When Steve and I were at CES, we had the opportunity to hang out with fellow NosillaCastaway Joe LaGreca. While we were talking about the disappointment of the security model for D-Link and their $150 Omna webcam, he mentioned that he uses a little camera called the WyzeCam.
We were intrigued because Joe said the WyzeCam is only $20 plus $5 shipping. But how good could this camera be? Joe showed us a live erityideo feed of his kids’ playroom – and it was pretty darn good. For $20, it was amazing.
Joe cares as much about security as we do (if not more) but since a $150 HomeKit-compatible webcam from a big-name networking company doesn’t guarantee us great security, I have changed my expectations.
One of our goals in Home Automation has been to buy HomeKit-compatible devices whenever possible for security reasons. I’ve even created an elaborate network setup to isolate non-HomeKit (and Windows) devices from the rest of my gear.
Last year we bought the first HomeKit-compatible webcam, the Omna 180 Cam HD from D-Link. At $150 it wasn’t cheap but buying from a reputable company like D-Link who clearly have been in the business of network gear for ages gave us peace of mind.
The camera hasn’t been a huge success for us for a few reasons. The video isn’t as sharp as we’d expected. It was supposed to be 1080p but it’s pretty fuzzy. It doesn’t store information anywhere but on its own SD card, which might be a plus for some people but for us it limits the usefulness. It gets pretty hot which concerns us, and it is simply offline sometimes and we have to unplug it and plug it in to get it running again.
Steve Gibson of GRC (author of ShieldsUp & SpinRite) has released InSpectre, a free Windows app which clearly communicates your PC’s current level of protection against Meltdown & Spectre, and what kind of a performance hit you should expect — www.grc.com/…
RedHat have withdrawn their microcode patch for Spectre after it caused some systems to become unbootable (Linux supports dynamic updating of CPU microcode without the need for a BIOS update) — www.theregister.co.uk/…
A great post on the official Raspberry PI blog that primarily aims to explain why the Raspberry PIs are not vulnerable to Spectre, but in the process, explain Spectre in clearest and most understandable way I’ve yet seen — www.raspberrypi.org/…
In this mammoth episode, we’ve got some random CES observations, a review of the Avantree Bluetooth over-the-ear headset from George from Tulsa, a CES interview with an innovative hearing aid called Eargo, a story of Thunderbolt docks and USB-C from me, another CES interview about LiFi for Internet connectivity with OLEDcomm, a hot tip from Knightwise about how to reinstall Mac App Store apps using the command line, an augmented reality toothbrush from Kolibree called Magik from CES, and as if that weren’t enough content, we’ve got an out-of-band Security Bits update with Bart Busschots with the lates news about Spectre and Meltdown.
I’ve got a couple of announcements to tell you, then a listener story from David Bogdan from Japan, and one from Denise Crown. At that point, I’m going to hand you over to Bart and me in Security Bits because there was so much to talk about with so many big stories. We’ll talk about password managers being used as trackers, the IOHIDeous vulnerability, and then spend a lot of time learning the truth (as of now) about the Meltdown and Spectre vulnerabilities. It’s a fascinating session and Bart unpacks all of this for us beautifully of course.
This problem affects all features that auto-fill usernames and passwords, whether or not they are native to the browser, or, provided by third-party plugins, so this affects everyone who saves passwords in their browser in any way.
This week I was on the Clockwise Podcast episode 220 at relay.fm/…. Leo Laporte and Megan Morrone talked about my iOS 11 settings Mind Map of Doom on iOS Today episode 372 at around 57:30 into the show. Helma from the Netherlands brings us some networking tips. I bring you the first half of my 2017 Year in Review where I talk about the different software and hardware I’ve told you about during the year and tell you whether they’re still in use and why (or why not). Then Bart Busschots is back with Security Bits where we have two Security Mediums, the HP Keylogger, and Mailsploit.
I’ve always thought it might be interesting to look back on all of the products I’ve reviewed over the years and see what I’m still using. That would be a gargantuan effort, given that I’ve been doing this for over 12 years!
Some HP laptops shipped with a keyboard driver from Synaptics in which a developer debugging feature was accidentally left enabled. The effect of this mistake is that the driver has built-in support for logging all keystrokes via WPP (a debugging tool that’s built into Windows).
This sounds bad, really bad, but thankfully it’s not actually as bad as it sounds.
Tom Merritt was on Chit Chat Across the Pond to talk net neutrality. I confess that after all my “I have made fire” talk about writing a script for chapter marks, it didn’t actually work. Learn how to make Holiday Card Address Labels using plain old Apple Contacts. Rush Sherman asks our first ever video Dumb Question – why do I use Downcast when I clearly said I used Pocket Casts before? Patreon did a major shift in how they charge patrons and pay creators, and I wanted to tell you how I feel about it and what hopefully will be changing. In a rare moment of music enjoyment, I suggest you buy If Every Day Were Christmas from Slau Halatyn. Bart Busschots brings us Security Bits about the macOS Root Bug, a HomeKit Bug, and changes to iOS Backup Encryption.