Help with reverse engineering WebRTC with VicoHome Camera

I’ve managed to intercept most of the TLS communications after patching the app with reflutter to disable flutter’s SSL pinning. I’ve also managed to create a script to request a new username and password to access the TURN servers. So far my understanding is that ICE makes it easier to access the stream by having the client (KVS WebRTC) access relays if a direct connection to the webcam is unavailable:

I’m using this example to build a WebRTC client that is able to use ICE with TURN to (hopefully) access the stream and somehow get it into Frigate:
simple_webrtc_python_client/examples/webcam at main · aljanabim/simple_webrtc_python_client · GitHub.

Because this uses KVS WebRTC (which is what AWS Kinetic uses) I thought maybe I could get go2rtc to work since it supports Kinetic streams but so far I haven’t had any luck going that route.

1 Like

I understand nothing :sweat_smile: but I hope you can find a solution.

marbleskyle even though I am a developer myself, I have almost no knowledge on networking and the stuff you are doing. I hope you find a way to make this work and we can use Vicohome cameras in Home Assistant. If you need any help to test stuff out, let me know.