Of course not. But you will buy cheap “security cameras” and install them without even bothering to change the default credentials, for the most part. P2P Weakness Exposes Millions of IoT Devices.
A peer-to-peer (P2P) communications technology built into millions of security cameras and other consumer electronics includes several critical security flaws that expose the devices to eavesdropping, credential theft and remote compromise, new research has found.
The “random people” viewing stuff collected from security cameras, doorbell-cameras, baby-monitors, etc. include the .gov, as well as bad people.
There are at least 2 million vulnerable devices on the internet. Only about 7 percent are in the USA, with largest portion in China, and about 17 percent in Europe. (Click thru – there’s a map.)
And in a side note about how these companies treat security… none of the companies that manufacture/rebrand this stuff responded to requests, or even acknowledged the problem. And then there’s this.
Interestingly, iLnk’s Web site (p1.i-lnk[.]com) currently appears to be non-functional, and a review of its HTML source code indicates the site is currently compromised by an obfuscated script that tries to redirect visitors to a Chinese gaming Web site.
And the researcher doesn’t think it is possible for these to be fixed in the field, not that any of the companies involved are likely to try.
If you install this kind of crap in your home, and you don’t know precisely what the risks are, well, the best thing I can say is you need to educate yourself. And you may want to rethink that.