iCam Featured on the Today Show, CNN, and Good Morning America!
Sorry, still not getting it. If there's no cryptographic nonce that's exchanged between the source and the icam app, and the authentication is being brokered by your servers based on a static hash of the username and password, then what's to prevent you (or someone who's compromised your server) from just replaying the hash that is sent?
Stefan, you did a great job explaining the password/hash process.