Threat Modeling Made Practical
List realistic risks upfront: counterfeit modules, weak pairing, eavesdropping neighbors, and lost phones. Provide checklists, not lectures. Encourage updates, rotate keys on service visits, and log tamper events clearly. Homeowners handle responsibility better when presented with specific actions and helpful defaults rather than fear, jargon, or silence.