![]() The practice even saw some commercialization with digital locksmithing services popping up around the time that these stories began to spread. In fact, numerous individuals have copied keys with 3D printing, some using photos of the keys alone. All that it would take to copy them was the original keys, a flatbed scanner and a 3D printer. In 2013, MIT students David Lawrence and Eric Van Albert released a program capable of copying high-security keys for Schlage’s Primus-brand locks, associated with government facilities and detention centers. This is not the only instance in which keys have been illegally copied with 3D printing. ![]() OMG, it's actually working!!! /rotJPJqjTg Soon after the story of Xylitol’s hack went out, a Montreal-based 3D printer owner was able to print one of the keys and successfully test it on a TSA-approved luggage lock. Studying the key cuts, the hacker was able to quickly create 3D printable CAD models that were subsequently uploaded to GitHub. Travel Sentry master keys 1-7 3D-printed. Xylitol had an easier time of replicating the keys, as the Washington Post actually published high-resolution photos of the keys (later removed) in an article related to the TSA’s most recent security measures. Last year, seven other keys for Travel Sentry locks were made publicly available by a French security researcher with the nickname Xylitol. This is actually the eighth such master key that has been compromised by the hacker community. What we're doing here is literally cracking physical encryption, and I fear that metaphor isn't going to be properly delivered to the public," he said. It's a great metaphor for how weak encryption mechanisms are broken-gather enough data, find the pattern, then just ‘math’ out a universal key (or set of keys). "This was done by legally procuring actual locks, comparing the inner workings and finding the common denominator. Though the master key is now publicly accessible, Johnny Xmas pointed out that the same manual process employed by the hackers could be pulled off by any lockpicker. To break Pandora’s box open further, the hackers converted the master key design to a 3D-printable model and uploaded the design to GitHub. The 3D-printable model of the Safer Skies master key. With these two manufacturers producing the majority of TSA-approved locks on the market, it would be possible both for travelers to protect their belongings and for the TSA to conduct its inspections for the sake of travel safety. For this reason, the agency turned to two companies, Travel Sentry and Safe Skies, to create master keys for luggage locks. While luggage locks may prevent theft during travel, this protection is only a slight hurdle in the way of quick and easy security checks on the part of TSA agents. The 3D-printable key copy was then made public, allowing anyone to 3D print the Safe Skies master key themselves. This year, at the eleventh Hackers On Planet Earth (HOPE) conference in New York City, security researchers going by the names Nite 0wl, Johnny Xmas and DarkSim905 demonstrated the ability to copy a master key for Safe Skies luggage locks, used by the Transportation Security Administration (TSA) to quickly unlock luggage during clearance checks. That’s right, it’s an ongoing trend in the hacker community to demonstrate methods for bypassing security measures, both in the virtual world of software and the physical world of high-security locks. Another year, another hacker conference, another method for 3D printing keys to previously unhackable locks.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |