Copying a Key by Listening to It in Action

Researchers are using recordings of keys being used in locks to create copies. Once they have a key-insertion audio file, SpiKey’s inference software gets to work filtering the signal to reveal the strong, metallic clicks as key ridges hit the lock’s pins [and you can hear those filtered clicks online here]. These clicks are vital to the inference analysis: the… Continue reading Copying a Key by Listening to It in Action

Smart Lock Vulnerability

Yet another Internet-connected door lock is insecure: Sold by retailers including Amazon, Walmart, and Home Depot, U-Tec’s $139.99 UltraLoq is marketed as a "secure and versatile smart deadbolt that offers keyless entry via your Bluetooth-enabled smartphone and code." Users can share temporary codes and ‘Ekeys’ to friends and guests for scheduled access, but according to Tripwire researcher Craig Young, a… Continue reading Smart Lock Vulnerability

LockPickingLawyer’s ‘[192] IFAM Huno 80 Shutter Lock v. Chinese Copy: Pick, Gut, & Compare’

Thanks to the LockPickingLawyer for publishing his superlative picking videos (via his LockPickingLawyer Channel) for all to see, enjoy and, of course, learn.
Permalink
The post LockPickingLawyer’s ‘[192] IFAM Huno 80 Shutter Lock v. Chines… Continue reading LockPickingLawyer’s ‘[192] IFAM Huno 80 Shutter Lock v. Chinese Copy: Pick, Gut, & Compare’

LockPickingLawyer’s ‘Using a “Rotar Pick” To Open A Mul-T-Lock Interactive’

Thanks to the LockPickingLawyer for publishing his superlative picking videos via his LockPickingLawyer Channel for all to see, enjoy and, of course, learn.
Permalink
The post LockPickingLawyer’s ‘Using a “Rotar Pick” To Open A … Continue reading LockPickingLawyer’s ‘Using a “Rotar Pick” To Open A Mul-T-Lock Interactive’

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

Interesting collision of real-world and Internet security: The ceremony sees several trusted internet engineers (a minimum of three and up to seven) from across the world descend on one of two secure locations — one in El Segundo, California, just south of Los Angeles, and the other in Culpeper, Virginia — both in America, every three months. Once in place,… Continue reading DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

Interesting collision of real-world and Internet security: The ceremony sees several trusted internet engineers (a minimum of three and up to seven) from across the world descend on one of two secure locations — one in El Segundo, California, just sou… Continue reading DNSSEC Keysigning Ceremony Postponed Because of Locked Safe

When they make physical locks, do they really just make a few variations of the keys and then mix them together and sell? [duplicate]

I always assumed that each lock is unique and can only be opened with the keys it was sold with (or any copies made later from those originals). But the truth seems to be that they just make “a few” variations (10? 100? 1,000? 10,000?), mi… Continue reading When they make physical locks, do they really just make a few variations of the keys and then mix them together and sell? [duplicate]