There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
There is no excerpt because this is a protected post.
In part 1 the security cameras analisys was introduced. In part 2 the technical details of the connection between the camera and the cloud were shown. In part 3 the manufacturer of the camera was discussed. Part 4 goes over some of the functionality that versions of the cloud backend can use to analyse the […]
In part 1 the traffic analysis of the EZVIZ in home security camera was introduced. Part 2 is about the traffic analysis between the camera and the internet, connections, protocols and IP addresses. This third part is on the camera manufacturer, Hikvision. The home security camera would initially broadcast itself on the home network as […]
In part 1 of this Ezviz traffic analysis the video camera connections was introduced. Now in part 2 the cloud backend and data connections of the camera to the internet are analysed in technical detail. The HikVision/EZVIZ cloud system processing the video feed The video cloud backend for EZVIZ wireless security cameras allows for a […]
In home security cameras have been increasing in numbers hugely in the past few years. Used for checking pets, indoors, outdoors environments they provide a quick and simple way to have an eye in places where it is needed – like shops or inside homes – and human presence is not always available. Often the […]
The cybersecurity perimeter of national states is defined as the collection of national websites and web services that provide necessary functions to run digital services of a state to its citizens and institutions. In order to understand the global landscape of national cyber perimeters an objective quality measurement based on the actual status of public […]