What does any of this have to do with cybersecurity? We're talking about weather data here! In our case, encryption is only used to get around filtering, more than protecting the actual data from interception over the wire. I know I for could one care less about my data being encrypted. I literally unencrypt and make it all publicly available anyway.
In my opinion, Acurite has left two "holes" for us to exploit and use to extract our own data from the Access. Which in their defense prevents complete lockdown and vendor lock-in. Which I personally believe is extremely important. The ability to easily extract this data is the entire reason I wrote Acuparse to begin with.
1) They do not check the cert validity, which would be stupid anyway since they would have to maintain them on the Access.
2) The Access will accept a 3rd party server to forward the data. Eliminating the need to set up a DNS redirect/hijack. Something that was not present at all on the SmartHub.
Acurite closing these two "holes" would definitely make things a little more complicated. I don't anticipate them ever using strict certificate checking, since replacing the certs on myacurite would require new Access firmware. It is my hope that the community of users that are extracting their own data are respectful enough, that Acurite will eventually embrace us. So far, I have not heard from them one way or the other.
With regards to the Altas, Acuparse "should" be able to parse this data. Once I get my hands on the data strings it is using to send data, I can begin working on support. This should be no different than how it is currently extracting 5N1 data; aside from the identification strings and any additional data readings.