fenderman
Staff member
- Mar 9, 2014
- 36,892
- 21,408
You keep repeating the same bullshit. Once again, there IS NO AIRGAP if the NVR can be hacked. Who cares of the cameras cannot be hit (which is unlikely, but assuming arguendo they cannot) the NVR is vulnerable.This isn't how the hardware works. An airgap protects the cameras from being access by something other than the NVR. All processes to the camera must originate in the NVR. So, no camera can be hacked if the NVR isn't hacked. That's how this works.
I don't really know how UNV does it. That's proprietary and they haven't told me.
But I can tell you that this isn't nonesense. Here's one way to do it: use a reverse SSH, which is an even more highly secure form of protecting client data than even a VPN.
With a reverse SSH, the edge device can deposit files into a trusted repository (like a cloud or a NVR) and can look at files in the edge repository for instructions on what it should do (like settings changes or firmware updates), but unlike a VPN it cannot receive directions - at all. All communication with a reverse SSH device are outgoing. All communications to the device are blocked - even the central server cannot send it instructions outside of its existing parameters.
The only way to compromise a reverse SSH is for both the trusted device to be hacked and the for the hacked to have knowledge of what files the edge device has been instructed to look for and what validation (hashing algorithm based on mac address, timestamp based hash, whatever) is required for the files to be accepted by the edge device.
Your reverse ssh comment is irrelevant - your users are not implementing it.