My Underkill Home Network


A complex graph with dozens of devices connected by a tangle of coloured lines.

There's an absolutely delightfully bonkers post doing the rounds called "My Overkill Home Network" - which is a look into what happens when a computer geek goes feral and stuffs as many Internet connected thingamajigs in a living space. We're talking professional grade, rack mounted, doubly redundant, over-specced, equipment. Overkill is underselling it. I wondered how my home network looked in comparison. A few years ago I was complaining that routers which limit users to 128 WiFi devices…

Continue reading →

Review: eufyCam 2C Wireless Home Security Camera System


Flyer explaining how Eufy is different.

I hate the Internet of Things. It's a load of overpriced junk, which abuses your privacy and demands a monthly fee in return. That's why I was pleasantly surprised to see this fall out of the eufyCam 2C box. There's no monthly fee. The recordings stay in your home. The batteries last for ages. I can get on board with this! The package costs around £220 (discount of £40 if you use my code) and you get a smart-hub, two cameras, mounting points, and some flat ethernet cable. Set-up was easy. I…

Continue reading →

Gadget Review - Nooie 360 Security Camera


Nooie camera sat on a table.

The good folk at Nooie have sent me their 360 WiFi camera to review. Cost is usually £50 - but check the bottom of this post for a discount code. The design is gorgeous - and award winning. It's a sleek unit and, surprisingly, feels nice in the hand. It can store videos on an SD card (not included) or via the cloud. The app - which is pretty nice - also lets you view the camera when you're away from home. Let's tear straight into it! Unboxing Standard image Night Mode In low light, …

Continue reading →

Hacking Around With Network Cameras


I was recently given 3 rather locked-down network cameras. Each camera was pre-programmed to communicate with a specific website, and only attach to a predefined wireless access point. Naturally, there was no supplied username or password. I thought about how I might get access. Using a man-in-the-middle attack to sniff the password, or trying to dump the firmware and examine that. Sadly, all the vulnerabilities previously reported no longer work. After a little bit of thought, I went for…

Continue reading →