How to Secure Your Smart TV Privacy
Smart TVs are advertising terminals that also show video. Automatic Content Recognition (ACR) technology watches what you’re watching and sends fingerprints to ad servers. Voice remotes with “always-on” mics are common. Telemetry runs constantly. This guide covers what to disable and how to block the rest at the network level.
What Smart TVs Collect
Automatic Content Recognition (ACR): Your TV captures screenshots of whatever is on screen — including HDMI input, streaming apps, and cable/antenna — and matches them against a database to identify what you’re watching. This data is sold to advertisers and data brokers. ACR operates regardless of what you’re watching; it sees your cable box, your gaming console, and your Blu-ray player just as well as it sees built-in apps.
Voice data: TVs with mic-enabled remotes record voice commands. Some older Samsung TVs had always-on mics; modern ones activate on button press, but the data still goes to cloud servers for processing. The voice data is used to improve voice recognition models, and may be stored for months.
Usage metrics: App opens, viewing duration, button presses, and crashes are reported to the manufacturer. This includes timestamps of when you turn the TV on and off, which apps you use and for how long, and what buttons you press on the remote.
Ad identifiers: Smart TVs have persistent advertising IDs that follow you across apps and streaming services, similar to the advertising ID on a smartphone. These IDs are shared with third-party advertisers embedded in every streaming app.
The FTC fined Vizio $2.2M in 2017 for collecting viewing data without consent. Vizio was capturing ACR data and selling it to data brokers without adequately disclosing this to users. Samsung, LG, and Roku have all faced similar regulatory scrutiny in various jurisdictions.
Samsung Smart TV
Disable ACR
Samsung calls their ACR system “Viewing Information Services”:
Settings → Support → Terms & Privacy → Viewing Information Services → OFF
Also disable:
Settings → Support → Terms & Privacy → Interest-Based Advertisements → OFF
Settings → Support → Terms & Privacy → Voice Recognition Services → OFF
For older Samsung models (Tizen):
Menu → Smart Hub → Terms & Privacy → SyncPlus and Marketing → OFF
Disable Personalized Ads
Settings → Support → Terms & Privacy → Personalized Ads → OFF
Settings → General → Privacy Choices → Personalized Ads Service → OFF
Also navigate to Settings → General → System Manager → Smart Security and disable it if you don’t use Samsung’s built-in security features — this service collects app usage data.
Microphone
Settings → General → Voice → Bixby Voice Wake-up → OFF
On models with a remote that has a physical mic button, the mic should only activate when the button is held — but disabling Bixby wake-up ensures it is not listening for a wake word at other times. If your remote has a mic button you never use, a piece of tape over the microphone hole on the remote is a reliable physical control.
Samsung IoT Integration
If you use Samsung SmartThings or have connected your TV to a Samsung account, you should also review:
Settings → General → External Device Manager → Device Connect Manager
→ Disable "Device Share" if not needed
LG Smart TV (webOS)
Disable ACR
LG calls it “Live Plus”:
Settings → General → LivePlus → OFF
Settings → General → Additional Settings → Advertisement → Limit Ad Tracking → ON
Settings → General → Additional Settings → Advertisement → Reset Ad ID
Disable AI Recommendation and Voice Data
Settings → General → AI Service → AI Recommendations → OFF
Settings → General → AI Service → Voice ID → OFF
Settings → All Settings → General → Privacy & Terms → User Agreements
→ Uncheck: Personalized Advertising Service, Voice Information
On newer webOS versions (webOS 22 and later), LG has reorganized these menus. Navigate to All Settings → Support → Privacy Notice and look through each category for data collection toggles. LG bundles multiple settings under ambiguous headings, so read each one carefully rather than clicking through.
LG ThinQ Account
If you signed into an LG account on your TV, that account links your viewing data to your identity across LG devices. Consider using the TV without an LG account — most features work without one. To sign out: Settings → General → LG Account → Sign Out.
Roku
Roku’s business model is advertising, not hardware — aggressive data collection by default.
Settings → Privacy → Smart TV Experience → Use Info from TV Inputs → OFF
Settings → Privacy → Advertising → Limit Ad Tracking → ON
Settings → Privacy → Advertising → Reset Advertising Identifier
Settings → Privacy → Microphone → ON/OFF per app (revoke all unnecessary)
Roku’s limitation: Even with all privacy settings disabled, Roku still collects device-level data per their privacy policy. Their 2023 privacy policy explicitly states they share “inferred data” with advertising partners even when ad tracking is limited. Network-level blocking is required for meaningful privacy.
Roku also has a channel data sharing setting that is separate from the advertising settings:
Settings → Privacy → Channel Data Sharing → OFF
This controls whether Roku shares your channel usage data with third parties for market research.
Apple TV
Settings → Privacy → Analytics → Share Apple TV Analytics → OFF
Settings → Privacy → Tracking → Allow Apps to Request to Track → OFF
Apple TV doesn’t have ACR built into the OS. Individual apps (Netflix, Hulu, YouTube) have their own tracking that operates independently of Apple’s settings. The App Tracking Transparency prompt that appears when you first open each app controls whether that app can share your data with third-party advertisers — denying all of these is the right default.
Apple’s own apps collect usage data regardless of these settings when you’re signed into an Apple ID. If you want to minimize Apple’s data collection, use Apple TV without signing into an Apple ID for the TV itself (though Apple TV+ requires one).
Network-Level Blocking
Settings inside the TV OS can be changed by firmware updates — manufacturers have pushed updates that quietly re-enabled tracking. DNS blocking at the router persists regardless of firmware changes.
# Samsung telemetry domains (add to Pi-hole or /etc/hosts):
0.0.0.0 samsungads.com
0.0.0.0 log.samsung.com
0.0.0.0 ibs.samsung.com
0.0.0.0 cdn.samsungcloud.com
0.0.0.0 samsungacr.com
# LG telemetry:
0.0.0.0 lgtvsdx.com
0.0.0.0 ibis.lgappstv.com
0.0.0.0 lgsmartad.com
0.0.0.0 smartshare.lgtvsdx.com
# Roku:
0.0.0.0 scribe.logs.roku.com
0.0.0.0 cooper.logs.roku.com
0.0.0.0 logs.roku.com
0.0.0.0 auction.roku.com
# Reload Pi-hole after editing custom list
pihole restartdns
# Watch what your TV queries in real-time
pihole -t | grep -i "samsung\|roku\|lgadv"
Pi-hole v5 and later lets you create group-based blocking rules. Create a “smart-tv” group and assign your TV’s IP to it, then apply a stricter blocklist to that group only. This avoids accidentally breaking other devices that might legitimately query some of these domains.
Force TV Through Your DNS
Many smart TVs hard-code fallback DNS servers (Google’s 8.8.8.8) to bypass router DNS. Samsung and Roku are particularly known for this. Redirect all DNS queries from the TV’s IP to Pi-hole:
# On OpenWrt: redirect all DNS queries from TV's IP to your Pi-hole
# Replace 192.168.1.55 with your TV's IP
uci add firewall redirect
uci set firewall.@redirect[-1].src=lan
uci set firewall.@redirect[-1].src_ip=192.168.1.55
uci set firewall.@redirect[-1].dest_port=53
uci set firewall.@redirect[-1].target=DNAT
uci set firewall.@redirect[-1].dest_ip=192.168.1.10 # Pi-hole IP
uci commit firewall && /etc/init.d/firewall restart
On pfSense/OPNsense, create a NAT redirect rule under Firewall → NAT → Port Forward that redirects TCP/UDP port 53 from the TV’s IP to your Pi-hole. This catches DoH (DNS-over-HTTPS) only if you also block port 443 to known DoH endpoints — but most smart TVs use plain DNS, not DoH.
Monitor Your TV’s Traffic
Before blocking, observe what domains your TV queries during normal use:
# On Pi-hole, filter query log by TV's IP:
# Admin panel → Query Log → filter by client IP
# To capture raw traffic with tcpdump (on router or separate capture device):
tcpdump -i br-lan -n host 192.168.1.55 -w /tmp/tv-capture.pcap
# Analyze with tshark:
tshark -r /tmp/tv-capture.pcap -T fields -e dns.qry.name | sort -u
This tells you exactly what your TV is contacting and lets you make informed blocklist decisions.
Isolate TV on Its Own VLAN
Network isolation prevents your smart TV from communicating with other devices on your local network — useful if you’re concerned about lateral movement in the event the TV OS is compromised, or simply want to limit what the TV can reach.
# Create a separate VLAN for the TV with no access to your main LAN
# Block inter-VLAN routing from TV VLAN to your main LAN VLAN
# Allow TV VLAN outbound to internet (for streaming) on whitelisted ports only
# See: Network Segmentation for IoT Devices guide for full VLAN setup
With VLAN isolation, your TV can stream Netflix but cannot scan or communicate with your NAS, desktop, or other LAN devices. Combined with DNS blocking, this is the strongest practical configuration short of using a dumb TV.
What Can’t Be Blocked
Even with aggressive network blocking, some features stop working:
- Software updates (whitelist update servers or accept periodic unblocking for updates)
- Some streaming app functionality (Roku in particular requires its logging endpoints for normal function)
- Cloud-dependent features (voice assistants, smart home integration)
The cleanest solution: use a “dumb TV” (older set or commercial display without smart TV OS) connected to a streaming device you control separately. A commercial display — Philips, NEC, or Samsung’s commercial monitors — has no smart TV OS, no ACR, and no telemetry. Connect it to an Apple TV, NVIDIA Shield, or a Raspberry Pi running Kodi for a privacy-respecting smart TV stack you control end-to-end.
Hardware-Level Mitigation: Physical Shielding
For extreme threat models, consider physical modifications:
# Tape over TV camera (if equipped) on Samsung Frame or similar
# This prevents video capture even if ACR is "disabled"
# Disable TV microphone in settings, then verify with:
# Monitor network for audio data uploads
tcpdump -i any -w tv-traffic.pcap host <tv-ip> &
# Audio data would appear as continuous network streams
Most modern TVs lack hardware cameras. The microphone concern is legitimate for voice-remote models.
Identifying What Your TV Queries
Monitor your TV’s real-time DNS queries:
# On a Pi-hole or custom DNS server
pihole -t | grep -i "192.168.1.55" # Replace with your TV IP
# Real-time output shows every domain the TV queries
# Domains that appear frequently are telemetry/tracking endpoints
# Block these at the DNS level
# Example output:
# 2026-03-22T10:15:22.043 192.168.1.55 → samsungads.com (BLOCKED)
# 2026-03-22T10:15:35.102 192.168.1.55 → log.samsung.com (BLOCKED)
# 2026-03-22T10:16:12.445 192.168.1.55 → ntp.ubuntu.com (ALLOWED)
Record these queries over a week to build a comprehensive blocklist.
TCPDump for Deep Packet Inspection
For packet-level analysis of TV traffic:
# Capture all traffic from TV
sudo tcpdump -i any -n host 192.168.1.55 -w tv-traffic.pcap
# Stop after 1 hour
# then analyze
# Convert to readable format
tcpdump -r tv-traffic.pcap -nn | grep -i "dns\|https" > tv-analysis.txt
# Look for:
# - DNS queries to advertising networks
# - HTTPS connections to unknown servers
# - Repeated connection patterns (beacons)
This deep inspection reveals whether the TV is:
- Continuously beaconing (calling home repeatedly)
- Exfiltrating data in large chunks (likely backups or logs)
- Attempting connections outside your geographic region
Roku Data Collection Examples (2026)
Roku’s privacy policy explicitly states they collect:
- Every title you watch
- Duration of viewing
- Content metadata (genre, ratings, etc.)
- Device identifiers
- IP geolocation
- App crashes and usage patterns
# Roku telemetry domains to block
0.0.0.0 scribe.logs.roku.com
0.0.0.0 cooper.logs.roku.com
0.0.0.0 logs.roku.com
0.0.0.0 datacollector.roku.com
0.0.0.0 metrics.roku.com
# Even with all privacy settings disabled, Roku will attempt
# connections to these domains repeatedly
If privacy is critical, Roku is the worst choice among major manufacturers.
AppleTV vs Smart TVs
AppleTV avoids most smart TV tracking because:
1. Apple profits from content (Apple TV+), not advertising
2. No ACR technology built-in
3. Privacy features integrated by default
4. Faster security updates than TV manufacturers
Tradeoff: AppleTV is expensive ($99-$199 vs $200-$500 TV)
For someone already in the Apple ecosystem, AppleTV replaces a smart TV entirely—just use a dumb monitor or older TV.
Warranty and Support Implications
Disabling device features in factory settings may void warranties:
Before aggressively configuring TV privacy:
1. Take a photo of the original warranty
2. Document configuration changes made
3. Understand return policies
4. Consider whether the TV will be serviced through manufacturer
In practice: Most TV warranties don't cover software configuration issues
Disabling telemetry doesn't void hardware warranty
But keep documentation in case of disputes
Detection: Is Your TV Compromised?
Signs that telemetry blocking failed or malware is present:
- TV turns on by itself (firmware malware)
- Unexpected apps installed (sideloaded malware)
- TV extremely slow despite blocking (resource exhaustion)
- Unusual network traffic when TV is "off" (connected standby exfiltration)
- Audio playback distortion at specific times (covert channel?)
Response:
1. Factory reset the TV (erases configuration)
2. Do NOT restore from cloud backup (would restore malware)
3. Reconfigure settings manually
4. Re-enable network-level blocking
Commercial Display Alternative
For maximum control, replace the smart TV with a commercial display + streaming device:
# Setup:
# - Commercial display (LG hospitality, Samsung commercial) ~$300-800
# - Raspberry Pi 4 + Kodi media center ~$100
# - Network segmentation ensures Kodi is isolated
# Commercial displays:
- No ACR technology
- No persistent telemetry
- No app ecosystem
- Act as dumb monitors only
- Often cheaper than high-end smart TVs
# All processing/streaming on the Raspberry Pi you control
# Pi can be headless, diskless-booted over network
# Maximum isolation and control
This approach sacrifices convenience for complete privacy.
Related Reading
- How to Tell if Your Smart TV Is Spying on You
- Smart TV Tracking What Data Samsung LG Vizio Collect
- Network Segmentation for IoT Devices
- Disable Firmware Telemetry in IoT Devices
- Private Home Networking Setup Guide
Built by theluckystrike — More at zovo.one