This is why you shouldn’t use cloud services for personal security, because the cloud is just someone else’s computer.
Also, quit putting unnecessary, Internet connected cameras indoors.
I seriously cannot fathom the amount of people that seem to want to put cameras up in their own bedrooms and just let them stream video constantly.
It has nothing to do with any serious home security, and everything to do with mindless consumerism. Hopefully it’s a trend that will pass.
In general, cloud services have far better security than DIY systems. All of the hacked systems in this article are home based systems.
deleted by creator
According to the article, attackers used automated scanning software, which strongly implies they brute-forced cameras connected to the Internet with default or weak credentials. That has nothing to do with whether or not the service is based in the cloud.
This is a known problem with popular brands of security cameras sold in Vietnam, that the default configuration has an admin password of “admin” or “12345” accessible from the public Internet. They’re basically sold insecure, and rely on customers to consciously adopt a custom configuration to be secure.
Although, in order to be publicly accessible, one would imagine that they’ve had to configure their firewall to let outside signals to the devices themselves. Or maybe some kind of ddns setup.
Either way, it doesn’t have anything to do with the cloud, and the parent comment is basically right about that.
Although, in order to be publicly accessible, one would imagine that they’ve had to configure …
I’m guessing there are providers in Vietnam offering remote access accounts and apps, the same as 90% of IP security cameras on AliExpress, Amazon, eBay etc. Most of the zero config ones are authenticated with a cloud server 24/7 to enable remote viewing. This being Vietnam specific leads me to believe that the “hackers” are actually a domestic crime org selling compromised hardware; could be as simple as opening the box and obtaining device information (like the serial, MAC, or QR code) before shipping the product.
In general, cloud services have far better security than DIY systems.
Where are you pulling this from? These aren’t “DIY”. DIY is when you roll your own remote network access (e.g. VPN, DDNS, port forwarding, etc) or FOSS software/hardware. I’d trust most DIY systems more than any cloud provider, because most DIY systems would be LAN only or VPN accessible. The QR code authentication mentioned in the article sounds like these are generic IP security cameras of stock firmware, that utilize a cloud server to enable remote viewing over the internet. Even reputable cloud services use the same method to connect or setup individual cams to their cloud.
All of the hacked systems in this article are home based systems.
That doesn’t mean the exploits used are of no fault of the user — from the vendors authentication implementation, software, or hardware.
You can’t connect home system that is never connected to internet, basically make home server and hook up cameras and don’t ever connect that to internet
The problem is cameras like these, the kind that people are putting up inside their own homes, facing their living spaces, their own damn bedrooms, they’re sold to people that have this desire to be able to check in with those cameras remotely at any time, without a good reason.
The only reason my mother seems to have crap like this set up is so she can see the dogs when she’s not home. They’re just sleeping.
Internet connected, living space directed cameras are this bizarre consumer electronics trend that has no legitimate use case for like 90% of the people that rush to use it. Certainly not one that merits the security risks and the privacy invasion that they are inviting on themselves.
Half the reason to own a security camera system is so you can monitor it while away. Can’t do that if the system isn’t online.
Online or cloud-accessed? Those are two separate things.
Maybe, but the difference is a lot more people are going to be looking to target the cloud provider than your home network. To say nothing of the fact that your videos on the cloud are subject to the terms and services that you agree to and those terms can be changed at any time. And also the fact that you can’t guarantee that the stuff you delete off of that server is actually being deleted.
a lot more people are going to be looking to target the cloud provider than your home network.
I can show you logs with tens of thousands of hits from all IPs all over the globe trying to gain access to a single NVR that has a port open on the WAN side of a network.
Besides email servers or FTP servers, cameras are the next highest thing target for attacks. The minute they go online they become a flaming red beacon for hackers.
You have a source for that?
Ok… But cloud services are centralized and have a lot more content to obtain, so that fundamentally makes them a more valuable target. This alone adds a level of relational security to maintaining a home backup of the information. Unless someone happens upon your home network and decides to hack it, or you download a file that sends up a flare, nobody is going to seek it out unless they know you have something specific they want.
Unless someone happens upon your home networ…
If you have an IP camera system exposed to the outside, they will “happen upon you” within the hour.
It’s one of the top things searched for in wide net port scans.
But unlike those cloud services, your home network likely doesn’t have enterprise level threat detection to alert you to it, or a team of network engineers to try to guard against it.
Why the fuck are you broadcasting a beacon to come hack your network? Of course they are going to find it if you light it up like a Christmas tree with a giant neon sign. I said you set up your cameras to record locally. Only an idiot would set up a camera system with an unsecured exposed port. Hell, set up anything with an unsecured exposed port for that matter. Especially one that is an always broadcasting system. It doesn’t even matter if you use a cloud provider at that point. All they have to do is hack an network hop near your home and install a man in the middle and they don’t have to bother hacking a server farm to get your videos.
deleted by creator
LMAO don’t put a fucking camera in your bedroom you dummies
I’m assuming they are in young children’s bedrooms. There’s only one reason to put a camera in an adult’s bedroom ( ͡° ͜ʖ ͡°)
Counter-Argument: Each camera in a bedroom can be free entertainment for millions!
And don’t stay at hotels or airBnB or …. Well just don’t sleep.
This is what you show people when they say they don’t care about privacy because they have nothing to hide.
We should compile a big list of reasons with sources on top of this one
deleted by creator
I know it’s not 100% the same, but there’s a website that gives you access to insecure webcams and has been for ages!
Obviously these aren’t hacked as per the article
Ironic that the website itself is http.
just looking around randomly and it’s weird how many of them are private property.
Why is it weird? People get cameras to protect their private property?
sure but not securing them in their own network somehow?
There are driveways, front porches, some sort of office somewhere and even someones 3d printer all with rough coordinates and that’s without actually diving deeper into all of this.
People are lazy and ignorant to the lack of security in the products they buy.
Damn, that website almost has some of everything.
I saw a building that looked like it was waiting to be boarded up. There were some streams with beautiful scenery. There was an official looking meeting room in Greece for, and I even found a stream of a train table!
Yet another reason why IoT crap sucks. You don’t need to put everything on the internet. This one should be obvious.
The “S” in IOT is for “security”.
Home assistant tries to keep shit local.
depends on the device.
If the device dont provide local connection, there is nothing home assistant can do about it. Some device will also send data to the cloud even it is locally controlled by HA.
Oh for sure. But unlike smart things or any other hub, only the data that needs a cloud connection will go through the cloud…
With end to end encryption, and requiring manual key transfer (no key sync), this would not be an issue.
Why the fuck do people put security cameras in their bedrooms? It’s so weird to me that people do this. Even if you think (or at least thought) that you were the only one with access to the footage, won’t the presence of a camera make you feel like you’re being watched? Are we not on camera enough as it is that we have to be on camera in the supposed privacy of our bedrooms? Imagine if you told George Orwell that people would willingly put cameras in their most personal and private spaces.
Hypothetically I want to secure my home with Cameras…
What’s the best way to do this? OSS preferably.
So, just an FYI, I bought Eufy cameras because I believed their marketing bullshit about being secure and end-to-end encrypted. About two months later they changed how they describe their security and quietly modified their privacy policy. Turns out they’re not really end-to-end encrypted and it is possible to gain access to the streams sometimes.
My recommendation, after doing my research is not to buy anything that is able to be viewed remotely. Buy something that stores the video locally, in your home. If possible, buy and install wired cameras.
The most important thing is just to have cameras that are positioned to watch you in bed.
I’m just about to setup TP-link cameras connected to Frigate (NVR software) with a Coral TPU for offline object detection. This means I can block access to internet for the cameras and use a VPN home if I want to watch them.
Zoneminder and any IP camera you can afford.
If you setup wireless you would be best served using a VLAN
Onvif camera (It’s the standard. Any camera that supports onvif will be plug and play). Block the cameras’ Mac addresses at your router so they can’t get out directly. Install zoneminder on Linux. If you need remote access follow all the guides to securing a Linux server that has ports open to the Internet. (Ssl, tailscale etc.)
Blueiris for Windows is great but it’s not open source.
I use a old phone with IP cam on it, and only allowed local network access connected to my home assistant.
I can view it remotely via home assistant cloud, which is E2EE from instance to phone.
I presume Raspberry Pi Camera is also a great solution. And also I dont put any camera in bedroom or bathroom, because there is no reasonably accessible entrance there.
The first step is to set a strong password.
Not open but https://unify.com/en/
Didn’t they just have a security incident where people could access other people’s full unifi account including devices?
Correct but that’s only if you enable the remote connection through ubiquity, if you have that turned off its all local.
Ah, I wasn’t aware there was an option to keep it local. Does that keep your entire site from being remote manageable or just the camera system?
My understanding is that it’s all or nothing, but I’m not complete sure.
The security issue you mentioned I think only affected when they handle access to the cameras. I think you can set up a VPN and then turn off remote access on the NVR, so it seems possible to avoid that issue.
That being said that’s a lot of work for something they should have handled securely in the first place and doesn’t give me much confidence about their security in general.
It’s an interesting read since the cause of the issue was something to do with a database change that caused an overlap of groups.
it’s funny the vnexpress would publish this. vietnamese people are obsessed with security cameras. they see them as a deterrent, or as a way to find the perpetrator later and get all your property back. they put them everywhere.
Link didn’t work for me there was nowhere to actually buy the videos. Where is the correct link?
They actually left watermarks with the telegram account on it in the pictures