Skip to main content

Rings finally adds end-to-end encryption to wireless cameras, but there's a catch

Home security brand Ring is expanding end-to-end encryption (also known as E2EE) support to more devices while also introducing a new data transfer feature. It's a welcome security update, but it also forces the deactivation of some useful Ring features.

Previously, E2EE was only available to wired products like the Ring Video Doorbell Pro and Floodlight Cam. Now that support is migrating over to Ring’s wireless cameras and doorbells. However, it’s unknown if everything in the lineup will get it. Nowhere in the announcement does it say whether or not all wireless devices will have the E2EE support; although there are reports stating the support is indeed universal. We reached out to the company to see if it could clear up this confusion. This story will be updated if we hear back.

As for the new data transfer tool, it’s called Deactivated Device State. It allows users to save past recordings from an old Ring device to their account. This way, you don’t have to manually download every single video one by one. Users must stay a Ring subscriber to use this tool, however. Otherwise, they’ll have to download everything to their local computer before the company deletes the videos. 

Instructions on how to save recordings and deactivate devices can be found on Ring’s website. It'll involve updating the Ring mobile app and going into a device's personal settings to keep events.

End-to-end encryption

Either way, if you do have a wireless Ring camera or doorbell, we recommend updating the mobile app to see if the E2EE is available. The company has a set of instructions on its website that detail how to set up end-to-end encryption. Similar to Deactivated Device State, you'll have to update the app and go into the Control Center. From there, activate E2EE, create a passphrase, and then add whichever devices you want.

It's worth enabling E2EE is because, somewhat obviously, it improves Ring Device security. Videos recorded on Ring cameras are uploaded to the company’s cloud storage which, as it turns out, isn’t the most secure. The company has a history of security problems from 1,500 passwords leaking onto the dark web to possibly giving hackers a way to steal Wi-Fi from houses. 

With end-to-end encryption, your recordings have their data protected and unreadable. No one – not Ring, Amazon, hackers, or even the government – can view your encrypted videos. All they’ll get is a jumbled mess of data. Only the Ring user and their connected device can view recorded videos.

That said, there’s a catch to having this level of security. End-to-end encryption on Ring devices actually disables many features including Bird’s Eye View, Virtual Security Guard, Event Timeline, and Alexa Greetings just to name a few. The full list of disabled features can be found on the company website. Users will essentially have to ask themselves whether the better security is worth the loss of convenience. 

Given Ring's history, it may be better to opt for security.

Room for improvement

Expanded E2EE support and the new data transfer feature are great and all, but Ring still has room for improvement. Cybersecurity research firm Checkmarx recently discovered a vulnerability within the Ring Android app that could allow “threat actors to steal identity data including geolocation and camera recordings.” On top of that, it might be possible for someone to upload malware to an Android phone via this vulnerability and steal even more sensitive data, including addresses.

And what’s scary is that theRing  Android app has more than 10 million downloads. Now that end-to-end encryption is available to most of RIng’s offerings, perhaps it’s time for the company to patch the holes in its own security and stop the constant leaks.

If you’re interested in beefing up your home security, be sure to check out TechRadar’s list of the best home security systems of 2022.



Source: TechRadar

Popular posts from this blog

Twitter has hidden the chronological feed on iOS again – and I'm furious

In a controversial move, Twitter has brought back a feature that removes the 'Latest Tweets' view for users on iOS, which is something that many users, including me, hated back in March 2022 – and it's now rolling out. The first time the company decided to do this, 'Home' would appear first in a tab at the top, and there was no way of changing it so that 'Latest Tweets' would be the default view. It was reverted back after the company said it was a 'bug' for iOS users. This time though, it's no bug. Instead, it's 'For You' and 'Following' where you can only swipe between them now, which doesn't make much sense for a platform where you're using the platform to keep up to date with who you follow. It's a bizarre change that makes me ask – who wants this, especially during a time when its new owner, Elon Musk, is bringing in and reversing changes almost every week still? This one change will have big consequenc

New MacBook Pro Reviews: Hands-On Look at Performance and Upgraded Specs

The new 14-inch and 16-inch MacBook Pro models will start arriving to customers and launch in stores this Tuesday. Ahead of time, the first reviews of the laptops have been shared by select media publications and YouTube channels. Powered by Apple's latest M2 Pro and M2 Max chips, the new MacBook Pros offer up to 20% faster performance and up to 30% faster graphics. The laptops can be configured with up to 96GB of RAM, compared to a max of 64GB previously. Other improvements include Wi-Fi 6E, an upgraded HDMI 2.1 port with support for up to an 8K external display, and an extra hour of battery life over the previous generation. The new MacBook Pros have the same design as the previous models released in October 2021. The laptops can be pre-ordered on Apple's online store, with pricing starting at $1,999 for the 14-inch model and at $2,499 for the 16-inch model. Benchmarks Geekbench results from last week revealed that the M2 Pro and M2 Max chips offer up to around 20%

iPhone 15 Pro Rumored to Feature Ultra-Thin Curved Bezels

The iPhone 15 Pro models will have thinner, curved bezels compared to the iPhone 14 Pro models, potentially resulting in an Apple Watch-like appearance, according to the leaker known as " ShrimpApplePro ." ShrimpApplePro clarified that the next-generation "Pro" iPhone models will still have flat displays, since only the bezels are to be curved. According to a source speaking to the leaker, this combination of slimmer bezels and curved edges could result in a look similar to the Apple Watch Series 7 and Series 8. The curved front glass will purportedly also be present on the ‌iPhone 15‌ and ‌iPhone 15‌ Plus's design, but these devices will not have thinner bezels compared to their iPhone 14 predecessors. ShrimpApplePro added that the ‌iPhone 15‌ lineup will feature the same display sizes as last year's ‌iPhone 14‌ lineup. Last year, the leaker was among the first to say that the ‌iPhone 15‌ Pro models will have a titanium frame with curved rear ed

This new Linux malware floods machines with cryptominers and DDoS bots

Cybersecurity researchers have spotted a new Linux malware downloader that targets poorly defended Linux servers with cryptocurrency miners and DDoS IRC bots. Researchers from ASEC discovered the attack after the Shell Script Compiler (SHC) used to create the downloader was uploaded to VirusTotal. Apparently, Korean users were the ones uploading the SHC, and it’s Korean users who are targets, as well. Further analysis has shown that the threat actors are going after poorly defended Linux servers, brute-forcing their way into administrator accounts over SSH.  Mining Monero Once they make their way in, they’ll either install a cryptocurrency miner, or a DDoS IRC bot. The miner being deployed is XMRig, arguably the most popular cryptocurrency miner among hackers. It uses the computing power of a victim's endpoints to generate Monero, a privacy-oriented cryptocurrency whose transactions are seemingly impossible to track, and whose users are allegedly impossible to identify. Fo