Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Empowering you to understand your world

Ring Rolls Out End-To-End Encryption For Surveillance Footage

Ring has gotten negative press coverage recently for accessing customers’ Ring camera footage. Now they’re implementing end-to-end encryption. End-to-end encryption has become known as a far more sound alternative to conventional encryption. This is because conventional back-doored encryption enables the service provider to access your data whether customers like it or not.

End-to-end encryption provides the ability to prevent the service provider and everyone else from reading or using customers’ data. The emphasis on ability is key here, because end-to-end encrypted services can have trackers built in which log keystrokes on the users’ devices or intercept data in-app before it is encrypted and sent off to the server. This issue pertains mostly to closed-source software because you can’t see if the software is intercepting your data or not.

You should also consider the fact that Ring’s new end-to-end encryption feature is opt-in. If a feature is opt-in, then the provider/manufacturer doesn’t really want you to use it. Customers will have to decide whether they can trust Ring to avoid the use of such trackers. If not, i’d recommend looking into cameras that use HomeKit Secure Video technology, or other open source services offering end-to-end encrypted surveillance cameras.

Share this article
Shareable URL
Prev Post

Tesla Self-Driving Tech Will Identify Lights, Sirens Soon

Next Post

Apple Now Offers A MagSafe Battery Pack

Leave a Reply

Read next
Subscribe to our newsletter
Get notified when new content is published