![]() The initial requirements that I identified were: I’ve spent all of my spare time in the past week - probably twenty to thirty hours - researching and experimenting and the results have actually been quite surprising. My next step was to figure out how I’d handle motion-activated recording, and that’s what I’ll discuss this time. In my last post, Amcrest IP Camera First Impressions, I went over what I’d found about the pair of IP cameras that I bought to keep an eye on my dogs and my new house. Update: The next post in this series is up, IP Camera, Home Security and Automation Update. Please keep in mind that none of this is intended to protect against someone who targets me specifically (and takes the time to research me) as opposed to my home at random. ![]() Finally, the systems that I describe are intended to provide some protection against or notification of crimes of opportunity, not targeted attacks. ![]() I highly recommend that anyone implementing a similar system - especially if you also publish the details of it - have undocumented backup systems/devices. My code and system has a few obvious vulnerabilities and probably some non-obvious ones as well I humbly but sincerely ask that you do not attempt to exploit these. ![]() My current system and code has grown organically over time and is not how I’d approach this if I started over from scratch. Notice/Disclaimer: The information I provide on home automation/security and surveillance is based on what I’ve set up for myself based on a balance of cost, ease of use, and security, and should be considered for hobby purposes only. ![]()
0 Comments
Leave a Reply. |