Bluetooth Enabling a Security Safe!

แชร์
ฝัง
  • เผยแพร่เมื่อ 14 ต.ค. 2024

ความคิดเห็น • 36

  • @schr4nz
    @schr4nz 2 ปีที่แล้ว +28

    0:40 - it's actually common for people who have designed 'THE THING' not to be able to hack it, because you aren't looking for exploits at the time you've made the product, you think you've covered all bases, it's the techie person that thinks a little bit differently to you that will figure it out or come up with some simple exploit.

    • @lpmusix
      @lpmusix 2 ปีที่แล้ว +1

      Makes me wonder about the peer review if it sounds like a single guy wrote everything, I bet there's vulnerabilities waiting to be found by someone for defcon.

  • @alexkaidon8700
    @alexkaidon8700 2 ปีที่แล้ว +3

    Dave, 10:00, you also have the copper wires that are going from outside of the safe directly into the safe that do carry rf into where the bt chip is.

    • @EEVblog2
      @EEVblog2  2 ปีที่แล้ว +1

      Yes, but they aren't technically designed to do that. The antenna is on the chip, see the datasheet I included.

    • @alexkaidon8700
      @alexkaidon8700 2 ปีที่แล้ว +3

      @@EEVblog2love data sheets and dave , my point was it cannot be a Faraday cage with a great big long(relatively) copper wire running through it, but thanks for teaching me about the Bluetooth chip, it looks very sexy for future projects, small profile ones certainly with that built in antenna

    • @EEVblog
      @EEVblog 2 ปีที่แล้ว +3

      @@alexkaidon8700 I was a bit loose with using the term, chill out dude.

  • @KeritechElectronics
    @KeritechElectronics 2 ปีที่แล้ว +1

    "There's a KER-KLANK as the safe opens."
    (a message in Fallout 2)
    Agreed on using non-specific encryption protocols. Use a tried, tested and true industry standard protocol rather than re-inventing the wheel - there's a better chance of having any bugs squashed long before you even implement it on your device. Security by obscurity is an obvious insecurity.

  • @Nik930714
    @Nik930714 2 ปีที่แล้ว +3

    A word about encryption standards. I work in the payment industry and we design some secure devices for it. First thing I was tough when I started was - don't write security algorithms. Period!!! Its always more secure, cheaper and quicker to use algorithms that people that are experts in the field have designed. Its just the kind of thing that you can easily screw up, unless you know what you are doing.

  • @Fanta....
    @Fanta.... 2 ปีที่แล้ว +3

    There is no way I would trust a bluetooth lock for a safe. Make sure you have a good locksmith on speed dial for when the module fails and locks you out.

  • @SeanBZA
    @SeanBZA 2 ปีที่แล้ว +2

    Not really a Faraday cage, as the gaps on the edges, and all the holes in the steel for parts are going to allow a lot of RF leakage. Plus very likely the actual handle is electrically isolated from the front panel with paint and an oil film, so it will transmit the RF energy through, albeit with high loss. Hopefully you did check the emergency keyslot does work, and that you can open the safe without the BT connection. Otherwise you will be opening it the hard way, angle grinder through the bottom or the back, which is where the safe traditionally has the thinnest steel, as most are designed to be either built into a wall or bolted down

    • @EEVblog2
      @EEVblog2  2 ปีที่แล้ว +3

      Yes, farday cage wasn't really the correct term, and the handle is electrically connected to the chassis. The wires going through the front to the battery would be a high loss passive radiator I suspect.
      I actualy didn't drill out the emergency key hole for this video, as I don't intent to keep the bluetooth lock installed. So yeah, I tested it just before closing and crossed my fingers and hoped it worked! Ross assured me it would, but still...

  • @russellhltn1396
    @russellhltn1396 2 ปีที่แล้ว +1

    Question - can you do a denial of service attack by using a pocket EMP device?

  • @robertbackhaus8911
    @robertbackhaus8911 2 ปีที่แล้ว +10

    "Any fool can devise a system so secure that he cannot think of a way to bypass it."
    A person's skill at creating systems is always lower than their skill at bypassing systems. It is a bit like the way that debugging code is harder than writing it, so if you use all your skill to write code, you are by definition unqualified to debug it.

    • @schr4nz
      @schr4nz 2 ปีที่แล้ว +4

      100% agree with this, actually just wrote a comment saying much the same.

  • @patricksweetman3285
    @patricksweetman3285 2 ปีที่แล้ว +1

    Use the Bluetooth mechanism, but have a dummy keypad to fool the hackers.

  • @badarjahangirkayani6196
    @badarjahangirkayani6196 2 ปีที่แล้ว +3

    @LockPickingLawyer Is there a vulnerability here we are not seeing?

    • @Fanta....
      @Fanta.... 2 ปีที่แล้ว +1

      He can try all the usual master keys. plastic spoon, coke can, etc

  • @ruben_balea
    @ruben_balea 2 ปีที่แล้ว +1

    Is leaving the phone unlocked like leaving the key in the lock or does the app ask you for another password/fingerprint or whatever to compensate for the lack of good sense of some users?

  • @Ciiads
    @Ciiads 2 ปีที่แล้ว +2

    That was super cool

  • @organiccold
    @organiccold 2 ปีที่แล้ว +1

    I was wont where the battery was lol. Now I know

  • @jeremycurtis7506
    @jeremycurtis7506 2 ปีที่แล้ว +1

    What happens if you damage or migrate your handset to a new device, does all the codes transfer? Seems like you'd need to keep a backup handset somewhere safe...

    • @Fanta....
      @Fanta.... 2 ปีที่แล้ว +1

      You can generate the code algorithm again from the QR printed on the manual. That isn't an issue.

  • @gino.avanzini
    @gino.avanzini 2 ปีที่แล้ว +1

    Hey Dave but 1509 isn't live yet

    • @EEVblog
      @EEVblog 2 ปีที่แล้ว +1

      It is now.

  • @Marin3r101
    @Marin3r101 2 ปีที่แล้ว

    Nice video Dave.

  • @borislipschitz2740
    @borislipschitz2740 2 ปีที่แล้ว +2

    Would LockPickingLawyer find some stupid and glaringly obvious mechanical vulnerability there, that none of us, peasant, can spot?

    • @EEVblog
      @EEVblog 2 ปีที่แล้ว +3

      Not if you use the version without the key lock override.

  • @LawpickingLocksmith
    @LawpickingLocksmith 2 ปีที่แล้ว

    Cat skinner first try: Ya Bunnings Ozito grinder and them hinges just fall off. Sorry mr. Ross!

    • @EEVblog
      @EEVblog 2 ปีที่แล้ว +5

      Err, that's what the dog bar on the door is for, I mentioned it in the video. Angle grind the hinges off and the door laughs at you.

  • @ArchAngel1508
    @ArchAngel1508 2 ปีที่แล้ว

    Wasn't this uploaded days earlier? What happened?

    • @EEVblog2
      @EEVblog2  2 ปีที่แล้ว +1

      No, that was another video extracted from the live show.

  • @dw1444
    @dw1444 2 ปีที่แล้ว +1

    replay attack
    ???

  • @monsirto
    @monsirto 2 ปีที่แล้ว

    (cough) Flipper Zero says hi ; ]

  • @leetaylor1443
    @leetaylor1443 2 ปีที่แล้ว +2

    bluetooth sniffing ?

  • @QsTechService1
    @QsTechService1 2 ปีที่แล้ว

    it's ok

  • @stanleywhiteman6450
    @stanleywhiteman6450 2 ปีที่แล้ว

    Total rubbish..