Sneakey is a project from Benjamin Laxton, Kai Wang, and Stefan Savage at the UCSD vision lab that has shown that it is possible to duplicate keys from photos taken at a distance and/or an angle. They've published a paper and are offering to release their code if there is "sufficient interest."
The access control provided by a physical lock is based on the assumption that the information content of the corresponding key is private --- that duplication should require either possession of the key or a priori knowledge of how it was cut. However, the ever-increasing capabilities and prevalence of digital imaging technologies present a fundamental challenge to this privacy assumption. Using modest imaging equipment and standard computer vision algorithms, we demonstrate the effectiveness of physical key teleduplication --- extracting a key's complete and precise bitting code at a distance via optical decoding and then cutting precise duplicates. We describe our prototype system, Sneakey, and evaluate its effectiveness, in both laboratory and real-world settings, using the most popular residential key types in the U.S.
(Thanks, Fipi Lele!)
How did Twitter addict Jesse Singal become the anti-transgender spokesgoblin of his generation? When a Child Says She’s Trans continues his creepy fixation on gender-nonconforming minors. The “ex-trans” movement, similar to the discredited “ex-gay” movement, can always count on axe-grinding coverage that vastly over-represents their numbers and POV.
BeauHD, a Slashdot moderator, has Crohn's Disease, and he lives in an age of modern miracles, which means that he can have his small intestine surveyed by swallowing a tiny pill-sized camera, rather than having a scope threaded up his rectum or down his throat, or having his gut sliced open.
The National Institutes of Health maintain a 3D Print Exchange, a kind of miniature Thingiverse for open-licensed, 3D printable objects for teaching and practicing public health.
The cybersecurity landscape is changing, and now one of the most effective ways to counter hacking threats is to employ another hacker against them. Commonly referred to as ethical hackers, these professionals use a cybercriminal’s tools against them, checking networks for vulnerabilities and patching them up before they can be exploited. The Certified Ethical Hacker Bootcamp […]
The human eye is a powerful thing, but it’s not so great at seeing in the dark or around tight spaces, which is partially why most of us struggle with unplugging drains, cleaning under the fridge, and other hard-to-reach jobs. This 1080p HD Waterproof WiFi Wireless Endoscopic Camera, however, gives you the flexibility necessary to get […]
Macs are undeniably some of the most versatile computers on the market, but they can do so much more than what their stock apps allow. For those looking to get the most out of their Mac hardware, the Pay What You Want 2018 Super Mac Bundle features 10 of the industry’s top apps, including photo editors and […]