>>5580690
It isn't so much the camera at that point as it is the computer/server the camera feeds to. In principle, yes. All of them can be tapped into - although whether or not the tools have been made to and deployed is questionable. Large data collection is probably less focused on security cameras because …..
Your phone has cameras, yes? Facial recognition technology runs locally on your phone. Could I set a facial recognition hash via the FB app (or others) for phones to be on the lookout for?
What about GPS bounding boxes to activate cameras of all phones in those areas and to upload pictures at various gyroscope/accelerometer orientations?
"Learn to code" wasn't a joke. Ghidra. Dig into what the programs running on our computers and phones are doing.
Almost all browsers are built on Chromium. Opera, Edge, Firefox… Chromium has built in ad service handling that activates attached webcams. Ostensibly, this is to see where your eyes are looking for ad services and marker research. Of course, they aren't limited to those uses.
Android is built on Chromium for its browsers. I am skeptical of whether or not the permission settings actually do anything, but I have some hope that Motorola (in my case), has written interventions into their android distribution to make sure that app permissions are adhered to… But… Until I actually lith my own chips for my own phone and can look at the OS source code it uses, I generally assume the device to be compromised and that any particular event during the day is on someone's servers for review.
I have come to look at this as an opportunity, however. Their entire data engine is geared toward the idea that people do not know they are being watched and that what is recorded is an accurate representation of the extent of their life.