doctorow — 2014-08-26T14:00:23-04:00 — #1
davide405 — 2014-08-26T14:06:18-04:00 — #2
As is often the case, Mr. Munroe has already proposed a solution to this problem.
cegev — 2014-08-26T14:20:58-04:00 — #3
It's not necessarily fair to say that this method works on "high-security locks." There are a number of high-security lock systems that are either very difficult to bump, or intrinsically impossible to bump, like Protecs.
The larger threat of 3D printing and precise computerized machining, however, is that key control becomes far more difficult. It no longer matters if only one company can make the key for your lock: anyone else with temporary access to your key can just print one. Outside of unusual things like EVVA MCS, I'm not sure how this can be prevented.
jandrese — 2014-08-26T15:15:32-04:00 — #4
In general if anybody untrusted has access to a key for any length of time the key needs to be considered compromised. People were making wax impressions of keys back in the 17th century.
jerwin — 2014-08-26T15:46:42-04:00 — #5
In general if anybody untrusted has access to a key for any length of time the key needs to be considered compromised.
You should probably amend this to
In general, if anybody untrusted has a photograph of a lock's keyway for any length of time, the lock, and any other lock using the same general type of keyway, needs to be considered compromised.
tristis — 2014-08-26T16:56:12-04:00 — #6
Or, more broadly: Keyed locks are a deterrent, but should never be considered as absolutely secure. And most things that are locked can be accessed by methods that do not require defeating the lock directly.
jandrese — 2014-08-27T11:27:30-04:00 — #7
Nothing is secure given enough time and a determined attacker.
longname — 2014-08-31T04:54:02-04:00 — #8
Must be a fan of the The Invisibles (Episode #1.4). (I wish they had made more.)
doctorow — 2014-08-31T14:00:33-04:00 — #9
This topic was automatically closed after 5 days. New replies are no longer allowed.