Our Do+Bushi system comes to revolutionize the way we think about property security. In a world in which our personal data is constantly being used by businesses and governments for their own benefit, we have created a solution that entirely protects your privacy. You won’t have to worry any more about others prying and getting access to your information. Do+Bushi -with its privacy centered architecture- stores camera footage in its own central unit inside the property. This means data isn’t uploaded onto the cloud for anyone to meddle with. If by any chance the system does get hacked, the data isn’t retrievable as it’s incoded. So the risk of a security breach is minimal.
This works quite differently from other cloud-based security systems in which video footage is processed in the cloud, making it HACKABLE for third parties. Although these security breaches aren’t very common, they do surprisingly happen. And when they do, things can get very ugly. There have been such cases in Ring, Nest and other important property security companies.
Where Do+Bushi Stores Your Data?
Also, Do+Bushi only stores the information users classify as important. They can choose which events they want captured and saved. For instance, users who wish to know when their dog is outside, can program the cameras to detect that specific activity. Every other piece of data that isn’t wanted is deleted on the spot. Another point in favor of privacy is that by keeping information out of business’s reach, footage sharing between the users and the private and public sector is avoided.
When data is open and available, tech companies auction off the private data to the highest bidders, such as advertisers. Also some cloud-based companies partner up with police departments and give them access to any surveillance data they may have. This creates a situation in which police forces disregard certain laws while being shielded from public scrutiny.
We Use Our Own AI Algorithm to Protect Your Privacy
The Do+Bushi system works with facial matching and pose detection technology. It detects individuals that haven’t been logged on to the system and that therefore could be considered suspicious, or at the very least, strangers. However, this tool respects an ethical protocol. It isn’t sensitive to a specific gender, race or age. Its purpose is to detect behavior identified as suspicious without targeting individual identities. By identifying quickly and precisely people who aren’t a part of your daily routine, any kind of security risk is minimized.