Liste des Groupes | Revenir à se design |
"Don Y" <blockedofcourse@foo.invalid> wrote in message news:vjfg9k$2tnfq$1@dont-email.me...Most users have banal needs for a firewall. If running Windows hosts,On 12/12/2024 12:32 PM, Edward Rawde wrote:One reason is that the packet filtering would have to be configured specifically for local requirements.>Is there any reason the camera can't talk to a phone that is also>
hosted by the customer's access point?
>
If you want to let the camera access a phone that is NOT "local",
then let the user subscribe to a DynDNS service -- provided by
any number of competing firms (even the manufacturer -- via a nice
clean OPEN interface).
Inbound is problematic for various reasons.
Do you want your cameras accepting inbound connections from anywhere in the world?
Vendors have no problem selling "hubs" as a prerequisite to talk to
their devices. Why can't the hub implement a packet filter?
This gets us back to the issue of most people not knowig a packet filter if they fell over it.
You're thinking two-dimensionally. Your *neighbor*'s PC can be acting asUse that as a selling point: the hub can act to protect theI don't permit outbound connections to a long list of countries.
local network (for a fee!!) while their access point/router likely
has not been reliably configured for that purpose.
>Ok they don't have access credentials but there's still a risk of an 0-day in a camera system which isn't going to get any more>
firmware updates.
Simply putting the camera (or any device manufactured by someone who
may or may not be trustworthy) on your "internal network puts you
at risk.
>
E.g., I can open an outbound connection to hostile_actor.com and let
an external agent act as command-and-control, telling me (the camera)
what to do ON THE INTERNAL NETWORK.
I can always whitelist if it does turn out that I need to connect to a server in one of those countries.See above.
Knowing that a server exists is information. (esp if your AUPThis traffic can be disguised to look innocuous. E.g., resolvingI don't see any additional value in this provided the file server is restricted to specific IP addresses or networks and the
"whatshouldIdo.hostile_actor.com" can deliver data to the camera that
can be augmented by then resolving "whatELSEshouldIdo.hostile_actor.com".
Results can be delivered to the external agency by resolving
"thepasswordisFOOBAR.hostile_actor.com", etc.
>
Or, open an HTTP connection to hostile_actor.com and anyone looking
through the logs (ha!) would just think a user visited a website of
with an oddly suspicious domain name. (So, buy up yahooo.com,
goggle.com, etc.)
>I would do this myself because I can use a firewall to restrict inbound as necessary and I can quickly add any IP or network>
attempting brute force to a blacklist.
But most people have no interest in that.
Hence the value of a "hub".
>
I "hide" my file server behind a particular "knock sequence" that is
only known to folks who should need access to it. Trying to probe
the IP address gets you no information -- it looks like there isn't
a machine AT that IP address.
connection is secure.
Many parts of the US deliver "utilities" (phone, cable, power) viaOnce a connection is granted, there are no limits on what can beA nearby store installed cameras not long ago.
transfered (set up a tunnel and all of those transactions are hidden)
>Most people just want the pictures on their phone wherever they are and they may wrongly assume that it's impossible for the>
pictures to be viewed by anyone other than themselves.
<https://www.shodan.io/search?query=camera>
>
Even if you can't (easily) access the video, the fact that someone has
INSTALLED a camera (five cameras??) has informational value.
The number if cameras (or what looked like there were cameras inside them) made it easy to conclude that they were fake.
Les messages affichés proviennent d'usenet.