You must log in or # to comment.
If you use ‘em end-to-end encrypt the storage and transmission. You lose some features but at least it makes hijacking them more inconvenient.
In that case, I’d create a second wireless network that doesn’t have internet access to keep it all in-house under my control.