logo elektroda
logo elektroda
X
logo elektroda

Cheap IP camera - freedom from the cloud

pixel7 11457 53
ADVERTISEMENT
Treść została przetłumaczona polish » english Zobacz oryginalną wersję tematu
📢 Listen (AI):
  • #31 20963392
    kris8888
    Level 40  
    Posts: 6739
    Help: 528
    Rate: 1857
    tzok wrote:
    Janusz_kk wrote:
    to the network and I have "Xiaomi Mi TV Stick SMART 8 GB Media Player" plugged in
    You know this thing has a built-in microphone

    And what`s the problem if this "something" also had access to the TV camera via the HDMI CEC connector?
  • ADVERTISEMENT
  • #32 20963590
    analog_6
    Level 16  
    Posts: 319
    Help: 6
    Rate: 144
    I am not alarmist, obsessed or anxious about the security of data on my home network.
    But what you write about security does not have to be even partially applicable.
    Of course, there are known techniques for isolating networks. BUT how can you be sure that it always works "to the end"?
    I would like to remind you that no one except the manufacturer knows how the device works. The fact that it has software that implements the described configuration rules does not mean that these rules are implemented fully in line with our expectations.
    Whether it`s a VPN or even a modem with two separate WAN ports, what`s the point if everything is powered by ONE microprocessor with one software. Literally anything can be sewn in there. And I`m afraid that, unfortunately, it sometimes happens.
    We may never know about it. Or we can find out about it when these mechanisms are brutally exploited on some occasion. The perfect break-in and break-in mechanism is one that no one knows about until it is used. We simply don`t know about the best ones. None of us have heard of them and we can`t read about them anywhere, because this information does not exist in circulation.
    The only almost certain solution is to PHYSICALLY isolate the network.
    Why does anyone need access to data on Jan Kowalski`s network? I would like to remind you that we are quickly entering the era of widespread use of Ai. You don`t have to be a fortune teller to understand that AI algorithms equipped with residual data obtained from Jan Kowalski will be able to put together information that we have never dreamed of. From random innocent photos, emails, text messages, text documents. About us, about other people, about money, about power, about defense.
    I regularly hear the same stupid argument: I am a nobody, I don`t do anything important, I have no money - IT DOESN`T APPLY TO ME. Yes, it applies to you, your family, your friends and the country you live in.

    The temptation for the manufacturer to leave a loophole or loopholes is also huge. I have serious suspicions that one of the leading microcontroller manufacturers has planted backdoors of unknown purpose in their products, at least those that are sufficiently advanced. I had 2 cases that I cannot explain otherwise, because from a technical point of view they were not supposed to happen. But I will not write about it any more, so as not to expose myself to any legal consequences, because it is a very serious accusation and I cannot provide evidence (repeat the operation). I just wanted to raise awareness that systems with hardware security do not necessarily guarantee code security.
  • #33 20963728
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    My colleague above wrote about holes in the software and about deliberate actions of producers.

    I certainly agree with my colleague about the first one, but not necessarily about the second one (but I also have no evidence that it doesn`t happen). However, none of these arguments is a reason NOT to protect yourself. On the contrary - in today`s world where even a refrigerator is connected to the cloud, such devices should be separated from the utility network.

    Even my children have their own network. I hope that my colleague understands what could happen if children found something from the Internet.

    Added after 1 [minute]:

    analog_6 wrote:
    I will not write about it any more so as not to expose myself to any legal consequences

    Please describe it without mentioning the brand.
  • #34 20963791
    Janusz_kk
    Level 39  
    Posts: 5692
    Help: 216
    Rate: 1428
    tzok wrote:
    You know this thing has a built-in microphone

    NO :( you surprised me a bit.
  • ADVERTISEMENT
  • #35 20964021
    kris8888
    Level 40  
    Posts: 6739
    Help: 528
    Rate: 1857
    Specifically, the remote control for this wonder has a built-in microphone. Because the stick itself doesn`t work anymore, I know because I recently repaired something like this for a friend.

    So it`s better not to tell the pilot too much about your secrets 😀

    I also have the impression that some smartphones are also "eavesdropping" on us. Lately, whenever I talk to someone about something, advertisements related to it pop up...
  • #36 20964048
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    kris8888 wrote:
    ...
    I also have the impression that some smartphones are also "eavesdropping" on us. Recently, whenever I talk to someone about something, then advertisements related to it pop up...


    I need to see what ads my wife sees ;)
  • #37 20964423
    analog_6
    Level 16  
    Posts: 319
    Help: 6
    Rate: 144
    Erbit wrote:
    My colleague above wrote about holes in the software and about deliberate actions of producers.
    I certainly agree with my colleague about the first one, but not necessarily about the second one (but I also have no evidence that it doesn`t happen). However, none of these arguments is a reason NOT to protect yourself. On the contrary - in today`s world where even a refrigerator is connected to the cloud, such devices should be separated from the utility network.
    Even my children have their own network. I hope that my colleague understands what could happen if children found something from the Internet.

    No doubt, I already wrote about it on the previous page.
    Quote:
    analog_6 wrote:
    I will not write about it any more so as not to expose myself to any legal consequences
    Please describe it without mentioning the brand.
    This information cannot be isolated from a specific manufacturer. I can only say that through the regular serial port of the processor it was possible to change the content of the flash area, which was not only not supported by my software but, above all, was protected from everything by fusebits. And I am not able to repeat these cases because the serial port was fed largely random information for a long time, also not maintaining the baudrate.
    After analyzing everything and making sure that there was no obvious error on my part, I came to the conclusion that either there is an error in the core that is not described in the errata (I have come across such stories more than once) or the processor has a backdoor planted as a result of the company`s cooperation. with security agencies like the NSA. Certain indications show that similar actions have been in practice for several years.
    I have also had several or a dozen cases of memory corruption, but I always blamed it on strong electromagnetic interference (from mobile phones) when writing operations to unprotected flash or eeprom. However, there is no hidden meaning here.
  • #38 20967257
    bumble
    Level 40  
    Posts: 7189
    Help: 608
    Rate: 1183
    tzok wrote:
    A VPN server with a fixed IP is a sure and constant target of attacks ;)

    Janusz_kk wrote:
    to the network and I have "Xiaomi Mi TV Stick SMART 8 GB Media Player" plugged in
    You know this thing has a built-in microphone ;)

    He has Alex too. Most TVs also have a microphone in the remote control. Your smartphone also has a microphone.
  • #39 20967318
    chemik_16
    Level 27  
    Posts: 999
    Help: 74
    Rate: 127
    bumble wrote:
    tzok wrote:
    A VPN server with a fixed IP is a sure and constant target of attacks ;)

    Janusz_kk wrote:
    to the network and I have "Xiaomi Mi TV Stick SMART 8 GB Media Player" plugged in
    You know this thing has a built-in microphone ;)

    He has Alex too. Most TVs also have a microphone in the remote control. Your smartphone also has a microphone.

    no one collects data from microphones anymore - people don`t talk anymore these days :) It`s a waste of space for such metadata.
    All voice assistant projects are also reduced and not developed - they are not profitable (like Siri or Alexa)
  • #40 20967644
    kris8888
    Level 40  
    Posts: 6739
    Help: 528
    Rate: 1857
    It`s an interesting discussion, so I thought I`d ask about something that I haven`t been able to figure out for some time, and maybe someone more knowledgeable would be able to explain it to me.
    Well, I have several smart switches and detectors at home, working in the cloud, communicating via WiFi and managed by the Tuya Smart application. The Tuya Smart application has information about each device, including its Virtual ID, IP address (external, variable, currently assigned by the Internet provider`s server), MAC address, WiFi signal strength. And everything would be fine, the detectors and switches provide the same external address, consistent with the address that also appears, among others, in the Speedtest application, except for one motion detector, which provides a completely different IP address. The first two octets of the address match, but the last two octets are completely different. Its address is from the pool of public addresses, it starts with 37. Also the other detectors and switches.

    I was already worried that this one detector might be accidentally connected to the neighbor`s WiFi network, but no, it is visible in the list of devices in my router. Her MAC address matches, she even has an internal IP address assigned within my local network.
    Please note that I do not use VPN, VLAN or port forwarding in the router. I also don`t have a permanent public address. I only use IPv4 in the router, IPv6 is disabled. When registering the detector in the network, like all the others, I entered the Wifi network name and password, I did not use WPS.
    I even tried to ping the other external address provided by this one detector, but it does not respond.

    I have already reset the detector twice and registered it again in the network and still the same thing. What this is about? Could it just be a software error in the detector and incorrect reading of the IP address by the application? But is it a more serious matter?
  • #41 20967662
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    The most logical thing seems to be that it was once registered from this address (since you have a variable one) and now, regardless of which address it is registered from, it still shows the old one, i.e. some error in the cloud software.
  • ADVERTISEMENT
  • #42 20967726
    kris8888
    Level 40  
    Posts: 6739
    Help: 528
    Rate: 1857
    Well, that would be a bit weird, but possible. However, in the meantime, I also deleted and re-registered other detectors and switches, and after re-registration, all of them provide the correct, currently assigned external address from the Internet provider. Only this one sensor is a bit stubborn. But the fact is that all detectors and switches have their own internal memory and even after deleting them from the application, they remember their "personalized" name and perhaps also remember the last IP address from which they were registered.

    I still have strange problems with this detector, it registers to the cloud very clumsily, and sometimes it can falsely change the output state. I suspect its software is fake. I`ll get rid of her sooner or later.
  • #43 20968276
    darekRD
    Level 14  
    Posts: 102
    Rate: 41
    analog_6 wrote:
    It was connected to the LAN, of course, but it did not have a configured gateway, which did not have an obvious address. And I was quite surprised when this disk started informing me about available updates... So...

    This case confirms my thesis that despite the efforts of the most advanced IT nerds, we will not be able to protect ourselves from an attack in the "W" hour. We are not able to disassemble the software of all imported equipment or its updates, which, as you can see, can be downloaded without our help and probably knowledge.
    Maybe all this imported equipment has a code embedded in it that will respond to some command sent from the Far East by firing the CPUs or blocking them? In this way, the entire country can be turned down and darkness and silence will fall.
  • #44 20968451
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    darekRD wrote:
    This case confirms my thesis that despite the efforts of the most advanced IT nerds, we will not be able to protect ourselves from an attack in the "W" hour.


    I do not agree with you. Perhaps at your level of understanding the problem you see it this way, but you are wrong.
  • #45 20969155
    analog_6
    Level 16  
    Posts: 319
    Help: 6
    Rate: 144
    After quite a few years of happy sales of subsequent generations of processors, it turned out that you can mess with Intel`s BIOS.
    Anyone knew about this all this time? Or maybe no one?

    Of course we can`t. There is an endless amount of network equipment being created, and each of them has several versions of official or unofficial software. Often of unknown origin, downloadable from various, more or less (un)sure places. Who checks it? Who will check it? Certainly not even a whole herd of pimply people equipped with RedBull and Snickers wagons.

    In electronics, I have often encountered things that either no one knows about or knows but doesn`t talk about. I saw errors that entire multilingual forums were debating about and no one seemed to know the reason. Because no one took a PROPER look.
    The best advice is this - don`t be a deer, don`t buy junk, don`t install anything shiny, don`t overload yourself with network equipment because your house won`t be "intelligent" for a penny anyway. Before you buy something, ask yourself whether you actually need to have it.
    A good alarm/security/surveillance system is not one that can be bought for the proverbial PLN 100 on a website, but one that is unpredictable and incomprehensible to the attacker.
  • ADVERTISEMENT
  • #46 20969807
    darekRD
    Level 14  
    Posts: 102
    Rate: 41
    Erbit wrote:
    at your level of understanding the problem
    Well... Your level of understanding the problem is obviously much higher, so I`m definitely wrong. How I don`t want to be right!
    And TVs and telephones do not eavesdrop or spy on users, and software and hardware producers do not report to the secret services. The old and probably already deactivated Echelon is a fairy tale made of moss and ferns and there is nothing newer, that`s for sure. I want to wake up and be wrong.
  • #47 20969907
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    darekRD wrote:
    Your level of understanding the problem is obviously much higher, so I`m definitely wrong.


    Exactly as you wrote. Communication in the TCP/IP network is described and specified. If you know it at least as well as I do, it becomes clear that you are wrong in your guesses and the described case and its understanding result from your ignorance. The lack of a gateway in the device (lack of this information in the device panel) means no security. As you can see, the device somehow managed to "find" this gate and use it. Packets should be killed in the firewall.

    You don`t have to be offended or look for subtext in my statement. I simply know how to stop such unwanted communication, and apparently you don`t know and are drawing wrong conclusions.
  • #48 21097091
    cargustar
    Level 1  
    Posts: 1
    >>20959686 I have a camera that runs with "ease life app" do you know if there is a way I can use it with tinycam monitor app. Tell me if you need any information please
  • #49 21448334
    forysiukjacek
    Level 1  
    Posts: 1
    >>20959686 .
    And is it possible with some simpler language as for a layman (that's me)
    I have such a camcorder and can't store data on a network drive at home.
    Please help🤗
  • #50 21540625
    stefanrogala
    Level 6  
    Posts: 11
    Rate: 1
    Thanks for the super solution. And does this camera work with a surveillance kit?
    Greetings
  • #51 21540643
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    darekRD wrote:
    And televisions and phones do not eavesdrop on users, do not peep, software and hardware manufacturers do not report to the secret services. The old and probably already deactivated Echelon is a moss and fern tale and there is nothing newer, surely. I want to wake up and not be right.


    Sorry to be so late... but it occurred to me after time.

    "Eavesdropping" of which you have written extensively is only possible while a transmission is in progress (e.g. during a telephone conversation). It is not possible when this transmission is not taking place (there is no communication going on) - although many believe that the cameras in laptops are "still recording them" and the phones are "still listening" and still "reporting to google" and then to "intelligence", "the state" , "tax" or whoever you want.
    I find the sealed webcams on laptops funny - and if you don't understand I'll ask why they don't seal the webcams on their smartphones, which they even take to the toilet!

    Why is it possible to do this while the call is in progress and no longer after disconnection ? Because during the call the transmission can be intercepted "anywhere" because it is in progress - after the disconnection any attempt to send "recorded sound or image" would involve .... transmission and would immediately be noticed by people like me (those who know at least a little bit about it).

    I assure you that my phone neither eavesdrops on me nor peeps at me when a conversation is not in progress. If anyone claims otherwise, then yes, these are 'moss and fern stories'.
  • #52 21540758
    metalMANiu
    Level 21  
    Posts: 619
    Help: 11
    Rate: 241
    @Erbit I can assure you that the Polish police already used "lying-on-the-table-only" phones to conduct wiretapping more than 10 years ago.
    You may remember the photo of Mark Zuckerberg with his laptop in the background? That laptop had a camera taped up.

    But no worries, the grey man doesn't have to worry about anything like that. His stolen data is being used in a more 'massive' way.
  • #53 21540781
    Erbit
    Level 39  
    Posts: 5376
    Help: 478
    Rate: 1308
    metalMANiu wrote:
    I assure you,
    .
    I deal with networks professionally. I know what my devices are sending and to whom. I am not saying that this is impossible - I am saying that such traffic does not happen by "owning" the device itself and "being tracked by the manufacturer" but happens after software is installed - i.e. you have to be a significant target to have such software installed for you.

    I would also argue that there is no such thing as "Google is bugging us".
    metalMANiu wrote:
    But no worries, the grey man need not worry about any such thing.
    .
    Exactly right.


    metalMANiu wrote:
    His stolen data is used in a more 'massive' way.

    Exactly right.
  • #54 21543356
    operator5wp
    Level 16  
    Posts: 340
    Help: 1
    Rate: 133
    Google's Android system, as soon as it has internet access sends so much encrypted data that we don't know what it is sending.
📢 Listen (AI):

Topic summary

✨ The discussion centers on a low-cost IP camera that requires connection to the Alibaba cloud for remote access, raising significant privacy and security concerns due to potential unauthorized network access and data collection. The original poster describes a method to disconnect the camera from the cloud without firmware modification, using AP mode to avoid external data transmission. Participants highlight risks such as the device being exploited for network attacks (e.g., DDoS), local network scanning, and metadata collection. The conversation extends to similar IoT devices, including Tuya-based smart switches and detectors, which also pose security risks when connected to cloud services. Alternative firmware options like OpenIPC and Tasmota are mentioned for devices with Ingenic or Tuya chipsets to regain local control and enhance security. Network segmentation strategies, such as VLANs and isolated subnets, are recommended to limit device access and mitigate threats. Examples of real-world breaches via IoT devices, such as a casino hack through a smart aquarium thermometer, illustrate the severity of these vulnerabilities. The debate also touches on broader concerns about embedded backdoors in hardware, manufacturer privacy policies, and the challenges of fully securing consumer IoT devices. Users emphasize the importance of strong passwords, disabling unnecessary internet access, and cautious use of cloud-dependent features. The discussion includes references to common Chinese brands and devices, the use of VPNs for secure remote access, and the limitations of current security measures in consumer electronics.
Generated by the language model.

FAQ

TL;DR: For buyers of cheap cloud cameras, a PLN 75 unit can be used locally without reflashing: block Internet access, keep RTSP on port 554, and control PTZ directly. As the author showed, "the control commands run without logging in," so you can keep video inside your LAN or OpenVPN instead of the vendor cloud. [#20959686]

Why it matters: This FAQ shows how to keep a low-cost Ease Life/Aview camera usable while reducing cloud dependence and limiting exposure of your home network.

Option Firmware change Internet required Remote access Effort
Stock firmware + vendor cloud No Yes Yes, via vendor app Low
Stock firmware + RTSP on LAN No No Only through LAN/OpenVPN/restream Medium
OpenIPC on Ingenic board Yes No Your own method Higher

Key insight: The thread's most practical path is not reflashing. Keep the stock firmware, discover the RTSP stream and PTZ commands, then block WAN access at the router so the camera stays useful but stops talking to the vendor cloud. [#20959686]

Quick Facts

  • The camera was bought for PLN 75, later listed at PLN 85; seller specs included 1080p, 2.4 GHz Wi‑Fi, 5 V / 2 A power, 21 IR LEDs, and microSD up to 128 GB. [#20959686]
  • The most useful open service was RTSP on port 554. Common URL patterns failed, but packet capture in AP mode revealed working stream and control traffic. [#20959686]
  • The sample video path used rtsp://admin:Kamera1@192.168.1.192:554/stream1/track2, and the sample PTZ speed value was 55. [#20959686]
  • The pan/tilt mechanics have no position sensors; after power-up the unit must do full-range calibration on both axes, then infer position from counted steps. [#20959686]
  • A practical isolation pattern from the discussion is guest Wi‑Fi, VLAN, or AP isolation for IoT, while still allowing Internet only if the cloud is truly required. [#20962843]

How do I free a cheap Ease Life/Aview WiFi IP camera from the manufacturer's cloud without changing its firmware?

Use the stock firmware, switch the camera onto your LAN, discover its RTSP stream, then block its Internet access at the router. The author used the Aview app only for setup, kept local RTSP on port 554, and then let a Raspberry Pi handle viewing, AI analysis, and NVR recording. 1. Pair the camera and confirm local access. 2. Test RTSP and PTZ locally. 3. Deny WAN access so the vendor app shows it as offline. [#20959686]

What is RTSP and how is it used to access video and audio streams from a low-cost IP camera?

"RTSP" is a network protocol that controls media streams, letting a client open, play, and manage live video or audio from devices such as IP cameras over a known URL and port. In this thread, RTSP carried the camera image, sound, and even duplex communication, with port 554 exposed and a working local stream path discovered from captured traffic. [#20959686]

How can I find the correct RTSP URL for an unknown Chinese IP camera when common address patterns do not work?

Capture the app-to-camera traffic and read the actual RTSP requests. The author first scanned ports, saw 554 open, then found that popular URL patterns failed. After resetting the unit and switching to AP mode, PCAPdroid showed unencrypted RTSP traffic, which exposed a working path: /stream1/track2 with admin and password Kamera1. [#20959686]

What is AP mode in an IP camera, and why did switching from STA mode to AP mode make traffic analysis easier with PCAPdroid?

"AP mode" is a camera operating mode that makes the device create its own Wi‑Fi hotspot, so a phone connects directly to the camera instead of through the home router or cloud path. In STA mode, the app's external communication was quickly protected by TLS. In AP mode, the same app used plain RTSP locally, which made packet capture and URL discovery much easier in PCAPdroid. [#20959686]

How do I capture and view an RTSP stream from this type of camera in Python with OpenCV?

OpenCV can read the stream directly with cv2.VideoCapture() and display frames in a loop. The thread used rtsp://admin:Kamera1@192.168.1.192:554/stream1/track2, resized frames to 1440 × 810, and quit on the q key. That is enough for live preview, bitmap saving, or forwarding the stream to a Raspberry Pi that creates recordings and runs AI analysis. [#20959686]

What RTSP control commands are needed to move the camera up, down, left, right, and stop using pelcod20ctrl?

Send RTSP CMD frames containing pelcod20ctrl actions. The discovered command list mapped 1=Up_Start, 2=Down_Start, 3=Left_Start, 4=Right_Start, and 9=PT_Stop. A typical move used pelcod20ctrl -type 1 -cmd 1 -data2 55, then a second frame with -cmd 9 to stop. The thread also notes that the same interface exposed zoom, focus, and iris actions. [#20959686]

Why do some PTZ cameras lose exact position after reboot and require full-range calibration on both axes?

They lose exact position because the mechanism has no position feedback sensors. This camera bases movement on counted motor steps, not on absolute encoders. At startup it must sweep its full range on both axes to re-establish a reference, and later movements depend on remembered step counts and speed or time values rather than a true measured position. [#20959686]

How should I block a cloud camera's Internet access on my router while still using it safely inside my LAN or through OpenVPN?

Block only the camera's WAN access and keep local LAN access allowed. In the thread, that made the vendor app mark the camera offline, while the owner still used RTSP locally, restreamed video on an internal web page, and reached the home network remotely through a public IP plus OpenVPN. This keeps control and viewing inside your own network path instead of the vendor cloud. [#20959686]

What are the practical security risks of putting cloud-connected cameras, Tuya detectors, switches, and other IoT devices on a home network?

The practical risks are abuse of the device itself and lateral visibility into your network. Posters named DDoS use, botnet participation, scanning of LAN devices, harvesting poorly protected credentials, and cloud-mediated access paths. One reply summarized the core issue clearly: each detector or switch is "a computer connected to your local network." The thread also cites the well-known aquarium-device casino breach as an example of IoT entry into a larger network. [#20961720]

How do VLANs, guest WiFi, and AP isolation help separate cameras and other IoT devices from the rest of a local network?

They place IoT on a separate network so cameras and switches can reach the Internet or cloud without directly reaching your main PCs and phones. One poster recommended mid-range routers that create multiple Wi‑Fi networks and separate them with VLAN or guest AP functions. That does not make an IoT device harmless, but it limits local-network exposure if the cloud or device is compromised. [#20962843]

OpenIPC vs keeping the stock firmware with RTSP access — which approach is better for an Ingenic-based camera?

Keep the stock firmware if local RTSP and PTZ already meet your needs; choose OpenIPC only if you want deeper firmware control. A forum reply identified the board as Ingenic and said OpenIPC could be uploaded, but the original author did not need it because the stock system already exposed video, PTZ, and local use without cloud access. Lower risk and less work favored stock firmware here. [#20959889]

How can I check whether an IP camera exposes a serial console over RX/TX at 115200 baud, and what can I learn from it?

Open the camera, find the board header, and test the RX/TX pins with a USB serial adapter at 115200 baud. A poster suggested this exact method to reveal what system is running and whether you can issue commands from a terminal such as PuTTY. If the console is active, you may learn boot logs, chipset details, login behavior, and possible maintenance or debugging access. [#20961751]

Why would one Tuya motion detector show a different public IP address in the Tuya Smart app than my other devices on the same router?

The simplest explanation is stale cloud-side data or a software bug in that detector. One poster answered that the device may still display an older public IP from a previous registration, even after the household WAN address changed. The same user also reported that this detector registered poorly to the cloud and sometimes falsely changed its output state, which supports a firmware or cloud-data issue. [#20967662]

How can I use an Ease Life app camera with tinyCam Monitor, and what connection details or RTSP path do I need?

Use tinyCam only if it accepts a manual RTSP source, because the thread exposed the camera through RTSP rather than through the Ease Life cloud. You need the camera's local IP, RTSP port 554, username, password, and the correct path discovered from traffic capture. In the working example, those were admin, Kamera1, and /stream1/track2, which should be entered as a custom RTSP stream in any compatible viewer. [#20959686]

What's the simplest beginner-friendly way to make this kind of cloud camera save recordings to a home network drive or surveillance/NVR system?

The simplest path is to stop relying on the vendor app and feed the RTSP stream into a local recorder. The author sent the stream to a Raspberry Pi, where AI analyzed events and NVR recordings were created. A beginner can follow the same logic: 1. Confirm the RTSP URL works. 2. Add that stream to an NVR or network-drive workflow. 3. Block the camera's Internet access after local recording works. [#20959686]
Generated by the language model.
ADVERTISEMENT