this post was submitted on 12 Feb 2024
875 points (98.9% liked)

Technology

59597 readers
3187 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Tja@programming.dev 2 points 9 months ago (1 children)

Many cameras record to a SD card, deauth won't do much.

[–] yggstyle@lemmy.world 4 points 9 months ago (1 children)

Sure there may be a hard copy but that will only have value after the crime is committed. Deauth / jamming will prevent the more meaningful things like proximity alerts and notifications from informing the user (or security system) which could lead to intervention.

I've always viewed camera storage as a fallback in the event something fails. Don't get me wrong I think redundancy is great and it's a fine feature. It has value - just less so in this particular case.

[–] Tja@programming.dev 5 points 9 months ago (1 children)

You could set up an alert for "hey, all my security cameras just misteriously disconnected"...

Not advocating for wireless security solutions, just saying it's not so hopeless.

[–] yggstyle@lemmy.world 2 points 9 months ago

That would definitely be a good approach if you were stuck with the wireless option. Im sure some software may address those disconnections in just the way you describe.

My responses have been looking at the technology broadly - in the way I might if someone asked me for my opinion prior to investing in gear. People frequently overestimate the effort required to achieve a bypass of a security device. So my goal was to provide some core knowledge.

I do like the suggestion though- it may help somone improve their own existing setup 👍