TOSL Project. A community project to "build a better mousetrap".
by PickAxe187 » 16 May 2013 16:39
I saw there was thread quite a while back, that discussed the possibility of bluetooth enabled locks. Well, fast-forward about three years and its almost here. Unikey off-shoot Kevo has developed "Uni-Key-powered door lock allows you to open the lock simply by touching it when you're carrying a UniKey-enabled smartphone or an included key fob. The technology also lets you assign access to others who have a UniKey-compatible smartphone." Currently the lock will only work with the latest incarnations of iOs, though they would like to expand to Android in the future. What do you think a security convenience or liability? I think this is feigned security, this lock is a standard tumbler lock, nothing very special about it. Perhaps if the lock itself wasn't capable of using a key it would be more secure, but if you can you use a key doesn't that mean it can be picked?
-
PickAxe187
-
- Posts: 13
- Joined: 18 Mar 2013 16:28
by mh » 17 May 2013 2:37
It's nice and convenient, but not about security.
"The techs discovered that German locks were particularly difficult" - Robert Wallace, H. Keith Melton w. Henry R. Schlesinger, Spycraft: The secret history of the CIA's spytechs from communism to Al-Qaeda (New York: Dutton, 2008), p. 210
-
mh
- Moderator
-
- Posts: 2437
- Joined: 3 Mar 2006 4:32
- Location: Germany
-
by mh » 17 May 2013 2:42
This is UniKey's idea about the required security (from UniKey.com):
-------- We do not only rely on the built-in encryption available in Bluetooth. All the encryption / decryption algorithms that we implement are well known and conform to known standards. These multiple military grade encryptions each remain uncompromised. Attempts have been made to break into these well-known algorithms over the years by the cryptographic community without any success. Most importantly please remember that your security is only as good as its weakest point and the UniKey system is not that point. Anyone wanting to gain unauthorized access to your home will have better luck with another attempted method of entry. --------
"The techs discovered that German locks were particularly difficult" - Robert Wallace, H. Keith Melton w. Henry R. Schlesinger, Spycraft: The secret history of the CIA's spytechs from communism to Al-Qaeda (New York: Dutton, 2008), p. 210
-
mh
- Moderator
-
- Posts: 2437
- Joined: 3 Mar 2006 4:32
- Location: Germany
-
by bobhdus » 6 Aug 2013 11:53
Its a neat concept but too bad it's not available with a standard plug/lock pinning (with pick or bump resistant pins) or different keyways. The Kwikset smartkey design is not really known as being a hard lock to get open and in some cases the home owner may never know their lock was defeated...
"Live like your going to die. Because you are"
-

bobhdus
-
- Posts: 92
- Joined: 10 Jan 2011 19:35
- Location: Liberty, MO
-
by bjornnrojb » 26 Aug 2013 23:54
It is probable that one can replace the lock cylinder as long as the cylinder has a standard tailpiece. It would only cost about $8 for an SC4 cylinder from GMS to put in there (assuming it wouldn't be too long...)
-
bjornnrojb
-
- Posts: 97
- Joined: 31 May 2013 23:18
- Location: Seattle
by nothumbs » 26 Nov 2013 18:49
It's a good day when I learn something new.
-
nothumbs
-
- Posts: 473
- Joined: 22 Mar 2007 15:23
- Location: Northern California
by C locked » 27 Nov 2013 8:48
That lock is designed for convenience. And generally. Convenience means fail-safe. And fail-safe is insecure. ...eg $35 digital code safe with key override. Built for convenience. Opened by 3yo's. ...back to lock. it combines the worst elements of the pin tumbler lock cylinder. And the worst elements of the bluetooth protocal..
-
C locked
-
- Posts: 267
- Joined: 6 Aug 2013 4:04
- Location: Australia
by MBI » 27 Nov 2013 10:04
Physically yes, it suffers from all the physical weaknesses that the regular SmartKey locks have. I'm just curious how long it takes for someone to fully PWN the bluetooth side of it, given how many vulnerabilities there seem to be in bluetooth. I don't know enough about the subject to know if this is even theoretically possible, but wouldn't it be tragic on so many levels if someone made a downloadable android app that allowed anyone with an android tablet or smartphone to walk up to any KEVO lock with no advanced info or packet sniffing, and just walk right in.
-
MBI
- Moderator Emeritus
-
- Posts: 1346
- Joined: 9 Oct 2007 2:29
- Location: Utah, USA
-
by Achyfellow » 27 Nov 2013 11:03
MBI wrote:Physically yes, it suffers from all the physical weaknesses that the regular SmartKey locks have. I'm just curious how long it takes for someone to fully PWN the bluetooth side of it, given how many vulnerabilities there seem to be in bluetooth. I don't know enough about the subject to know if this is even theoretically possible, but wouldn't it be tragic on so many levels if someone made a downloadable android app that allowed anyone with an android tablet or smartphone to walk up to any KEVO lock with no advanced info or packet sniffing, and just walk right in.
Just wait, something like that is bound to happen 
-
Achyfellow
-
- Posts: 131
- Joined: 1 Oct 2013 6:50
by mechanical_nightmare » 2 Dec 2013 7:22
The price tag is outrageous: http://www.homedepot.com/p/t/204379769?cm_sp=D25T-_-plp_banner-_-TH-_-kwikset_kevo#customer_reviews$219 for a deadbolt which can be picked without much trouble? Plus I don't see how this cylinder would be resistant to a variety of destructive attacks, which are the most common methods for illegal entry... Security Snobs has Abloy Protec's for similar (if not lower) prices, and they provide much higher security. I would rather spend $260 on a EVVA MCS than $219 on a Kwikset Kevo any day.
If you do not manipulate the lock, then the lock will manipulate you
-
mechanical_nightmare
-
- Posts: 253
- Joined: 20 Sep 2013 4:03
- Location: Istanbul, Turkey
by mechanical_nightmare » 8 Dec 2013 11:27
To correct my earlier post, it appears the Kwikset Smartkey has a sidebar, and hence has increased pick resistance. Still, from what I can see, resistance against destructive attacks seems quite low, in addition to the possible electronic deficincies identified earlier. it combines the worst elements of the pin tumbler lock cylinder. And the worst elements of the bluetooth protocal..
I couldn't agree more...
If you do not manipulate the lock, then the lock will manipulate you
-
mechanical_nightmare
-
- Posts: 253
- Joined: 20 Sep 2013 4:03
- Location: Istanbul, Turkey
by GWiens2001 » 9 Dec 2013 19:39
mechanical_nightmare wrote:The price tag is outrageous:
Security Snobs has Abloy Protec's for similar (if not lower) prices, and they provide much higher security. I would rather spend $260 on a EVVA MCS than $219 on a Kwikset Kevo any day.
I can not believe that you actually used EVVA MCS and Kwikset in the same sentence. Isn't that reason for banishment? Yes, there is no excuse for that kind of pricetag for a garbage lock. Gordon
Just when you finally think you have learned it all, that is when you learn that you don't know anything yet.
-

GWiens2001
- Site Admin
-
- Posts: 7550
- Joined: 3 Sep 2012 16:24
- Location: Arizona, United States
by ckc123 » 10 Dec 2013 19:54
MBI wrote:I don't know enough about the subject to know if this is even theoretically possible, but wouldn't it be tragic on so many levels if someone made a downloadable android app that allowed anyone with an android tablet or smartphone to walk up to any KEVO lock with no advanced info or packet sniffing, and just walk right in.
Physical security issues with the smartset locks aside.. just because a device has bluetooth does not mean it will open the lock.. bluetooth is just the protocol it is using to transfer encrypted data between the lock and the phone.. same with the packet sniffing.. you can't just reply an encrypted transmission and hope to get the same results as before. There are several common ways the encryption is handled, and you have to separate how you encrypt the data, from what is encrypted.. you have to know BOTH. to fake a message. quite often the "what" is not a repeating value, so you can't just replay the same data from before.. something even as simple as an incremental number being encrypted each time it's sent prevents this.. this is common for system passing encrypted data.. they use the time/data or a sequence in the data so they can detect "replayed" data. plus when you have an ack/nack protocol, once the lock responsed that it have acted on the received data, it knows the device acknowledged that the previous data was received and acted on so it can't be replayed at a future date.
-
ckc123
-
- Posts: 195
- Joined: 2 Jan 2011 21:49
- Location: North of the GTA
by teamstarlet » 18 Feb 2014 11:49
You make some good points there ckc123
It's a pity that these companies have great ideas yet fail to take care of the basics...
I wonder if you could disassemble the unit and place a different cylinder in it?
-
teamstarlet
-
- Posts: 137
- Joined: 5 Jan 2014 20:12
- Location: Boston, MA
Return to The Open Source Lock
Who is online
Users browsing this forum: No registered users and 1 guest
|