I’m always suspicious of apps which setup a local web server to accomplish some basic task. When Zoom did this, it was a security nightmare.
Just based on the screenshots, DroidCamX sets up a local webserver on the phone, and then the video is accessible on the local network (for example: http://192.168.0.17:4747/video). This means anyone on the local network can access the webcam, which in an office or school setting, might be disastrous. If a coworker were in a conference room using this app, a malicious coworker could use this to spy on the meeting surreptitiously.
However it’s implemented in the OS, a basic requirement is that there is some authentication to link the phone’s camera to the computer, and that the video is encrypted in transit, to avoid man in the middle attacks.
Good thing I only use it locally on my own network at home. I see why this is dar from ideal, specially since the app only ask for the IP and port before accepting the connection
I’m always suspicious of apps which setup a local web server to accomplish some basic task. When Zoom did this, it was a security nightmare.
Just based on the screenshots, DroidCamX sets up a local webserver on the phone, and then the video is accessible on the local network (for example: http://192.168.0.17:4747/video). This means anyone on the local network can access the webcam, which in an office or school setting, might be disastrous. If a coworker were in a conference room using this app, a malicious coworker could use this to spy on the meeting surreptitiously.
However it’s implemented in the OS, a basic requirement is that there is some authentication to link the phone’s camera to the computer, and that the video is encrypted in transit, to avoid man in the middle attacks.
Good thing I only use it locally on my own network at home. I see why this is dar from ideal, specially since the app only ask for the IP and port before accepting the connection