A substantial amount of the videos taken with Wyze in the United States have been exfiltrated to China for study and distributed to a variety of companies in the mainland. Many are involved in the healthcare space, such as iHealthLabs.
Wyze cameras automatically begin scanning a users network environment once plugged in and begin initiating a series of automated hacking attempts against devices in a user’s home.
All Wyze devices allow Wyze, or anyone who has accessed their database within the last 10 months, to SSH tunnel into the devices from anywhere in the world.
It jams its tentacles into your eyes to see what you see, into your veins to know how you feel, and finally crawl into your brain to be aware of everything you hear and ultimately to infer whatever you think, could consider, or have done.
I’m being checking all those Microsoft internal forums/communities/events for ever and I never being able to find them productive.
I always have the impression that they are not there to be useful. Microsoft have literal Billions of users and they actively promote those communities and still they are depressing desert most of the time and they don’t produce anything useful. Google, or even Bing, rarely return any valuable result from those places, it’s always stack overflow or some personal blog.
Most third-party Tempest apps and integrations are designed for the personal use by a single Tempest System owner.
To start using the REST or WS API, all you need is an access token. Your app or integration must ensure that the user viewing the station data is the owner of that station by authenticating the user’s account. There are two options for authentication: Oauth or the Personal Access Token.
To create a WeatherFlow login: Download the Tempest app from the app stores.