

not really. share it over a ducking vpn, done.
not really. share it over a ducking vpn, done.
its often a bug, because the clients who have the keys don’t know they should retry sending.
but also it’s all been fixed a year ago as I know. I don’t usually use dm rooms and public ones are not encrypted, so I wouldn’t know if I didn’t read about it.
the article very carefully writes to not mention why are these people protesting, but thank god they mention the severed pig heads, so we can be certain these are dangerously violent terrorists!
matthew the ceo addressed aot of the criticisms recently, check it out: https://www.youtube.com/watch?v=OyuqM7RbX5E
transcript with links: https://gist.github.com/ara4n/190ad712965d0f06e17f508d1a45b554
other than that, push notifications work fine for me with Ntfy. but as I heard matrix.org hs users have problems, possibly because of serverside firewall issues, investigation is stuck somehow
definetly report the problem. there’s a function for it in the app, 3 points menu on the chat list menu, use it after making those errors show up. tick the contact me box. ceo recommends to also notify himself directly: https://gist.github.com/ara4n/190ad712965d0f06e17f508d1a45b554
afaik those errors can’t really be solved by users. I mean other than using an up to date client and server.
the question is not whether it’s possible, but whether people subject the public near them to online surveillance systems. sorry, but other than being accessible from HA (which is something too) this is not better than how most people do it. at least to me it is more important than convenience to not leak strangers lives to whoever.
Okay, so don’t set up cameras in your house?
don’t set up cameras that see public area. other than that you do what you want, but if a camera could see a neighbour’s yard then they have a say too.
I’ve found on other forums that reolink can be set up without connecting to the manufacturer, and likely others. It’s relatively trivial for experienced users to insulate any given device from the internet while using HA.
most IP cameras can be set up that way, yes. all you need is the camera to serve the video feed over RTSP, that’s a direct connection.
but that’s not everything. if you just connect it to your main network it’ll connect to reolink servers without issues, and reolink can do whatever they want with it, including stealing the video feed, or if they turn greedy they can remotely upgrade your camera and disable the RTSP feed.
to prevent that, you should either create a separate VLAN for cameras, and configure your router (routing-wise) so that other networks (incl the internet) are not accessible from it. you need managed switches for that, or routers that allow you to configure VLANs.
alternatively get a dedicated dumb switch for cheap, and build a physically separate network for the cameras, and only connect the cameras and the server into it, without connecting it to the main network.
finally, what I meant with my first sentence in the last comment is that a passerby cannot verify your setup, and they shouldn’t need to (or be able to) either. anybody can just claim “its self-hosted”, so it does not really matter with respect to your neighbors and all the people who may pass by
and did you take measures so that ubiquiti does not access them?
ah yeah, I’m always dancing when hacking gov systems
Nobody but you can verify it. also others who commented implied that they control the cameras with the manufacturer’s app, and that the camera has not been blocked from the internet, so selfhosting brings almost no benefits in that cadse, but definitely not any for privacy
why do you want a camera doorbell? in any case I’m interested in your response.
I recommend to not have any cameras that record public areas. personally I hate doorbell cameras. who the fuck knows where will the recordings end up, but it’s almost 100 percent they won’t stay locally.
old ones that don’t involve modern tech, even a network cable, are… fine? but again, how do you tell them apart. and it’s not only about the doorbells.
these are cameras that record public area, even if just those who pass by on the street. owners of these are basically letting tech companies snitch on their neighborhoods. where I live these are illegal, but of course lots of houses use either cameras disguised as doorbells, or even install their fucking cameras on the outside of the buildings and being pointed to the didewalk and the road.
you’ll own nothing. not even your life. and the algorithm will make you happy.
or: initiate lockdown protocol
but it is sensitive data. the webserver can send executable code to the web browser. if it does not that doesn’t matter, what matters is that it can be inserted by a middleman. It’s not like there’s a dedicated person needed to do that, it can just happen automatically.
is it? I thought it’s based on simple gallery code
does it even request your permission? I mean, isn’t it granted by default? It’s been a long time I factory reset a typic consumer phone brand
fairphones can also run custom roms. with calyxos the bootloader can even be relocked for security, it’s done by the installer. that way google services are optional
no, unless you run an outproxy. traffic of other routers that goes trough yours is encrypted in multiple layers, so you are not responsible for what that traffic holds.
a very specific feature, so you should open a feature request at the repos of the jellyfin audio players that you mostly like, probably the devs didn’t even consider it yet