📚 Wyze Glossary

Close, force-close, reinstall (app)

Troubleshooting steps to reset an app that is misbehaving. In ascending order of ‘completeness.’

  • Close
    Clears most things from memory but some components may stay resident or active in the background.

  • Force-close
    Clears everything from memory. Easy to purge the disk cache while you’re at it. Android only.

  • Reinstall
    Uninstall: Clears everything in memory, on disk and in the OS .
    Install: Sets up everything fresh. Must resubmit credentials.

    • App settings are stored on Wyze servers so retained.

See also:

Reset services

Home → Your Cam → Settings

Is this what it does? A sufficient def?

Is it per cam or does it reset all cams if you have Cam Unlimited? Any side effects?

I haven’t used it much.

Each cam and yes the reset seems to work. I’ve done it many times without any side effects.

1 Like

It is per cam, and once in a blue moon it will reset notifications.

1 Like

log-out/in (acct)

 

1 Like

zoom bar

See also:

I thought about that when I read one of your previous posts. :+1:

1 Like

2FA

Two Factor Authentication. First factor is a password. Second factor is a numerical string sent by email or text you then provide on the sign-in page. Then you’re in. Safe and sound.

There’s so much more to say about this and things related but I don’t know it. Dongles? Fingerprints? Iris scans? I donno. Like that.

To be honest, the two options you mentioned are the ones I try to avoid. SMS and email are the least secure method of 2fa. Both email and SMS are the easiest 2FA methods to intercept or access in one way or another. A lot of hackers have found ways to get codes through those methods.

The core idea is to combine two distinct types of authentication factors:

  • Something you know (like a password or PIN)
  • Something you have (like a device or token)
  • Something you are (biometrics like fingerprints or facial recognition)

In some cases they will require multiple of the above. So the term 2FA or two-factor authentication is generally being replaced by the term MFA or multi-factor authentication, Because in some ways it may generally require more than one. Also, there are some things that actually combine two of the above into one, such as a pass key which includes both something you have (phone, laptop, etc), as well as something you are or know (fingerprint, face ID, pin) all into one. They are technically passwordless because they are using public-private key cryptography. They also don’t fall for common phishing attacks Because they are domain bound And won’t work with a fake site.

Other than pass keys, I prefer authenticator apps. I like the kind of systems where it will send a push to my authenticator app that then lets me approve from my phone, but most use Time-Based codes. These are much better than SMS or email because both of those have issues with things like not being encrypted as well as Sim swap issues among other more complex interception tactics.

In addition to pass keys and authenticator apps and SMS and email which we already discussed, there are also the following:

  • Hardware tokens
  • Push notifications
  • Biometrics (countless options for this)
  • Smart cards or magnetic stripe cards
  • Behavioral biometrics (How you type swipe or move your mouse)

You can sort of count backup passports.

Very soon you will start seeing huge popularity of cryptographic credentials in what is called Decentralized Identity (DID) being used.

I know you’re fairly anti-ai but the truth is Al-Powered Fraud Detection is becoming extremely standard even if you don’t know it’s already implemented. With deepfakes and synthetic identities on the rise, Al is being trained to spot subtle inconsistencies in facial movements, voice patterns, and document forgeries. Expect this to become standard in high-security environments.

The next phase in the evolution of security is going to be what is called continuous authentication. Rather than a one-time login, systems will verify you throughout your session—based on device signals, location, behavior, and more. It’s like your computer constantly asking, “Are you still you?” without interrupting you.

There are some crazy cool security options coming out quantum resistance. There are some really interesting ideas about how to implement quantum entanglement in such a way that it will be impossible to hack into our eavesdrop on something without getting caught or being known that it’s happening and steps being taken to immediately do something about it.

Be on the lookout for what they’re calling multimodal biometric security, including things that are very difficult to spoof such as your gait.

Identity proofing platforms are gaining a lot of traction lately. There are actually some really cool options that actually preserve a lot more anonymity and privacy than traditional methods.

I think it’s actually going to become a lot less annoying believe it or not. Even though we’re going to be switching from prove who you are once to something along the lines of prove who You are continually and invisibly. It’s going to be less about passwords and more about patterns. They’re moving toward a point where you don’t necessarily have to log in to a system at all like we’re used to doing right now, and instead It will recognize who you are before you even ask. Soon there will be a generation that will laugh and think it’s ridiculous that we used to rely on passwords and memory and other crazy stuff that was so insecure and easy to steal and hack and all of this kind of stuff. Everything we currently accept as normal will fairly soon be seen as totally archaic and crazy. Things are evolving in this industry faster than you think. :wink:

In fact, a lot of the above stuff is already possible and proven and tested. Adoption is just always relatively slow. The average person won’t really even know about them. Until things slowly start getting phased out and in by specific key entities. But I can almost guarantee that it will happen for various reasons.

1 Like

AI detectives catching AI criminals. Before you know it they’ll use AI to scam AI. :rofl:

Vicious circle I say.

2 Likes

Thanks, the carver, awesome rundown! I asked my buddy the wyzebot to weigh in:

You John Henry-ed the hell out of him on this one. :wink:

1 Like

You can’t have a ‘perfect’ clockwork unless every one and thing is identified positively and continually. There is no room for ‘slop’ in the brave new world…

…save ‘AI slop,’ it seems, and that’s none of our beeswax (but will be, increasingly, soon. :slight_smile: )