Skip to content

Media Coverage: WIRED interviews IC Realtime CEO for expert commentary securing video doorbells while reducing privacy and surveillance risks

March 2, 2026 | By

IC Realtime Founder Matt Sailor contributed expert commentary to WIRED coverage examining how homeowners can harden video doorbells against privacy, data-sharing, and “surveillance state” concerns.

Video doorbells have shifted from simple convenience devices into a broader privacy issue, in part because footage can be shared, aggregated, or requested in ways many owners don’t anticipate when they install a camera at the front door.

WIRED’s discussion centered on how neighborhood-scale networks of cameras can create more expansive tracking in aggregate than any single device might suggest, especially when clips are routinely posted or exchanged beyond the original household.

A second concern is the unpredictability of access, ranging from informal community requests to legal demands. The report noted that homeowners are generally not required to share footage without an official request, while cloud-stored video may be obtained from providers through legal process, with limited exceptions for emergencies.

Against that backdrop, Sailor’s input emphasized “owning” video data as a practical way to reduce exposure, pointing readers toward configurations that prioritize local recording or otherwise minimize third-party possession of footage.

WIRED also highlighted configuration choices that can materially reduce privacy impact: aiming the camera to stay on-property, setting activity zones or masking areas, and considering disabling audio because microphones can capture more than users expect.

Storage decisions were framed as a tradeoff rather than a simple “cloud bad” conclusion. The reporting described cloud storage as potentially useful for redundancy—particularly if a device is stolen—while stressing that end-to-end encrypted options reduce the risk of third-party access.

Default settings and “freemium” offers received special scrutiny, with the piece advising readers to check whether they are automatically enrolled in footage-sharing features and to review fine print around how data may be used.

Finally, the coverage treated sharing behavior as a security decision in its own right: once footage is posted publicly, control over where it travels and how it is reused can be difficult—or impossible—to regain.

 

GET IN TOUCH WITH US