Hacking the Internet of Things: Locks and Thermostats
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats…. Continue reading Hacking the Internet of Things: Locks and Thermostats
Collaborate Disseminate
At Defcon last weekend, researchers demonstrated hacks against Bluetooth door locks and Internet-enabled thermostats…. Continue reading Hacking the Internet of Things: Locks and Thermostats
Interesting history…. Continue reading Lockpicking Competitions in the 1850s
This is the first time I’ve heard of this clever hack. Bicycle thieves saw through a bicycle rack and then tape it back together, so unsuspecting people chain their bikes to them…. Continue reading Sabotaging Bicycle Racks
A Yahoo! answers user suggested that there are 5^5 possible unique configurations for a physical key, but the answer wasn’t sourced. I wondered if anyone had similar numbers for how many possible key combinations there are. I ask because, … Continue reading How many unique house keys can possibly exist?
My friend just posted a picture of her key to instagram and it occurred to me that with such a high res photo, the dimensions of the key could easily be worked out.
Therefore the key could be duplicated.
What’s to stop someon… Continue reading What’s to stop someone from 3D print cloning a key?
How secure are car remote keys? When you lock or unlock your car, can someone spoof or make another remote key?
How do car remote keys work? Do they use some kind of private/public keys, encryption?
Are aftermarket alarm remote keys less… Continue reading Vehicle remote key security