Crunchy on the outside, soft in the middle has not not worked as a security model. The list of hacked routers actively in use as part of a botnet right now is in the millions and these are brand names, not off the boat unsupported junk. IT's time to put our game face on lest all our devices join the routers as well.
I'm sure the NSA will be delighted to collect from IoT manufacturers who have to find 20 billion primes to create the public key crypto required. Just hack each manufacturers keyspace database. Come on, you know they will.