•
Design and enhance security countermeasures to prevent leakage of information such as audio data, authentication information (user name and password), DDNS server information, etc. Perform the countermeasure such as access restriction (using the user authentication) or access encryption (using the HTTPS function).