What are you doing to prevent government tampering, MITM attacks, or other dangers? You seem to have put a lot of thought into the security of the implementation, though it might help you spread it to the do-it-yourself-er culture if you explained what you were doing a bit to keep things secure.<p>Is the cipher completely encrypted all the way from the phone to the desktop, whilst being tunneled through your server?<p>And if it's as secure as you say it is, what stops people from proxying their own arbitrary payloads through your tunnel? (-- that is to suggest that you're being as honest as you are about not decrypting anything the entire way from the phone through your cloud to the desktop...)<p>If it's that secure, what would stop a botnet from theoretically leveraging this as misdirection?<p>And what is the purpose of the cloud server here? If someone had their own hosting, would they still need to rely on your server to route the commands?<p>All questions and criticisms aside, I've always wanted something that could do this for my house without having to rely on an external entity... I think paranoia has taken a rather large toll in our culture today, because anything with the word 'cloud' in it starts to give all programmers the chills unless it comes with some assurances of trust, longevity, and ultimately devotion.<p>I'd almost suggest selling a piece of hardware that people could install in their houses, simply because it's extensible for your purposes, users can maintain control over it, and it's far more difficult to isolate as a target, and ultimately it allows people to decide whether to "connect indefinitely to any company" for continued operation.<p>I mean, if you pick up any cloud-based mobile control software from any major manufacturer today, they all create this massive problem of a surrogate dependency on the cloud in their implementation.<p>These days you can't even set up an IR mobile control product without sending out your wifi password through a web-based silverlight UI hosted in the cloud just to get it to the product that's meant to use it! That's so far backwards security-wise that it's teaching people to send their login credentials the wrong damned way!<p>Hopefully everyone sees what's going on here?