Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Security Technology

$20 'Toy' Deactivates Cheap Home Alarms, Opens Doors 153

mask.of.sanity writes "Cheap home alarms, door opening systems and wireless mains switches can be bypassed with low-cost and home-made devices that can replicate their infrared signals. Fixed-code radio frequency systems could be attacked using a $20 'toy', or using basic DIY componentry. Quoting: 'Criminals might be able to capture IR signals if they can get a line of sight to when the system is being armed or disarmed. If a criminal knows what type of alarm system you're using then they could do what we did here and reverse it for cloning a remote. A more likely scenario is just to buy a duplicate system and use that remote. Not all IR remotes can be switched from the same system. It depends on whether a code is being transmitted and how many variations of the code and remote exist. In the system described in this post, there is no code, just a carrier signal. If a code is being transmitted, then the Infrared toy can capture it and replay it. So that's your best bet for a criminal looking at a completely unknown remote.'"
This discussion has been archived. No new comments can be posted.

$20 'Toy' Deactivates Cheap Home Alarms, Opens Doors

Comments Filter:
  • Keys are copyable?! (Score:5, Informative)

    by erroneus ( 253617 ) on Friday September 13, 2013 @09:48AM (#44840089) Homepage

    Say it isn't so!!! Someone made a copy of my keys from a wax mould. So I got an electronic lock. So now that is vulnerable too?! Say it isn't so!!

    I'm sorry, but if you want to secure a transmitted signal, then SECURE IT. Signals which are one-way only are weak by definition. Instead, there should be work done on systems which require an encrypted signal started by the key device and received by the lock which returns with a reply to the key device which acknowledges the reply.

    And yes, even THAT can be replicated... it's just harder. But the rule is that which can be locked can be unlocked. It's a question of complication.

  • by Anonymous Coward on Friday September 13, 2013 @09:54AM (#44840163)

    So can many universal remotes, so can a computer, so can anything else....

    Of course the very first thing the article covers is universal remotes and how they didn't work.
    Perhaps, in the future, you should RTFA before commenting.

  • by Rob the Bold ( 788862 ) on Friday September 13, 2013 @10:24AM (#44840427)

    it is a big deal because unlike a universal remote, security systems are supposed to be, well, secure. you shouldnt be able to hack a security system with a 20$ toy.

    If your "security" system cost $8 like the one they hacked, you probably got what you paid for. I doubt that anyone is using this kind of thing to secure anything of importance. Most are probably sold as a novelty or to keep roommates out of your stuff, sort of. They say there are also IR door keys that are also hacked similarly, but I don't see examples in TFAs. And I've never seen an IR door key in actual use, not that my experience is definitive.

  • by Big Hairy Ian ( 1155547 ) on Friday September 13, 2013 @10:25AM (#44840435)
    Had one years ago for my I-Paq which was great fun in banks & airports for changing the settings on the aircon :D

    For the younger readers I-Paq is nothing to do with Apple :)

  • by bickerdyke ( 670000 ) on Friday September 13, 2013 @10:29AM (#44840465)

    ..as that guy already found out: http://en.wikipedia.org/wiki/St_Martin_of_Tours#European_folk_traditions [wikipedia.org] - and we're talking about 371, not 1060. Now get of my lawn!

  • by MightyYar ( 622222 ) on Friday September 13, 2013 @11:19AM (#44840963)

    My insurance company specifies that it must be a monitored alarm, and I have to sign an affidavit to that effect.

  • So? (Score:4, Informative)

    by twotacocombo ( 1529393 ) on Friday September 13, 2013 @12:22PM (#44841483)
    They could go through all this trouble to try and capture your code, defeat your security system.. Or, they could go to one of the other hundreds of thousands of houses in the country that have no security system whatsoever. You want to keep a burglar at bay? Get a dog with a mean sounding bark.

Software production is assumed to be a line function, but it is run like a staff function. -- Paul Licker

Working...