Almost ready · Pilot Program

Humia Hub Lyra

100% local and private home automation center. No voice processing. Ideal for environments that require absolute control without external connection.

We're closing the first series. Want to try Lyra before anyone else? We're looking for testers...

I want to join the Lyra pilot

No payment now. Selection by usage profile.

Humia Hub Lyra

✅ Complete local control

The hub works completely without Internet connection, thanks to its local architecture. It manages all home devices without the need for external servers, guaranteeing total privacy. Ideal for users who prefer to keep their home away from ecosystems like Google, Amazon or Apple, where personal data is usually part of the business model.

🌐 Compatibility with standard protocols

In addition to devices developed by humia, Lyra is fully compatible with:

  • Matter
  • Thread
  • Zigbee 3.0 and later versions
It does not require cloud registration or the use of external APIs. Configuration and use are 100% local.

🎯 One center, total control

Unlike fragmented ecosystems where you need multiple hubs and devices from different brands, humia centralizes all control in a single smart center. A single Hub Lyra manages your entire home automation constellation, from lights to sensors, without external dependencies or accounts on multiple platforms.

📱 Mobile app connected via local network

The official humia app automatically detects the hub if it's on the same WiFi network. It allows you to control and manage all devices without Internet connection. When the hub has no external connection, it can receive OTA updates directly from the app via local network.

🔄 Secure OTA updates

The system allows updates to be applied in a controlled and transparent way for the user. Updates can be performed remotely (if the hub has Internet connection) or locally, from the mobile app connected to the same network. The process is always under user control, without automatic installations or unauthorized external interventions.

🔐 Focus on privacy

No tracking. We do not register or track locally installed devices. All interactions between the app and the hub are cryptographically signed locally. Even in remote access, data is transmitted encrypted and signed by the hub, verifiable through its public key.

⚡ Optimized performance

Lightweight and efficient system, without cloud dependencies. Does not include voice processing or external AI. Integrates a self-learning system with local AI, which detects user habits and patterns to offer automations without manual intervention. All learning is done locally, without sending or storing data outside the home.

🌍 Optional remote access, with guaranteed privacy

humia allows you to control your home even from outside, without giving up privacy. This functionality is completely optional and is activated only if two conditions are met:

  • The hub is connected to the Internet.
  • The user has registered an account on the humia platform and has linked their hub to it.

Once activated, you can control and check the status of your home from anywhere, with total security.

🔐 Real end-to-end encryption

The hub encrypts data locally before sending it. The decryption key only resides on the mobile, and is transferred securely via local network during initial setup. humia's intermediate server cannot access the content: neither commands, nor states, nor conversations.

📶 Remote access for multiple devices

Local network use has no restrictions: you can control the hub from as many devices as you want, without registration or Internet connection. For encrypted remote access, 2 free licenses are included by default with the hub purchase (for example, for a mobile and a tablet). If you need to control your home from more devices outside the house, you can expand your remote access through additional licenses, always maintaining end-to-end encryption. This functionality is designed to scale without compromising system security or privacy.

👥 Guest access (local and remote mode)

You can generate temporary access for guests, either on local network or from outside the house. These accesses are based on temporary security signatures, created by the owner. They can be configured with a custom duration: from a few hours to several days or weeks. Guests will have limited permissions, only during the established time.