Does Every Country Need To Make Its Own Network Devices, Or ???

Following the national security argument to a logical, if admittedly extreme conclusion, that is where you might end up.

Assuming that is unrealistic, what is a workable solution?

1. Western countries/western cameras, Eastern countries/eastern cameras

2. Allied countries/allied cameras

3. No cameras from foreign government owned companies

4. No cameras from foreign government owned companies in non-allied countries

5. Open or reviewed source firmware cameras only

6. Other?

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

*** **** * **** * **** ***** ******* ** **** leading *******... ** ******* **, ** ** ** ****** ********* for ***, *** **** ** *** ***** **** ** ***** the ********* *** *** (***** *** ******** , *** *********) and *** *** *********** **** *********.

* **** ***** **** **** **** , ** ***** *** work, ** ******* ****** ***** ** *** ***, **** ****...*** if **** ***'* *** ******* *** ********* ******, **** **** infiltrate **** **** ************ *** *** ******* ** *** ******.

******** *********' ****** ***** ** *** *** *** **** ***** to **** *.*. *********,**** ***** **** *** *.*.******* **** ******** feared?

"* **** ***** **** **** **** , ** ***** *** work, *f ******* ****** ***** ** *** ***, **** ****."

*** *** ********** *****:)

*** * **** **** ****** **** * ******

...if ******* ****** ***** ** *** ***, **** ****.

Hacker **: ****! *****’* **** ** *** ** ** **** ****** *******. I’ve ***** **********!

Hacker **: **** *** ***** ****** **** **** *** **** ****.

Hacker **: **** **** *** **** ****, *** *** *****? * ***’* know ****** ***** *** *** ******* * **** ****.

Hacker **: *** ** ********* **** *** ***** ****** *** ******. *** won’t **** **** ***’** ** ***. ***** **** **** **** out, *** **** **** ** ********* ** ********* ********!

Hacker **:****’* *********! *** ** **** ** **** **** *****?

Hacker **: *** **** ** ****** **** **...

** ****** ****’* **** ***** ** * ****. ** ****’* a **** **** **** *** ******. ** *** *** ** that ******** *** ******** *** ************** *** *** **** ****. Not ****** **** ****** ** *** ***** ****** ** ******.

...***** *** ********...

**** ** *** ***** *** ‘**** ********’ ** ** ********* whether ***** ** ** *********** ******** **** ** **** ****** by *** ************?

‘**** ********’

**** ******* ** **** *** *******!

**** ******* ** **** *** *******!

**** ******* ** ****** *** *******!