FOSS Tapo C210
Go to file
xfarrow d20dce5ef0
Update README.md
2023-11-09 11:27:54 +00:00
hardware-specifications Update README.md 2023-11-09 11:27:54 +00:00
how-to-connect-to-foss-NVR Update README.md 2023-09-18 08:16:57 +00:00
img add product image 2023-09-19 10:54:29 +02:00
secret-apis Update README.md 2023-09-18 14:33:59 +00:00
LICENSE Initial commit 2023-08-23 15:28:10 +02:00
README.md Update README.md 2023-09-19 13:01:45 +00:00

README.md

Tapo C210

IP Cameras are a nightmare for our privacy. For this reason I am reverse engineering a Tp-Link Tapo C210's firmware and its relative app in order to prevent them from sending any data to untrusted servers.

There are some better resources than mine: see https://github.com/nervous-inhuman/tplink-tapo-c200-re and https://drmnsamoliu.github.io/, but use those resources mindfully, as they are about Tapo C200, whereas this repository focuses on the C210. Despite being esthetically equivalent and having a similar name, their hardware is completely different. The C200 is based on a MIPS microprocessor, whereas the C210 is based on the ARM-based MStar SSC335 chipset.

In particular, I will focus on

  • the reverse engineering of the app in order to be able to use the camera without a Tp-Link account;
  • the reverse engineering of the firmware to strip off the portions of code sending the video stream to their servers, or better self-compile a clean firmware. Good news you can install OpenIPC (here for our hardware-specific version, with memory chip NOR 8M) and linux-chenxing, so we do not need any reverse engineering, at most we need to contribute to these projects. I did not test these firmware as of today yet.

How these cameras were designed to work

  1. You download a proprietary app (Tp-Link Tapo) and create an account without which the camera can not work;
  2. You use said app to instruct the camera to use a specified Wi-Fi AP;
  3. The camera sends the video stream not end-to-end encrypted to servers we have no control over;
  4. You have the possibility to update the camera's firmware through its app. This expands the attack surface for a hacker or from the company itself to push a malicious update.

What we can do

As of today, we have:

  • Libre NVR solutions (iSpy, ZoneMinder, ...);
  • A collection of open source software to control these cameras through undocumented APIs, see my collection.

Nonethless, if you use these solutions only, you still need the proprietary app and a Tp-Link account the first time you boot the camera up and NVRs will not stop the camera from sending the video stream to their servers without using a firewall.

Disclaimer

The author(s) of this document are not affiliated to TpLink, Tapo, or any company. The instructions present here are not meant to be followed, but rather, they're used to demonstrate what these cameras are capable of. No warranty is provided if you follow these instructions. Remember that any unauthorized modification can result in unrecoverable malfunctioning, a void warranty, and infringement of law, especially if meant to compromise a 3rd person.