to as broad an audience as possible.”

“The mass market does not know what Thread is,” Gimmy Chu

Nanoleaf isn’t the only company hedging its bets on Matter over Thread. After several Thread-only launches, Aqara’s latest lighting products work with Thread and Zigbee — the protocol it used to connect all its devices prior to working with Thread. The company says it did this because Zigbee currently provides more features on its platform than Matter over Thread, and it wanted to give its users the choice. 

Advertisement

The just-released Thread 1.4 update is supposed to address many of the current issues, and as Matter develops, feature parity should arrive. But it will take a while for manufacturers to implement the new Thread spec. In the meantime, companies like Nanoleaf have little choice but to look for alternative solutions while Thread sorts itself out.

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

The mystery behind those creepy 'Unknown' spam calls

Published

on

The mystery behind those creepy 'Unknown' spam calls

Scammers are becoming more sophisticated in their attempts to steal your sensitive data. One particularly concerning trend is the rise of targeted phone scams, where callers possess just enough information to seem legitimate but are actually phishing for more details to exploit.

Recently, we received an email from James in LA detailing his unsettling experience with a series of suspicious phone calls. His story serves as a stark reminder of the importance of vigilance in protecting our personal information. Here’s what James shared with us:

“I have received multiple random unknown calls (in the past two months), and they always start with the person calling me on the phone (listed as unknown) and providing my full name. Absolutely Correct. Then, ask if I am that ‘name, in (insert city). Then, when I say no, you have the wrong guy, they provide a birthdate and ask if it is mine, which, of course, it is Not. Then, they politely apologize, say thank you, and hang up. At that point, you realize that they never told you who they are representing. Maybe I’m paranoid, but it just seems strange.”

James’ experience is not unique. Many people across the country are reporting similar incidents, where callers seem to have a partial set of personal information and are attempting to verify or expand upon it. This tactic, known as “social engineering,” is a common method used by scammers to gain trust and extract valuable data.

GET SECURITY ALERTS, EXPERT TIPS — SIGN UP FOR KURT’S NEWSLETTER — THE CYBERGUY REPORT HERE

Advertisement

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

Where scammers get their information

The mystery behind these creepy ‘Unknown’ spam calls often begins with data breaches or information leaks. Scammers obtain partial information from various sources, including public records, social media profiles or purchased data from the dark web. They then use this incomplete data as a starting point for their phishing attempts, aiming to fill in the gaps and create a more complete profile of their targets.

man on phone

A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)

4.3 MILLION AMERICANS EXPOSED IN MASSIVE HEALTH SAVINGS ACCOUNT DATA BREACH

Understanding the scammer’s playbook

Let’s break down the tactics used in these calls:

Partial Knowledge: The scammer starts with some correct information, like a full name and city. This creates an illusion of legitimacy and can catch you off guard. However, they might be phishing for more details, like your birthdate.

Advertisement

Verification requests: By asking to confirm additional details like a birthdate, the scammer is attempting to gather more valuable personal information.

Vague identity: The caller never identifies themselves or their organization, making it difficult to verify their legitimacy or report them later.

Polite disengagement: The quick, polite end to the call is designed to leave the recipient feeling that nothing suspicious has occurred, reducing the likelihood of immediate suspicion or action.

These tactics are carefully crafted to exploit human psychology. The initial correct information builds trust, the request for verification seems reasonable and the polite exit leaves the recipient with a positive final impression.

seated man with phone

A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

Advertisement

The dangers of information gathering

You might wonder, “What harm can come from confirming my birthdate?” Unfortunately, in the wrong hands, even small pieces of information can be dangerous. Scammers can use these details to:

  • Build a more complete profile for identity theft
  • Access accounts or reset passwords
  • Impersonate you in other scams or fraudulent activities
  • Sell your information on the dark web

Data is a valuable commodity these days, and every piece of personal information should be guarded carefully.

woman speaking on phone

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

MASSIVE DELL DATA BREACH HITS 49 MILLION USERS — WHAT THIS MEANS FOR YOUR PRIVACY AND SECURITY

8 steps to protect your personal information

In light of the sophisticated tactics employed by scammers, it is important to protect your personal information. Here are some measures you can implement:

1. Avoid sharing information with unknown callers

It is essential to never provide personal information over the phone to unknown callers. Always use caller ID and refrain from answering calls from numbers you do not recognize. If you do answer a call, avoid confirming or denying any information the caller claims to have. Be particularly wary of callers who create a sense of urgency or use fear tactics to manipulate you.

man speaking on phone

A man talking on his cellphone. (Kurt “CyberGuy” Knutsson)

2. Verify caller identity

When you receive a suspicious call, ask for the caller’s name, the company they represent and a callback number. However, do not call back immediately; instead, take the time to research the company independently. Look up official contact information online and call that number to verify the legitimacy of the initial call.

Advertisement
another woman speaking on a phone

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

3. Enable spam-blocking features

To further protect yourself, enable spam-blocking features on your phone. You may also consider using call blocking apps which can help screen calls and identify potential spam. 

Additionally, regularly updating your phone’s operating system will ensure that you benefit from the latest security features and protections.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

4. Report suspicious activity

If you encounter suspicious calls, it is important to report them to your phone carrier. You should also file a complaint with the Federal Trade Commission (FTC). If you believe you have been a victim of fraud, consider reporting the incident to local law enforcement to help protect yourself and others in your community.

woman in purple hat talking on phone

A woman talking on her cellphone. (Kurt “CyberGuy” Knutsson)

5. Remove your personal information from the internet

To reduce your online presence, consider using a data removal service. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap — and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites.  

Advertisement

It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with the information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. Additionally, make it a habit to regularly Google your name and phone number to see what information is publicly available about you.

6. Use an identity theft protection service

Identity theft companies can monitor personal information like your Social Security number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. 

One of the best parts of using some services is that they might include identity theft insurance of up to $1 million to cover losses and legal fees and a white-glove fraud resolution team where a U.S.-based case manager helps you recover any losses. See my tips and best picks on how to protect yourself from identity theft.

7. Secure your accounts

To enhance the security of your online accounts, use strong and unique passwords for each one. It is also wise to avoid using easily guessable information, such as birthdates, in your passwords. Consider using a password manager to generate and store complex passwords. Also, enabling two-factor authentication wherever possible on your devices adds an extra layer of security.

Advertisement

8. Be cautious on social media

When using social media, review and tighten your privacy settings to limit who can see your personal information. Be mindful of the details you share publicly, as scammers often use social media to gather information. Additionally, avoid accepting friend requests or messages from unknown individuals to reduce the risk of falling victim to scams.

By implementing these comprehensive steps, you will significantly reduce your risk of falling victim to phone scams and identity theft. Remember that protecting your personal information is an ongoing process that requires vigilance and regular attention.

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

Kurt’s key takeaways

Scammers are constantly evolving their tactics, making it crucial for us to stay one step ahead. James’ experience serves as a wake-up call for all of us. It’s not just about being cautious; it’s about being proactively defensive with our personal data.

Remember, every piece of information you share, no matter how small, can be a puzzle piece for scammers. Your birthdate, your city, even your social media posts — they’re all potential tools in a scammer’s arsenal. But don’t let this paralyze you with fear. Instead, let it empower you to take control of your digital footprint. 

Advertisement

By implementing the steps we’ve discussed — from being alert on phone calls to using data removal and identity protection services — you’re not just protecting yourself. You’re also making it harder for scammers to operate, potentially saving others from falling victim.

What’s the most unusual or clever scam attempt you’ve encountered, and how did you handle it? Your experiences could help others recognize and avoid similar scams in the future. Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

How to watch Apple’s ‘Glowtime’ iPhone 16 event

Published

on

How to watch Apple’s ‘Glowtime’ iPhone 16 event

The iPhone 16 is nigh as Apple prepares to debut its next smartphone lineup on Monday, September 9th, at 1PM ET / 10AM PT. The company is expected to officially announce four phones as usual, with two standard iPhone 16s and two iPhone 16 Pro models, all likely packed with Apple Intelligence AI features.

You can catch the livestream at Apple’s own website, on its YouTube channel, and even on an Apple TV. (Apple usually makes sure you see this when you scroll from the home screen of the Apple TV app, but you can search for “Apple Event” to find it, too.)

Besides new iPhones, Apple will probably declare the release dates for its next major software updates, including iOS 18, iPadOS 18, macOS 15 Sequoia, WatchOS 11, and visionOS 2. The first three of those operating systems will include Apple Intelligence when it debuts, though you’ll need at least an iPad or Mac with an M1 chip or an iPhone 15 Pro to take advantage.

Continue Reading

Technology

Fox News AI Newsletter: AI version of dead actor

Published

on

Fox News AI Newsletter: AI version of dead actor

Welcome to Fox News’ Artificial Intelligence newsletter with the latest AI technology advancements.

IN TODAY’S NEWSLETTER:

– ‘Alien: Romulus’ director defends AI version of dead actor’s likeness after fan backlash
– Nvidia is ‘one of best companies ever’ to adapt with market landscape: Adam Kobeissi
– Buy Nvidia between $95 and $104: D.R. Barton

Yaphet Kotto, Sigourney Weaver, Ian Holm in a scene from Alien

Yaphet Kotto, Sigourney Weaver and Ian Holm, right, appear in “Alien.” (Robert Penn/20th Century Fox/Kobal/Shutterstock)

‘ALIEN’ RESURRECTION: Fans of the “Alien” franchise had a few concerns about the appearance of beloved actor Ian Holm brought back to life by artificial intelligence.

CHANGING MARKET: Kobeissi Letter editor-in-chief Adam Kobeissi said to expect volatility with AI-focused Nvidia’s stock, and that the dips are buying opportunities, on FOX Business’ “Making Money.”

Advertisement
Sen. Elizabeth Warren and progressives are taking issue with what they see as Nvidia's outsized influence in the AI chip market.

Sen. Elizabeth Warren and progressives are taking issue with what they see as Nvidia’s outsized influence in the AI chip market. (Justin Sullivan/Getty Images)

WHEN TO BUY: Woodshaw Financial Group principal D.R. Barton analyzes Nvidia and reveals when he would buy the stock on FOX Business’ “Varney & Co.”

NOT DONE YET: Rob Luna Wealth Academy founder Rob Luna discussed what’s behind Nvidia’s stock plunge on FOX Business’ “Making Money.”

Nvidia processor AI

Nvidia logo displayed on a phone screen and microchip and are seen in this illustration photo taken in Krakow, Poland on July 19, 2023. (Jakub Porzycki/NurPhoto via Getty Images)

Subscribe now to get the Fox News Artificial Intelligence Newsletter in your inbox.

FOLLOW FOX NEWS ON SOCIAL MEDIA

Facebook
Instagram
YouTube
Twitter
LinkedIn

SIGN UP FOR OUR OTHER NEWSLETTERS

Advertisement

Fox News First
Fox News Opinion
Fox News Lifestyle
Fox News Health

DOWNLOAD OUR APPS

Fox News
Fox Business
Fox Weather
Fox Sports
Tubi

WATCH FOX NEWS ONLINE

Fox News Go

Advertisement

STREAM FOX NATION

Fox Nation

Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future with Fox News here.

Continue Reading
Advertisement

Trending