It’s owned by CCP, are you shocked? That’s probably the least of what they’re doing
Update: Anker provided a statement to MacRumors, explaining why the images are collected and how the issue will be addressed going forward.
eufy Security is designed as a local home security system. All video footage is stored locally and encrypted on the user's device. With regard to eufy Security’s facial recognition technology, this is all processed and stored locally on the user's device.
Our products, services and processes are in full compliance with General Data Protection Regulation (GDPR) standards, including ISO 27701/27001 and ETSI 303645 certifications.
To provide users with push notifications to their mobile devices, some of our security solutions create small preview images (thumbnails) of videos that are briefly and securely hosted on an AWS-based cloud server. These thumbnails utilize server-side encryption and are set to automatically delete and are in compliance with Apple Push Notification service and Firebase Cloud Messaging standards. Users can only access or share these thumbnails after securely logging into their eufy Security account.
Although our eufy Security app allows users to choose between text-based or thumbnail-based push notifications, it was not made clear that choosing thumbnail-based notifications would require preview images to be briefly hosted in the cloud.
That lack of communication was an oversight on our part and we sincerely apologize for our error. This is how we plan to improve our communication in this matter:
1) We are revising the push notifications option language in the eufy Security app to clearly detail that push notifications with thumbnails require preview images that will be temporarily stored in the cloud.
2) We will be more clear about the use of cloud for push notifications in our consumer-facing marketing materials.
eufy Security is committed to the privacy and protection of our users' data and appreciates the security research community reaching out to us to bring this to our attention.
I absolutely agree with you.On the update to this article:
Whether or not you accept this answer from Anker, it is much, much more than the kind of response we get when Apple gets caught, and Apple has been getting caught a lot recently. Usually Apple just gives us the silent middle finger, or have Craig give us a middle finger with a pretty ribbon tied around it in the form of some virtuous sounding non-answer.
What? No. You only block the local IP of the cameras themselves. They don't need access to the internet ever.Block the IPs on your local firewall after you have brought them into HKSV. You'll still be able to view the feed in the Home app but the cameras won't be able to access the internet to sent data.
Sounds good, in theory, but in this case, the device is using Amazon AWS servers for cloud connectivity. If you block all of the AWS servers worldwide, you stand a good chance of breaking many other things, including web sites you may find yourself accessing.
There is absolutely no reason a smart camera needs to have a remote server except to either steal user data or to make an excuse for a monthly subscription fee. All of these functions could be done locally including facial recognition, notifications etc. They could set it up where you have remote access to your own device but they don't if they wanted to. This tech has been around for years and the fact you have to use their server is a scam.
On the update to this article:
Whether or not you accept this answer from Anker, it is much, much more than the kind of response we get when Apple gets caught, and Apple has been getting caught a lot recently. Usually Apple just gives us the silent middle finger, or have Craig give us a middle finger with a pretty ribbon tied around it in the form of some virtuous sounding non-answer.
This never happened to me.This is the latest fairly concerning development to involve Eufy.
First there was the huge outage that left users unable to view their cameras (kind of exposing the fallacy of their ‘local’ advertising for the average user).
That is messed up. But still hasn't happened to me.Then there was the massive issue last year where unauthorised users were able to access others cameras - I had someone from the other side of the country talking to me through my doorbell 😳.
I did just buy 4 more Eufy cameras. Their equipment is STILL 100% better than Arlo, and no subscription fees, either.I’m glad this broke just before the black Friday sales as I was going to pull the trigger on 4x Eufy cameras - went with another brand.
I've got probably a couple thousand dollars invested in my Eufy cameras and floodlights. While I love my system too, I'm still going to monitor this situation. It's the only prudent thing to do.So basically this Moore chap was after click bait hyperbole revenue, and it looks like it worked.
Love my Eufy system, does a good job. Tempted by their new AI system too.
If this is the case, I won't worry about it either. Besides that, 75% of my security cam footage is of the neighborhood cats coming to call at all hours of the night. Each cat has his own time and day to cavort...it's almost as if they have made appointments and they don't overlap each other!Just checked eufy's response and they've admitted that they do briefly host the preview image on the amazon server but not the video footage, which is fine by me as I know all security cameras do that. As long as my videos are kept locally, I do not worry about it.
I've got probably a couple thousand dollars invested in my Eufy cameras and floodlights. While I love my system too, I'm still going to monitor this situation. It's the only prudent thing to do.
About the streaming, maybe it has to do with this: https://community.anker.com/t/how-t...-to-stream-video-to-your-compatible-nas/64833
I would never buy one of these.
Anker's popular Eufy-branded security cameras appear to be sending some data to the cloud, even when cloud storage is disabled and local only storage settings are turned on. The information comes from security consultant Paul Moore, who last week published a video outlining the issue.
![]()
According to Moore, he purchased a Eufy Doorbell Dual, which was meant to be a device that stored video recording on device. He found that Eufy is uploading thumbnail images of faces and user information to its cloud service when cloud functionality is not enabled.
Moore demonstrates the unauthorized cloud uploading by allowing his camera to capture his image and turning off the Eufy HomeBase. The website is still able to access the content through cloud integration, though he had not signed up for cloud service, and it remains accessible even when the footage is removed from the Eufy app. It's important to note that Eufy does not appear to be automatically uploading full streaming video to the cloud, but rather taking captures of the video as thumbnails.
The thumbnails are used in the Eufy app to activate streaming video from the Eufy base station, allowing Eufy users to watch their videos when away from home, as well as for sending rich notifications. The problem is the thumbnails are uploaded to the cloud automatically even when the cloud functionality is not active, and Eufy also seems to be using facial recognition on the uploads. Some users have taken issue with the unauthorized cloud uploads because Eufy advertises local-only service and has been popular among those who want a more private camera solution. "No Clouds or Costs," reads the Eufy website.
Moore suggests that Eufy is also able to link facial recognition data collected from two separate cameras and two separate apps to users, all without camera owners being aware.
Other Eufy users responded to Moore's tweet and saw the same thing happening, and there is also a dedicated Reddit thread on the subject. Moore tested the Eufy doorbell camera, but this also appears to be how other Eufy cameras function. As Moore demonstrates, the images can be accessed with simple URLs after logging in, which is a potential security risk for those concerned. Eufy did remove the background call that reveals the stored images after Moore's tweet, but did not remove the footage.
Moore received a response from Eufy in which Eufy confirmed that it is uploading event lists and thumbnails to AWS, but said the data is not able to "leak to the public" because the URL is restricted, time limited, and requires account login.
There is also another issue that Moore has highlighted, suggesting Eufy camera streams can be watched live using an app like VLC, but little information on the exploit is available at this time. Moore said that unencrypted Eufy camera content can be accessed without authentication, which is alarming for Eufy users.
We've contacted Anker for additional comment on the Eufy issue and will update this article if we hear back. Moore said that he has been in touch with Eufy's legal department and will give them time to "investigate and take appropriate action" before he comments further.
Update: Anker provided a statement to MacRumors, explaining why the images are collected and how the issue will be addressed going forward.
Article Link: Anker's Eufy Cameras Caught Uploading Content to the Cloud Without User Consent [Updated]
Eufy ticks all the boxes for me too and no monthly fee was a requirement for me; not just a nice-to-have. I'm thinking of buying the solar panels for several of the harder-to-reach cams around my place. One spot, under an overhang, might not do anything to actually CHARGE the batter, but I'm thinking that a partial charge each day might extend the battery life from 2 months to 3 or 4. I would consider that one a big win.I literally just installed Eufycam 3s at my house. I was previously a Google nest cam house, but I don't want to invest in their ecosystem due to their love of killing off products (they killed their security system). Eufy ticked all the boxes for me, mainly with no monthly fee and built in solar.
We do need to consider "expectation of privacy"; for sure. And even though I could carry a low-volume conversation around the outside of my home, two things already remove the expectation of privacy for me outside: The closeness of the neighbors' homes and the presence of the Eufy cams themselves. Not the cams so much, but the microphones that each one has. This is always on my mind, and so I already DON'T have an expectation of privacy in the vicinity of any of my cameras.I'm definitely annoyed/concerned about this, especially the unsecured feeds. That said, my cams are only installed outside my home in a space where I really don't have an expectation of privacy. So I'm not returning them... but I will be following the story closely. I sure as **** won't be buying any of their cams for indoors.
If you don't need cameras, fine. But if you do, it's actually one of the best systems you can buy. And the others above are correct. Thumbnail storage on AWS is not really a big deal, although I will continue to monitor this while I hold off on buying any indoor cameras from Eufy.I would never buy one of these.
The issue here is not with HomeKit. In fact, if this was a HomeKit-only camera, this wouldn't be an issue.I have given up on HomeKit cameras, and almost on HomeKit completely. They've had a while to work this stuff out and are dragging their feet. I'm looking at the UniFi stuff now.