Hi everyone,
I’m trying to understand the real-world security level of the Aqara U200, especially since it uses the Silicon Labs MG24 (EFR32MG24) SoC with secure boot and hardware-level key protection.
Right now I’m using the U200 with a HomePod mini (Matter/Thread) and no separate Aqara hub. Before I fully commit to this setup, I’d like to compare it with options like the iLOQ S50, Tedee, Danalock V3, Netatmo Smart Lock, etc.
I’m mainly curious about:
Hardware / crypto security
• Does the MG24’s secure storage make key extraction physically impractical if someone has device access?
• Are hardware attacks (fault injection, probing, etc.) considered realistically feasible on devices like this, or more “lab-only”?
• Do any of the above locks have known architectural weaknesses worth being aware of (at a high level)?
Ecosystem & attack surface
• Since the U200 relies on Thread / Matter, does that make it more exposed than something like iLOQ S50, which is a more closed system?
• If an attacker compromises an iOS device, how much risk does that introduce?
(e.g. could they manipulate the lock through Home/Matter controls?)
Logging / accountability
• With the U200, if someone did manage to unlock the door using the system,
would that typically be logged and traceable, or is silent access possible?
Best practices
• Are there specific security measures you recommend for users of the U200 (or similar locks) to reduce risk?
(account security, firmware updates, physical installation, etc.)
I’m not looking for instructions on how to attack anything — just trying to make an informed decision about whether sticking with the U200 is sensible, or whether something like iLOQ S50 offers materially stronger security in practice.
Thanks a lot for any insight!