Home security cameras are designed to provide residents with peace of mind as they feel they are protecting their property and themselves. But the reality is different as security cameras help hackers figure out if you're home, a report warned.
Researchers from Queen Mary University of London and the Chinese Academy of Sciences have discovered how web traffic generated by connected cameras could be monitored by hackers and predict when the owner will leave their home.
Cameras from Nest, Netgear and Xiaomi that detect and upload shots have become increasingly popular as technology became more affordable, with the global home appliance market estimated to be worth $ 1,3 billion by 2023, according to the study.
The method, which implies that the hacker has access to the passports data network of a camera, based on the rate at which the cameras uploaded information via the internet.
Confidentiality issues regarding motion detection
The hacker was able to gain access to network traffic entering and leaving the target Wi-Fi router - known as Wi-Fi sniffing, which is activated either via software or with physical devices - to monitor web traffic increases to understand when a camera is downloading a video.
Cameras constantly uploading videos that are triggered by traffic at 18.00 every day could help hackers draw up a timeline for when it is possible for the occupants of a building to come out and remain empty, the report claimed.
Different patterns in web traffic can even indicate if a target is sitting or running inside their home, as researchers have observed how some movements led to significant changes in the bit rate of the downloaded data.
"These cameras are now common in homes around the world. As they appear everywhere, it is important to keep studying them activities and the potential dangers of privacy, "said Dr Gareth Tyson, Senior Lecturer at Queen Mary University, London.
"This is the first study that examines in detail the motion of video streaming generated by these cameras and quantifies them. risks related to them. "By understanding these risks, we can now look for ways to minimize the risks and protect the privacy of our users."