Language Selection

English French German Italian Portuguese Spanish

Introducing Mozilla WebThings

Filed under
Moz/FF

The Mozilla IoT team is excited to announce that after two years of development and seven quarterly software updates that have generated significant interest from the developer & maker community, Project Things is graduating from its early experimental phase and from now on will be known as Mozilla WebThings.

Read more

Also: Mozilla "WebThings" No Longer An Experiment

The Mozilla IoT Team Announces Mozilla WebThings

Mozilla Looks Beyond the Browser With WebThings

  • Mozilla Looks Beyond the Browser With WebThings

    Mozilla is perhaps best known for its Firefox web browser, but that's far from the only thing the open-source organization is working on. On April 18, Mozilla relaunched its open-source internet of things (IoT) platform Project Things as WebThings as the effort moves beyond its experimental phase.

    The IoT landscape represents a particular set of challenges for developers, users and vendors alike as there are multiple competing standards and approaches to connect and control different devices. The challenges of IoT connectivity have led in some cases to interoperability issues and closed systems that make it harder to both integrate and secure devices.

Mozilla relaunches open source IoT platform Project Things

  • Mozilla relaunches open source IoT platform Project Things as WebThings

    For the better part of two years, the folks at Mozilla have been diligently chipping away at Project Things, an open implementation of the World Wide Web Consortium’s (W3C) Web of Things standard for monitoring and controlling connected devices, and today, they reached a major milestone. Project Things is graduating from its experimental phase with a new name — Mozilla WebThings — and gaining a number of logging, alarm, and networking features.

    “The Mozilla IoT team’s mission is to create a Web of Things implementation which embodies those values and helps drive IoT standards for security, privacy and interoperability,” wrote software engineer Ben Francis in a blog post. “We look forward to a future in which Mozilla WebThings software is installed on commercial products that can provide consumers with a trusted agent for their ‘smart,’ connected home.”

    Mozilla WebThings consists of two core components: WebThings Gateway, a privacy- and security-focused software distribution for smart home gateways, and WebThings Framework, a library of reusable software components.

  • Mozilla WebThings takes IOT open source

    • Mozilla WebThings takes IOT open source

      Mozilla, developer of the open source Web browser Firefox, has spent the past two years trying to make the Internet of things (IOT) as open as the Internet itself.

      Last week, it announced the launch of Mozilla WebThings, the graduation of its experimental Project Things to what it hopes will become the standard for IOT interoperability.

      Project Things first saw light two years ago as an open implementation of the World Wide Web Consortium's (W3C's) Web of things standard for monitoring and controlling connected devices.

      According to W3C CEO Dr Jeff Jaffe, the Web of Things Working Group was set up in an effort to counter the fragmentation of IOT, reduce the costs of development and lessen the risks to investors and users, as well as encourage growth in the market for IOT devices and services.

    Comment viewing options

    Select your preferred way to display the comments and click "Save settings" to activate your changes.

    More in Tux Machines

    Security Leftovers

    • Why Are Cryptographers Being Denied Entry into the US?

      Is there some cryptographer blacklist? Is something else going on? A lot of us would like to know.

    • Security Engineering: Third Edition

      Today I put online a chapter on Who is the Opponent, which draws together what we learned from Snowden and others about the capabilities of state actors, together with what we’ve learned about cybercrime actors as a result of running the Cambridge Cybercrime Centre. Isn’t it odd that almost six years after Snowden, nobody’s tried to pull together what we learned into a coherent summary?

      There’s also a chapter on Surveillance or Privacy which looks at policy. What’s the privacy landscape now, and what might we expect from the tussles over data retention, government backdoors and censorship more generally?

    • Google halts some business with China's Huawei: report

      Huawei will reportedly no longer be able to access Android updates, the Gmail app, the Google Play store and new versions of Google phones outside of China.

    • Google restricts Huawei's use of Android

      Existing Huawei smartphone users will be able to update apps and push through security fixes, as well as update Google Play services.

      But when Google launches the next version of Android later this year, it may not be available on Huawei devices.

      Future Huawei devices may no longer have apps such as YouTube and Maps.

    • Forget Huawei, The Internet Of Things Is The Real Security Threat
      We've noted for a while how a lot of the US protectionist security hysteria surrounding Huawei isn't supported by much in the way of hard data. And while it's certainly possible that Huawei helps the Chinese government spy, the reality is that Chinese (or any other) intelligence services don't really need to rely on Huawei to spy on the American public. Why? Because people around the world keep connecting millions of internet of broken things devices to their home and business networks that lack even the most rudimentary of security and privacy protections. Week after week we've documented how these devices are being built with both privacy and security as a distant afterthought, resulting in everything from your television to your refrigerator creating both new attack vectors and wonderful new surveillance opportunities for hackers and state actors.

    today's howtos

    Android Leftovers

    A Look At The MDS Cost On Xeon, EPYC & Xeon Total Impact Of Affected CPU Vulnerabilities

    This weekend I posted a number of benchmarks looking at the performance impact of the new MDS/Zombieload vulnerabilities that also included a look at the overall cost of Spectre/Meltdown/L1TF/MDS on Intel desktop CPUs and AMD CPUs (Spectre). In this article are similar benchmarks but turning the attention now to Intel Xeon hardware and also comparing those total mitigation costs against AMD EPYC with its Spectre mitigations. This article offers a look at the MDS/Zombieload mitigations on a 1st Gen Skylake Xeon Scalable server as well as a Kabylake Xeon E3 server for reference. Following that is a look at the total CPU vulnerability mitigation costs for 1st Gen Xeon Scalable, 2nd Gen Xeon Scalable (Cascade Lake), and an AMD EPYC 2P server as well for its Spectre mitigations. As expected given Intel's guidance last week of their latest Xeon processors being mitigated for MDS, indeed, the dual Xeon Platinum 8280 Cascade Lake server reported it was not affected by the MDS mitigations and thus not enabled. So for the MDS tests up first it's just some reference results using a dual Xeon Gold 6138 Skylake server running Ubuntu 19.04 with the Linux 5.0 patched kernel and reference results side-by-side for a separate Xeon E3-1275 v6 server. Read more