AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Ip camera viewer open source4/30/2023 Written in a language I have some experience in (which essentially means Python, Ruby, or maybe (maaaaybe) NodeJS).Runs in Docker, even if not officially supported.I should get a text message if the system goes down or stops working correctly) Relatively straightforward monitoring (i.e.Detect loss of camera (on network) and trigger notification.Detect loss of video/tamper and trigger notification.Ability to disable motion activation/recording via script or API.On-demand manual recording (ideally via both UI and script/ API).Motion detection to trigger recording and notifications/scripts configurable post-motion recording time prerecord buffer.Decent mobile support, either via built-in web UI or native app.List, search and playback videos from the UI.PTZ (pan/tilt/zoom) control from the UI.Can stream live via the UI, ideally full resolution with low latency.Works behind a HTTP reverse proxy, such as nginx with certificate auth.Support multiple cameras - at least two, ideally four or six.Must be able to run with low-end hardware - either a Raspberry Pi or another small and inexpensive system (I don’t want this to depend on my desktop, and I don’t want to invest a lot in it).Open source (preferably GPL) and runs on Linux.The initial requirements that I identified were: I’ve spent all of my spare time in the past week - probably twenty to thirty hours - researching and experimenting and the results have actually been quite surprising. My next step was to figure out how I’d handle motion-activated recording, and that’s what I’ll discuss this time. In my last post, Amcrest IP Camera First Impressions, I went over what I’d found about the pair of IP cameras that I bought to keep an eye on my dogs and my new house. Update: The next post in this series is up, IP Camera, Home Security and Automation Update. Please keep in mind that none of this is intended to protect against someone who targets me specifically (and takes the time to research me) as opposed to my home at random. Finally, the systems that I describe are intended to provide some protection against or notification of crimes of opportunity, not targeted attacks. I highly recommend that anyone implementing a similar system - especially if you also publish the details of it - have undocumented backup systems/devices. My code and system has a few obvious vulnerabilities and probably some non-obvious ones as well I humbly but sincerely ask that you do not attempt to exploit these. My current system and code has grown organically over time and is not how I’d approach this if I started over from scratch. Notice/Disclaimer: The information I provide on home automation/security and surveillance is based on what I’ve set up for myself based on a balance of cost, ease of use, and security, and should be considered for hobby purposes only.
0 Comments
Read More
Leave a Reply. |