Skip to main content

"Would AlpineMan recommend these for use on dashcams and security cameras? NO!


"Would AlpineMan recommend these for use on dashcams and security cameras? NO!

Samsung voids the warranty if you use these on dashcams or any other continuous recording devices such as security cameras.
https://www.samsung.com/us/suppor...MP128GA/AM

Sandisk has a similar warranty void.
https://www.sandisk.com/about/leg...ted-states

What you need are cards labeled "High Endurance" for dashcams, security cameras, etc."

Other than the warranty, these cards will work perfectly fine in a dashcam.

=====
"Uh...NO. It's not just a warranty issue. It's also a data integrity issue. Here's a good read on why you should use high endurance cards for dashcams: https://carcamcentral.com/guide/r...ltra-cards

If you're good with risking data loss at the most critical time, sure...go use these cards for dashcams. Yes, you can get 2 of these cards instead and use one as a backup, but will the other card have a backup of your lost data? Nope. You're thinking only of physical card replacement...not data replacement. Critical data is worth a lot more than SD cards. That's like saying...hmmm, I'll just buy 8 tires and use the other 4 as a backup in case my cheap tires blow up. Uh...how about what could result when you're in the freeway and your tires blow up?

Look at the big picture folks!"

Feel free to backup any of that statement with data and evidence. Btw, read your own link, it lists zero proof. Just tons of speculation.
fyi, when microsd cards fail, they generally go into read only mode. Data is there, you just can't change it or delete it, but you can read it.

=====

This card works great in a dashcam. Mine has served flawlessly for about a year now running 24/7. An equivalent high endurance card costs over twice the price so just buy two of these, have a backup, and still save. Also, the high endurance only has a 5-year warranty (half of this cards warranty). This is also a U3 card versus U1 for the high endurance. There are risks either way. This is just my opinion.
Here is the high endurance card I was referring to.
https://www.amazon.com/Samsung-En...emory+card

IF you are concerned about your warranty being void due to dash camera use, be aware that when you initiate a return, notify manufacturer that the failed card contains proprietary and potentially protected (HIPAA compliance) data. My wife, and ER doctor, had a card fail on her phone, and Sandisk recommended snapping the card into pieces before returning it. So there are ways to avoid revealing the contents of the card without voiding the warranty.

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...