The Lifx bulbs are available with the stocks increasing in the countries like Australia, Asia, US, and Europe.
If you look at a typical Lifx set up, you will find a ‘master bulb’ having a control over the smart device and conveying all the information to ‘slave’ bulbs. Context’s team exposed the security lag by acting as a slave bulb and prompting the master bulb to send the very crucial Wi-Fi credentials.
Lifx’s reverse engineering mechanism also came to be poor when Context’s team was successful in decoding the Wi-Fi credentials supplied by the master bulb. There would not be any problem for the hackers if they get the Wi-Fi credentials as it was global and would help them hack any network that operates through Lifx via the skeleton key.
Despite all this bad news there is a ray of hope as the start-up’s response is quite proactive. There would now be a non-global Wi-Fi network credential taking care of the concerns related to the skeleton key. To steal the Wi-Fi credentials is not that easy as the attacker must be within a range of 30 metres of the wireless area.