The Most Secure Lock Ever? (Hint: Nope)

Author: Brian Rhodes, Published on Dec 03, 2014

High security locks are big business, but even the most advanced examples are vulnerable to simple exploits.

Now, a new lock from a small Taiwanese company claims to be 'incapable of exploitation". And sure enough, the design is so exotic, it does not resemble other locks:

But does this lock really have what it takes to be a commercial success? We examine in this note.

**** ******** ***** *** *** ********, *** **** *** **** advanced ******** *** ********** ** ****** ********.

***, **** **** **** * ***** ********* ************* ** **'********* ** ************". *** **** ******, *** ****** ** ** ******, ** does *** ******** ***** *****:

*** **** **** **** ****** **** **** ** ***** ** be * ********** *******? ** ******* ** **** ****.

[***************]

Product ********

*** ********'* **** ***** ***** ** ***** ***********. *** ******** does * **** *** ********** *** ******* *** *** '**** security' ******** ** ********:

Key ********

***** *** ***** ****** **** ******** ******* **** ***** ***** are:

**********

******* ***** **** *** ****** ** ****. ******* *********** *** 23, ************* ****** ********** ** *********** **** ******* *******. ** the ** **** *********, **** * *** ******, *** ********** depressing ** ******** *** **** * *** *******. ************** ********** the ***** **** ** *** ****** ****** ******* **** ********* it **** ******** **** ** * **** *****, *** *********** not * ****.

**** *****

********, '******* *** ****', ** ********* *** *** **** ** *** ***** ***** line *** ******** ** ****, ** *** * ****** **** either. **** ** ********* ****, ****** ****** *** ***** * without ********** *** ***** ** **** ********, **** **** ******** them ** *** ****** ***** ** *** **** ****.

****** ******* *******

*** **** ** *** *** * ****** *********** ** * out ** ** ****, *** ***** ** *** **** **** to * ******. **** ******* ** **** ** ********* ** potential ************ **** ** *** ******* * **** *** *****.

****

** $*** *** ****, ******* ** ******* ** *** ******* side ** ****-******** ***** **** *** **** $*** ** ****. However, *** $*** **** ******** ** ********** ***** ****, **** strike ******, *** *** '******' ****.

*********

*******, *** **** ******* **** ** **** *** ****** **** will **** ** * ******* *** ******* ****. *** *** ones:

  • **** ****:*** ****** ** *** **** ***** *** *** ** ***, it ****** ****** ** ******* **** * ******. ** ** huge, ******. ****-**** **** ***** ******** ** ****** ***** ******** on *** * *****, **** **** ******** **** ** * ring.
  • ********* ** ****: ** ********* * ****** *** **** * ****** ****** is *****, ******* ******* ***** ** ********* ***** ** **********. The ********* ******** **** ***** **** ******** ******** ** ********* impairment **** **** ********** *******.
  • ********: ******** ******** **** *** ****** ** **** * *** typically ***** ******* * ********* ** **** **** **** ****, or**** ******* * ******* **** *********** **** ****. ******* ***** *** ****** *** that. ** ********* **** ** ******** **** *** **** ****** to **** **, **** **** *** * *** *** **. Replacement **** **** ** ******* **** *** ******. ** * locked-out **** ***** **, **** *** ****** ***** **** ******** a **** ** ******.

**** ** ********** ***** **** ******* ** ****** *** ******** risk ** ***** *** ******* **** * *****, ******** ******, the ********** ******** ** ***** *** ******* **** **** **.

The ****

**** ******** ** ********* ** **** ********* **** **** *********. However, *** '*******' **** ******* **** * *** ******* ********* ******* ************* ** ****, **** ********* *** **** ** ************ '*' *** '******' *** '*****':

UPDATE: **** ******* *********

* ****** ******* *** *** ********* *****, ***** *****-***** ******** *** '*********' ********* *** ******* ****** *** ****:

Comments (4)

* *** **** **** * ***** ****** *** **** **** plate **** ** *** *** *** **** **** ****** ** the ***** ******. *** *********, **'* ********** *** *** **** as *** ******* ***** ***** *** ******* ********* *** *** easily ********.

****, **** **** ******. ** *******.

**** ** * **** *** ***** ****, *** ** ********** **** ******.

* **** ***** **** *** (******* ***********) ***** ******* ********* I **** ** ** *****.

***! ******* ****!

******* *** ***** *** ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Locks

Door Fundamentals For Electronic Access Control on Sep 20, 2016
Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be...
Hotel Access Control Explained on Aug 17, 2016
Hotel access control seems to work magically. Unlike electronic access control systems used in commercial security, doors in hotels are not...
Access Control Specification Guide on May 19, 2016
This 15 page report provides the most in-depth guidance on specifying Access Control systems you will find. Specifying Access Control correctly...
Software House Access Control Company Profile on May 02, 2016
In our 12th access company profile, we examine Software House's C-Cure access control platform: Comparing Software House to their...
Banned: Classroom Barricade Locks on Apr 14, 2016
In this age of classroom shootings, many are looking for barricade locks - a cheap and easy stopgap to bolster door security.   Critics condemn...
The Brooklyn Access Startup: Kisi on Apr 12, 2016
Straight from the hipster startup hotbed of Brooklyn comes a new IP access control system.  And if the tough streets of NYC do not offer enough...
Brivo Access Control Company Profile on Feb 09, 2016
This is our 9th in a series of access control company profiles. In this entry, we cover Brivo. Profile Brivo is a US based access company...
Network Security for IP Video Surveillance Guide 2016 on Feb 03, 2016
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Honeywell Pro-Watch Access Control Profile on Feb 01, 2016
Inside we examine Honeywell Pro-Watch access control line: Comparing Honeywell to their competition Examining their management and client...
PoE Powered Access Control Guide on Jan 18, 2016
The popularity of Power over Ethernet applications has spilled over into Access Control.  Taking advantage of the general popularity of powering...

Most Recent Industry Reports

Nest Cam Outdoor Tested on Sep 23, 2016
After years of claiming an outdoor model was "coming", addressing their biggest user demand, Nest has finally released their Outdoor Camera, an...
ACTi Refuses Race To The Bottom, Shifts To Solutions on Sep 23, 2016
The original low cost IP camera disruptor was ACTi. Back in the 2008 - 2010 time frame, Taiwanese manufacturer ACTi challenged the Western and...
You Get Robbed, Canary Will Pay You Up To $1,000 on Sep 22, 2016
Canary is trying to break the status quo in DIY security, first by raising over $40 million, and now a revamp of their monthly services package...
Milestone Ends Development of "Enterprise" VMS on Sep 22, 2016
Milestone 'Enterprise' was one of the first enterprise video management software offerings, selected by many early adopters of IP video. However,...
History of Video Surveillance on Sep 22, 2016
This is a concise history of video surveillance covering the past decade.  The goal is to help professionals newer to the industry understand...
Access Control Course Fall 2016 on Sep 22, 2016
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Totally Wireless IP Camera (IPVideo Corp NomadHD) on Sep 21, 2016
Wireless battery powered cameras have been a surveillance pipe dream for years, limited by camera power consumption, battery technology, and...
Axis Launches IP Speakers on Sep 21, 2016
First, Axis introduced an IP horn, then it was video intercoms, and now it is Networked Speakers? While IP-based Public Address systems are not...
Tagged RFID Object Search Recorded Video on Sep 20, 2016
Video analytics has gotten fairly good at tagging people in video, but it does not solve the problem of finding items like specific merchandise or...
FLIR and Geovision Join the Hikvision Price Cut Race on Sep 20, 2016
Hikvision's price cuts are clearly a trend setter. After numerous and increasingly large cuts, the destructive cycle is accelerating. Last month,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact