Eufy, by Anker, is a great choice imo. They keep data local by default, no subscription required. Very minor record of controversies.
Eufy, by Anker, is a great choice imo. They keep data local by default, no subscription required. Very minor record of controversies.


Two party consent laws in California come down to a “reasonable expectation of privacy” and that has been worked out in the legal system over time to be pretty much any place with an open door or window, even a conference room inside a private business is fair game if the door is open to the hallway.
I’d recommend trying Ollama+OpenCode to DIY removals. It can at least help find the sites and their removal request pages, but then you’d need to solve captchas and do the requests.
–
Some of these PII removal companies go to great lengths to request removals on your behalf without providing ANY additional information that the data broker does not already have.
The problem is that nobody can tell which PII removal companies act responsibly and which ones are merely data brokers themselves.
Even the ones trying their best to not distribute more information about you need only to screw that up once, and that single incident of human error leads to a neverending cycle of leaks between downstream data brokers.
It’s the perfect industry for local AI agents to replace, but the only way to know you’re properly requesting removals without making matters worse is to do it yourself.


I don’t understand why protestors would even show up in Washington DC during the fascist parade like is being implied in the article.
The union protests and social unrest currently underway are not really related to Trump’s authoritarian birthday bash except for how the media paints them as a “warm up”.
Protesters would be better served popping up all over the country except in Washington DC during their synchronized goose stepping contest.
Yep, this is exactly the controversy I was referring to from two years ago. It only applies if you choose to upload video to their cloud, not your local storage hub.
If you read more about this, you’ll find that the vulnerability has been sensationalized by Gizmodo. A malicious actor would have to go to great lengths to obtain a very long hash string and then append that to a URL to get access to the unencrypted content. That hash string itself is not accessible, so it is highly unlikely.
With that being said, I wouldn’t recommend putting a security camera of any brand inside your home and pointing it somewhere you can’t risk being seen on the off chance of a breach, but how many people are really looking to do that anyway?