40K IoT cameras worldwide stream secrets to anyone with a browser.
-
Shodan.io is the searchable index of open IoT devices.
Change the default password, people!
schrieb am 10. Juni 2025, 15:44 zuletzt editiert von dan@upvote.au 6. Okt. 2025, 17:48Hard-coded default passwords have been illegal in California since 2020, so it shouldn't be as much of an issue with newer devices. Companies aren't going to make California-specific versions of their devices, so they'll often just follow the California standards everywhere.
To be legal in California, the device either needs to have a randomly-generated password unique to that device (can be listed on a sticker on the bottom of the device, or in the manual), or it needs to prompt to set a password the first time you use it.
I still wouldn't ever expose a camera directly to the internet. Keep it just on your LAN (eg using a VLAN) and VPN in (eg using Tailscale) to connect to it remotely.
-
This post did not contain any content.schrieb am 10. Juni 2025, 15:48 zuletzt editiert von
40K?
Praise the Omnissaiah!
-
It would be nice to know what brands or models are most vulnerable.
schrieb am 10. Juni 2025, 15:48 zuletzt editiert von priapus@piefed.social 6. Okt. 2025, 17:53What this is talking about is not really about the brand or model, its just about them being misconfigured. These cameras were exposed to the internet with either default credentials or no authentication.
Theres very few good reasons to expose a camera to the internet at all, just access it over a VPN. If for some reason someone really needs to access it over the internet (I genuinely cannot think of any), then they should put some proper authentication in front of it.
-
Hard-coded default passwords have been illegal in California since 2020, so it shouldn't be as much of an issue with newer devices. Companies aren't going to make California-specific versions of their devices, so they'll often just follow the California standards everywhere.
To be legal in California, the device either needs to have a randomly-generated password unique to that device (can be listed on a sticker on the bottom of the device, or in the manual), or it needs to prompt to set a password the first time you use it.
I still wouldn't ever expose a camera directly to the internet. Keep it just on your LAN (eg using a VLAN) and VPN in (eg using Tailscale) to connect to it remotely.
schrieb am 10. Juni 2025, 16:15 zuletzt editiert vonYes, but no one checks the legality of cheap Chinese devices from Amazon.
-
This post did not contain any content.schrieb am 10. Juni 2025, 16:55 zuletzt editiert von
Those cameras are there since 90s I remember watching them in ActiveX in real media player plugin in IE. Nothing changed.
-
Yes, but no one checks the legality of cheap Chinese devices from Amazon.
schrieb am 10. Juni 2025, 17:45 zuletzt editiert vonAlso cheap cameras also tend to ship with a number of x-day vulnerabilities.
-
This post did not contain any content.schrieb am 10. Juni 2025, 18:03 zuletzt editiert von
40k? Impressive resolution.
-
Hard-coded default passwords have been illegal in California since 2020, so it shouldn't be as much of an issue with newer devices. Companies aren't going to make California-specific versions of their devices, so they'll often just follow the California standards everywhere.
To be legal in California, the device either needs to have a randomly-generated password unique to that device (can be listed on a sticker on the bottom of the device, or in the manual), or it needs to prompt to set a password the first time you use it.
I still wouldn't ever expose a camera directly to the internet. Keep it just on your LAN (eg using a VLAN) and VPN in (eg using Tailscale) to connect to it remotely.
schrieb am 10. Juni 2025, 18:29 zuletzt editiert von creat@discuss.tchncs.de 6. Okt. 2025, 20:30Can't remember when it came into effect, but randomized device specific passwords are also mandatory in the EU now. This was relatively recently though. It means every single device (item, not model type or class) has to have an individual password (also usually it's on a sticker or something).
And yes, connecting any ip camera to the Internet is just dumb.
-
Yes, but no one checks the legality of cheap Chinese devices from Amazon.
schrieb am 10. Juni 2025, 20:07 zuletzt editiert von dan@upvote.au 6. Okt. 2025, 22:08The good Chinese brands, if they do have a hard-coded password, usually make you change it on first login. I'm pretty sure newer Hikvision and Dahua models do this (plus their resellers/rebrands like Amcrest, Lorex, Annke, etc). You need to pay more than the garbage brands, but they're worth it.
Of course, there's all sorts of junk on Amazon that don't follow any sort of standards.
-
Also cheap cameras also tend to ship with a number of x-day vulnerabilities.
schrieb am 10. Juni 2025, 20:13 zuletzt editiert vonIt's usually fine if you stick to a good well-known brand, but there's some cheaper cameras that are bootleg clones of other brands, that can't run the latest upstream firmware so they're stuck on a hacked/modified version of older firmware.
-
What this is talking about is not really about the brand or model, its just about them being misconfigured. These cameras were exposed to the internet with either default credentials or no authentication.
Theres very few good reasons to expose a camera to the internet at all, just access it over a VPN. If for some reason someone really needs to access it over the internet (I genuinely cannot think of any), then they should put some proper authentication in front of it.
schrieb am 10. Juni 2025, 20:21 zuletzt editiert vonAn IP camera may stay in use for a decade or more without any firmware updates. You shouldn't trust any sort of authentication that's built into the camera to be secure. Keep them on an isolated LAN and only allow access from the server that's running the DVR software.
-
40k? Impressive resolution.
schrieb am 11. Juni 2025, 03:10 zuletzt editiert vonFor the Emperor!
-
-
-
Reverse engineering the mysterious Up-Data Link Test Set from Apollo
Technology18 vor 23 Tagenvor 23 Tagen1
-
People Are Being Involuntarily Committed, Jailed After Spiraling Into "ChatGPT Psychosis"
Technology18 vor 22 Tagenvor 25 Tagen1
-
-
-
Mozilla is shutting down Pocket, their read-it-later and content discovery app, and Fakespot, their browser extension that analyzes the authenticity of online product reviews.
Technology 22. Mai 2025, 17:111
-
GOP sneaks decade-long AI regulation ban into spending bill - Ars Technica
Technology 13. Mai 2025, 21:151