Anker's Eufy admits unencrypted videos could be accessed, plans overhaul
/var/www/vhosts/lawyersinamerica.com/httpdocs/app/views/singleBlog/singleBlogView.php on line 59
">
">
Tech
Feb 2023
Bestisun Womens Crop Top Exercise Clothes Athletic Tops Racerback Tank Tops Cropped Shirts
$17.98
Hatha Yoga Thick TPE Yoga Mat 72"x 27"x1/3 inch Non Slip Eco Friendly Exercise Mat for Yoga Pilates & Floor Workouts
$34.88
VEQKING Women Workout Tank Tops Loose Fit Racerback Muscle Tanks Sleeveless Shirts Pack for Yoga Running Exercise Gym
$19.99 - $21.99
SENBAN Scrunch Butt Lift Leggings for Women High Waist Seamless Yoga Pants Workout Gym Compression Tights
$18.95
After two months of arguing back and forth with critics about how so many aspects of its "No clouds" security cameras could be accessed online by security researchers, Anker smart home division Eufy has provided a lengthy explanation and promises to do better.
In verge.com/23573362/anker-eufy-security-camera-answers-encryption">multiple responses to The Verge
Prior to late November 2022, Eufy had enjoyed a distinguished place among smart home security providers. For those willing to trust any company with video feeds and other home data, Eufy marketed itself as offering "No Clouds or Costs," with encrypted feeds streamed only to local storage.
Then came the first of Eufy's woeful revelations. Security consultant and researcher Paul Moore asked Eufy on Twitter about several discrepancies he discovered. Images from his doorbell camera, seemingly tagged with facial recognition data, were accessible from public URLs. Camera feeds, when activated, were seemingly accessible without authentication from VLC Media Player (something later confirmed by The Verge). Eufy issued a statement stating that, essentially, it hadn't fully explained how it used cloud servers to provide mobile notifications and pledged to update its language. Moore went quiet after tweeting about "a lengthy discussion" with Eufy's legal team.
Days later, a different security researcher confirmed that, given the URL from inside a Eufy user's web portal, it could be streamed. The encryption scheme on the URLs also seemed to lack sophistication; as the same researcher told Ars, it took only 65,535 combinations to brute-force, "which a computer can run through pretty quick." Anker later increased the number of random characters required to guess URL streams and said it had removed media players' ability to play a user's streams, even if they had the URL.
Eufy issued a statement to The Verge, Ars, and other publications at that time, noting it "adamantly" disagreed with "accusations levied against the company concerning the security of our products." After continued pressure by The Verge, Anker issued a lengthy statement detailing its past errors and future plans.
Among Anker/Eufy's notable statements:
Its web portal now prohibits users from entering "debug mode."
Video stream content is encrypted and inaccessible outside the portal.
While "only 0.1 percent" of current daily users access the portal, it "had some issues," which have been resolved.
Eufy is pushing WebRTC to all of its security devices as the end-to-end encrypted stream protocol.
Facial recognition images were uploaded to the cloud to aid in replacing/resetting/adding doorbells with existing image sets, but has been discontinued. No recognition data was included with images sent to the cloud.
Outside of the "recent issue with the web portal," all other video uses end-to-end encryption.
A "leading and well-known security expert" will produce a report about Eufy's systems.
"Several new security consulting, certification, and penetration testing" firms will be brought in for risk assessment.
A "Eufy Security bounty program" will be established.
The company promises to "provide more timely updates in our community (and to the media!)."