Tuya provides various security strategies to effectively ensure data security of user and device.
1. As for device access, Tuya proprietary algorithms are employed to ensure data isolation, access
authentication, applying for authorization.
2. As for data communication, communication using security algorithms and transmission encryption protocols, and military-level information encryption transmission based on dynamic keys are supported.
3. As for data processing, strict data filtering and validation and complete data audit are applied.
4. As for data storage, all confidential information of users will be safely encrypted for storage.