![]() "All you need is a friend that works there, or to take a picture of their key, or even a picture of the key hanging off their belt," says Lawrence. And by studying Schlage's manuals and patents, Lawrence and Van Albert learned to decipher the two distinct codes in the keys-one set of six numbers cut into the top of the key and another set of five in its sidecut-that can be programmed into their modeling software and precisely reproduced. Other researchers like those behind the Sneakey project have shown that keys can be effectively replicated from photos, even ones taken from hundreds of feet away. But the two students in MIT's electrical engineering program point out that there are ways to copy a key without ever possessing it. It merely enables anyone to copy a key they couldn't easily copy before. ![]() Lawrence's and Van Albert's software tool, to be clear, doesn't let its users open any random door secured by one of those locks. Even Marc Weber Tobias, one of the world's most well-known lockpicking experts, has written that he uses Primus locks in his home and for secure evidence storage in his legal practice. That security stems in part from Primus's unique model, which includes two tracks of teeth-one on the top of the key and another on the side, each of which correspond to a separate set of pins in the lock. Schlage's Primus models are advertised for use in high-security applications: The company's marketing materials include references to the locks' use in government facilities, healthcare settings, and detention centers.
0 Comments
Leave a Reply. |