From what I found on the Wayback Machine Wyze stoped selling the V1 in 2018.
https://web.archive.org/web/20180220144853/https://www.wyzecam.com/ ( Wayback Machine link, took a while to load)
From what I found on the Wayback Machine Wyze stoped selling the V1 in 2018.
https://web.archive.org/web/20180220144853/https://www.wyzecam.com/ ( Wayback Machine link, took a while to load)
Agree. Wyze is in hot water. They failed to be transparent as they have made their reputation to be and not only that, they let it go for three years and with this all out in the open now, they still refuse to speak to their customers concerning it. Theyâve lost my trust. I wonât be surprised if this does them in.
Purchased the original first camera and am so disappointed to know that this flaw was hidden for so long. What else are you not telling us?
This was a huge blow for Wyze. They have lost my trust. They knew for 3 years there was an issue here. What if in 3 years we find out that cam plus had a flaw and our cloud recordings are in the wild? You want the risk of a company not telling you that the inside of your home could be watched?
I donât.
1 - The issue is that they did not act or inform us it existed, period. I am an IT professional and devastated they did not disclose this with a clear explanation as to what it actually meansâŚ
2 - Local access to your camera means behind your âfirewallâ which 99.9% of all people have even if they donât know it⌠since itâs impossible to connect your Wyze Cam directly to the Internet without a WiFi access point⌠everyone using a Wyze Cam, of any type*, must be using another device between the camera and the Internet.
**The only exception to this could possibly by the Wyze Base Station that does have an Ethernet port and I suppose if you plugged that directly into your Internet providerâs modem/gateway it may be the exception, but I havenât tested this personally.
If you are really worried or need peace of mind⌠from your network you can use this site to do a remote port scan - GRC | ShieldsUP! â Internet Vulnerability Profiling  - and use the âCommon Portsâ option.
Anyway⌠the real issue here is a total lack of transparency⌠a few months maybe a bad decision but THREE YEARS and they said nothing nor actually patched it? That is horrifying.
Polar opinions? Compatible? Unrelated?
Note: I did not read the linked âmythâ article because it is technically over my head.
And this is a key quote from the article:
"As described in Bitdefenderâs report, hackers could gain access to the contents of a Wyze Camâs SD card âvia a websever listening on port 80.â This is due to the fact that all SD card contents are accessible without authorization in the cameraâs web directory, which makes sense, as recordings saved to your SD card need to be viewable through your local network.
If that sounds complicated, let me bring it down to laymanâs terms. Hackers who manage to access your local network could dig through your Wyze Camâs SD card. They could also access SD card contents if your Wyze Camâs port is exposed to the internetâsomething that you would need to manually set up through port forwarding."
So, someone either needs to be on your local network or you need to have exposed the camera on the internet.
To all the freaked out newbies frantically reposting links to the alarmist (and now sheepishly corrected) Verge article:
Did you pay your ISP for extra public IP addresses and make sure to grant them to your Wyzecams? Do you know anyone who ever has? Do you even know what that means?
There was no threat to anyone (statistically speaking anyway) and a cheap camera company chose to ignore it. No one was compromised.
And the old anti-NAT article linked above carries no weight at all in this context. None of this applies to a home user with a $30 router.
Wyze slacked and should face informed disapproval, not a bunch of scared people who were never for a moment under any kind of threat.
This is the only possible point of contention, from the new press release @Seapup just linked:
As Bitdefender reported in their timeline, we issued the first patch in the month following our notification, and over time we continued to mitigate the risk of these exploits with additional patches in the months that followed.
I would worry Google, Youtube more.
Wyze ingnored and wasnât transparent. They could have stopped the newbs from freaking out by just being honest and not waiting three years to fix the problem.
Precisely! See how I just shamelessly quoted my former self at
You were a pain in the ass back then. Still kinda prickly.
Yeah, I was thinking of that too, but wonder how the definition of âbreachâ pertains to this. We have breach notification requirements and I guess a few stray incidents, if there were any, might qualify as a PII breach.
Iâd bet theyâll be looking for a new liability insurance company though. There were some hefty compliance clauses in our policy and it is audited every year.
Iâll link to my personal take on this, rather than retype it all here:
In short, I personally wish Wyze didnât âfixâ this. It wasnât an issue (to me), but was instead a feature that thousands of us have been BEGGING them to implement INTENTIONALLY. Accessing the camera SD card files through our network is the 8th most requested wishlist item in Wyzeâs history of THOUSANDS of wishlist requests. Weâve been begging for this to be allowed intentionally for YEARS, and just didnât realize it was already possible, and now suddenly people are complaining that it was possible to do what weâve been asking for and just didnât know how to do it.
No strangers could access it. No outside hacker/criminal could access it. Only people you already allowed on your secure network could access it (assuming the people in your household are advanced hackers that could figure out what it took multi-million dollar dedicated security teams to figure out). Seeing the files that are ONLY accessible on my secure network is not a security concern for me, thatâs a feature weâve been BEGGING for. But thatâs just me. I totally get that publications want to fearmonger and scare people with clickbait to increase their ratingsâŚthey have to make a livingâŚbut it is dishonest and disingenuous to all the people who donât actually understand networking and computers and believe what the media tells them to be afraid of. Itâs wrong what theyâre doing to scare everyone.
But hey, there is now a huge opportunity to get a bunch of awesome low-cost Wyze devices on auction sites and marketplace classifieds from anyone who does want to give it all away cheaply. Iâd love some free V1âs to add to my collection, especially if they still have this high demand feature enabled to allow me to access the SD card through my secure networkâŚI would love that.
That may be the most entertaining and unexpected take Iâve ever seen from the prolific Mr. @carverofchoice . And youâre not wrong.
What spooks me more is the often entrenched disparity in opinion on these subjects among reputed IT professionals.
Shouldnât you guys be consensus builders?
The peeps are nervous.