![]() |
|
|
#1 | |
|
"Richard B. Woods"
Aug 2002
Wisconsin USA
170148 Posts |
Yet another aspect of The End of Privacy:
http://it.slashdot.org/it/08/10/30/1832214.shtml "Keys Can be Copied From Afar, Jacobs School Computer Scientists Show" http://www.jacobsschool.ucsd.edu/new...ase.sfe?id=791 Quote:
Last fiddled with by cheesehead on 2008-10-31 at 06:54 |
|
|
|
|
|
|
#2 |
|
6809 > 6502
"""""""""""""""""""
Aug 2003
101×103 Posts
22×23×107 Posts |
This is not news. Most keys are cut via a code now-a-days. Not duplicating a copy that you have, but when they are made intially. I was discussing this with somebody just this week. For years, I have known about using wax or clay to quickly and surreptitiously make a negative of a key. Next, are you going to warn us about bump keys?
There are ways of making standard locks more secure than they normally are. But, then again, security is a relative thing. |
|
|
|
|
|
#3 | |||
|
"Richard B. Woods"
Aug 2002
Wisconsin USA
1E0C16 Posts |
There are certain sentences which explain why this may well be news to even the people who know what you describe about key-making:
"... advances in digital imaging and optics have made it easy to duplicate someone’s keys from a distance without them even noticing." "... we argue that the threat has turned a corner—cheap image sensors have made digital cameras pervasive and basic computer vision techniques can automatically extract a key’s information without requiring any expertise... ... the idea that one’s keys are sensitive visual information is not widely appreciated in the general public." Quote:
Quote:
Are you going to warn your key-ring-carrying-on-belt-or-lanyard (or habitually-placing-keys-out-on-a-surface-next-to-them) friends about the possibility of increasingly-easy duplication from a distance without any physical contact or notice? Quote:
Last fiddled with by cheesehead on 2008-11-01 at 00:46 |
|||
|
|
|
|
|
#4 |
|
∂2ω=0
Sep 2002
República de California
19·613 Posts |
In other words, what we have here is a high-tech version of "Public Key Kleptography"?
|
|
|
|