....
As I didn't get the switches working, I didn't dive too deeply into the API. I did spot this curious activity though.
When the light switch wasn't connected to the WiFi, the app assumes that it is on a different network to the switch and tries to communicate over a cloud service.
That IP is hard-coded into the app.
whois 58.96.172.115? An
unknown server in Hong Kong! The venerable nmap reckons the server is running Microsoft Windows Vista Home Premium SP1, Windows 7, or Windows Server 2008. Ok...
Right, it's communicating on port 80 - but let's see what incredibly secure authentication it is performing...
.....
Ah. So it sends a packet with the light switch's ID number in it. That appears to be all. I assume that the switch makes a similar persistent connection to that IP address so it can listen out for instructions. I was too scared to port scan the light switch