Think Wyze should set up two cloud partitions, one secure and the other not so secure. Those who choose to not use 2fa will be put into the less secure partition. Then if they later opt for 2fa, be charged an upgrade fee. Wyze will not be held liable WHEN the less secure account’s get hacked and their video and sound stream’s end up on the internet.
I use 4 different brands of cameras. They all connect to a remote server. Some companies have a lot of security that prevents support people, both customer support and system support, from accessing users devices. Others not so much. And for a long time many brands located these servers and/or support staff offshore.
Or I could tell you about a very, very large consumer electronics company that had it’s new product registration servers hacked this july. And the customer data harvested for 5 weeks. But since it didn’t include and SS or credit card data not so much of a problem.
Watch the Video in Article
Are you basing that on your comment of affecting other users? If so, then @t.currie s response was exactly correct:
Actually, I’m not sure incompetent clowns even covers that, unless they maybe used running a POS system at Mickey D’s a good qualification for a tech job.
The cases Wyze mentions aren’t “hacked”; they’ve been credential stuffed, which affects lazy users reusing passwords. I suppose you could call that hacked, but it’s their own fault. If anything, they should be charged for wasting support time.
The video lays out (in reverse) how to be safe:
- Don’t use or allow any device to use port forwarding through your router unless you really know what you’re doing
- Don’t reuse passwords, ever.
- Secure your home router and don’t allow WAN side access to it. It doesn’t really serve any purpose for a home router and they typically don’t have the security a commercial one does
- Don’t give out your WiFi password and have connection notification set if it is an option
- Don’t let people with antennas and a computer hang outside of your house
I agree to a point. Where do you keep the USB key and does it force you to remove it if not in use? I’m betting if not, 90% of users leave it in the phone.
Not being critical but wondering what you find with it. If I take the dog for an hour walk, I don’t take my keys or wallet with me usually.
The USB / NFC is with my house and car keys. as it’s very flat and takes up no room. For the telephone I use the NFC function and I have a second one that is always plugged into my home computer, that ways when I use the Yubico authenticator on the computer it works like any authentifactot app, Like you when I go for a walk I don’t have my keys with me but then I also don’t need the app to be used on my phone, also if I lose my phone the authentifactot app is useless without the USB /NFC key so I don’t need to worry about the codes be used by someone else. It’s very clever and practical
Interesting, have to take a look at it.
I’m assuming then, that I can still access an app like Wyze on my phone in case someone shows up at the door?
The text comes immediately. I have had 2FA for 6 months now and no issues whatsoever. Security trumps the 2-3 seconds delay (if any).
Are we talking about on the app or the website. The impression given here is that the app stays logged in?