Tag Archives: remote

Using tinyCam on Android for SecuritySpy

While SecuritySpy has a dedicated iOS app that provides a great remote access experience on iPhones and iPads, we currently do not produce a dedicated Android app. This is because, since SecuritySpy is a macOS application, the vast majority of our users are within the Apple ecosystem, and very few use Android devices.

At this time, the best solution for viewing live video from your SecuritySpy system on an Android device is the tinyCam Monitor app. This app is inexpensive, easy to use, and has a built-in profile for SecuritySpy that helps to simplify the setup. Here’s how to set it up.

1. Set up access to your SecuritySpy system

If you need to access SecuritySpy only over your local network, all you need to do is to enable the HTTP web server under Settings > Web, and add a user account for password protection.

Additionally, for access over the Internet, follow the setup steps outlined here: SecuritySpy Installation Manual – Remote Access.

Your SecuritySpy server should now be set up for local and/or Internet access. Verify this by going to Settings > Web > Access Info; a panel pops up that shows access addresses for local and/or remote connections:SecuritySpy Access Info Continue reading

Remote Access Without Port Forwarding

The usual way to set up remote access to our CCTV software SecuritySpy running on your Mac is via port forwarding (see Installation Manual – Remote Access). This method allows direct incoming connections to SecuritySpy from the Internet, and is achieved by configuring your router (which SecuritySpy can do automatically for most routers). This method is great for most users, as it usually allows high-performance remote access with minimal configuration.

However, some users may want to consider other methods for the following reasons:

  • Port forwarding only works when your ISP gives you a true public IP address, which is not always the case, especially with cellular or satellite internet connections (e.g. 4G, 5G, Starlink).
  • If you have two routers between the Mac and the Internet (e.g. your ISP router plus your own router), port forwarding configuration is difficult – the usual solution is to switch one of these routers to bridge/passthrough mode, but this isn’t always possible.
  • ISP routers sometimes prevent users from setting port forwarding rules.
  • Institutions with very strict network policies may have a blanket ban on allowing any kind of incoming connections from the Internet.

If you can’t use port forwarding for any reason, the solution is to set up a Virtual Network or a Tunnel (sometimes called a proxy) via a third-party service in order to access your system. A number of these solutions are described below, with setup instructions.

A Virtual Network, as opposed to a physical network, is a Software-Defined Networking (SDN) solution that creates an overlay network on top of existing network infrastructure, spanning across multiple physical networks and the Internet. Members of this virtual network can communicate with each other as if they were on the same physical network.

With a Tunnel solution, the data is relayed via a third-party server acting as an intermediary. Note that many providers apply data transfer limits, so you should take steps to moderate your bandwidth usage when accessing remotely, such as minimising live video streaming, avoiding large file downloads, and generally using the connection sparingly.

Which solution you choose generally comes down to the following question: do you have a fixed set of devices from which you want to access your SecuritySpy server? For most users, the answer to this question is yes, and in this case a Virtual Network is the best solution. On the other hand, if you want your SecuritySpy server open to the Internet for anyone to (attempt to) access, then a Tunnel solution provides this.

In terms of security, both solutions offer encrypted Internet communication, however the Virtual Network solution is considered more secure because clients have to first be a member of the network in order to even attempt connections to the server, which adds an extra layer of security. Note that in either case, the connection to SecuritySpy itself is via its plaintext HTTP web interface (not the secure HTTPS interface), so this must be enabled in SecuritySpy’s web settings. This is because the encryption is handled by the virtual network / tunnel solution itself, not by SecuritySpy.

Virtual Network (SDN) Solutions

Client software is installed on all devices, allowing them to communicate freely with each other as if they were on the same physical network. The system assigns each device a virtual IP address. Devices are only accessible to others within this virtual network, not from outside. The central server primarily helps set up direct connections between devices, rather than relaying data itself.

Continue reading