Thanks for your feedback, I appreciate your findings ☺️ 👍. Fools will always expose relay but I'm not, read the title it's a quick demo, the purpose of this video is to make an idea about how it works but not it's final version. The mechanism and construction of the lock is also plays a major role, what if the magnetic field can't reach the relay. what if the final version is made out of mosfets. I'm not spoiling what's next, I'm working on it , see you soon 😊🤝 Regards, Aneesh Murali Nariyampully.
Thanks for the question! Currently, the device has several security measures in place to prevent unauthorized access and spoofing attempts: You need to know the 14-character-wide strong password, it's a mix of lowercase and uppercase letters, numbers, special characters, plus command, plus pair key, plus timing to crack, and there will be no trace because it doesn't have any reset option or override settings. It’s hardcoded in the firmware, not EEPROM or storage, and the password choice is yours to set when you compile the code, so each firmware is different, and the key is also different. The user is the only person who knows what exactly who was did, and the chip is also firmware-protection enabled. But if your phone is stolen, they may be able to unlock it with your phone if your phone doesn't have any security. but they can't see what the password is. If you're interested, give it a try to crack and let me know how you cracked it, then we can close the back door, if there is any. We can also implement AES + salt, but right now, it's a very minimal and strong, cost-effective solution with a beautifully designed user-friendly app with a strong password-matching method. Appreciate your support and suggestions Thank you. Aneesh Murali Nariyampully
This is the lockpicking lawyer
One strong magnet near relay. Boom door opens😂
Thanks for your feedback, I appreciate your findings ☺️ 👍.
Fools will always expose relay but I'm not, read the title it's a quick demo, the purpose of this video is to make an idea about how it works but not it's final version. The mechanism and construction of the lock is also plays a major role, what if the magnetic field can't reach the relay. what if the final version is made out of mosfets. I'm not spoiling what's next, I'm working on it , see you soon 😊🤝
Regards,
Aneesh Murali Nariyampully.
What kind of encryption or security measures are there to prevent third parties from spoofing requests and opening it?
Thanks for the question! Currently, the device has several security measures in place to prevent unauthorized access and spoofing attempts:
You need to know the 14-character-wide strong password, it's a mix of lowercase and uppercase letters, numbers, special characters, plus command, plus pair key, plus timing to crack, and there will be no trace because it doesn't have any reset option or override settings. It’s hardcoded in the firmware, not EEPROM or storage, and the password choice is yours to set when you compile the code, so each firmware is different, and the key is also different. The user is the only person who knows what exactly who was did, and the chip is also firmware-protection enabled. But if your phone is stolen, they may be able to unlock it with your phone if your phone doesn't have any security. but they can't see what the password is. If you're interested, give it a try to crack and let me know how you cracked it, then we can close the back door, if there is any. We can also implement AES + salt, but right now, it's a very minimal and strong, cost-effective solution with a beautifully designed user-friendly app with a strong password-matching method.
Appreciate your support and suggestions
Thank you.
Aneesh Murali Nariyampully
@@Ciiads sounds good!
Thank you 😊🤝