Bumping an old thread, still seems like smart locks aren't all that smart, with most of the ones tested by these guys being quite easy to compromise.
https://techcrunch.com/2016/08/08/sm...-hacker-tricks
Quote:
Locks from Quicklock, iBluLock, and Plantraco transmitted their passwords in plaintext, making them vulnerable to anyone with a Bluetooth sniffer. Others were tricked by the attacker simply replaying the same data they snatched out the air when a legit user unlocked the door. Another entered a failstate and opened by default when it received an encrypted string that was off by one byte.
|
On one hand I guess most thieves don't have a bluetooth sniffer, and many residential locks or padlocks are vulnerable to bumping or just taking a picture of your key on its way to your lock and printing their own key...
but on the other hand, since it's a problem with the software itself (and very basic problems at that) it's kind of stupid to have these issues.