...concerns related to another government having access to all this information.
More people might be concerned about our government having access to all this information. Because it is more likely be used against you, no?
But really, what do you suppose China will do with all our home videos?
Figure out our street addresses and daily habits and then break into houses one by one?
Read bank statements from across the room using super resolution?
Play propaganda using subliminal audio?
Anyway, let's say they did that.
Wouldn't the government just block the IPs that the cameras use, assuming we caught on?
Anyway, what makes you think you can escape Chinese written firmware on your home LAN?
List your devices please.
The way these cameras works is P2P - Peer to Peer. The manufacturers including Dropcam, use self-hosted / AWS / Alicloud (Alibaba Cloud) / Google Compute / Azure servers running the P2P code. Each camera that these guys are selling have an ID. The P2P server information is hard-coded in the camera firmware, so the camera knows which server(s) to look for. The whole concept of P2P is to just establish an authenticated connection (secure tunnel) between the client and the camera / NVR / DVR. So you never need a static IP, DDNS, Router NAT Traversal etc.
Once you start recording on the cloud after authentication, that's where the privacy issues crop up. Who would you trust more? Dropcam vs Hikvision?