Connect with us

Entertainment

A Basic Device That Cracks Hi-Tech Safes | Hacklab | WIRED

Safes are everywhere in America, securing everything from cash and guns to narcotics and sensitive personal documents—in both homes and workplaces. But with no drills or cutting tools, security researchers James Rowley and Mark Omo have developed two separate techniques for cracking the Securam ProLogic L02, a digital lock used on 8 popular brands of…

Published

on

Safes are everywhere in America, securing everything from cash and guns to narcotics and sensitive personal documents—in both homes and workplaces. But with no drills or cutting tools, security researchers James Rowley and Mark Omo have developed two separate techniques for cracking the Securam ProLogic L02, a digital lock used on 8 popular brands of high security electronic safes sold in the U.S. The kicker? The company that makes the lock has no plans to update its code, leaving safes across the country vulnerable.

Read more:

Director: Lisandro Perez-Rey
Director of Photography: Charlie Jordan
Editor: A.J. Schultz
Talent: James Rowley; Mark Omo
Host: Andy Greenberg
Written by: Andy Greenberg; Lisandro Perez-Rey
Line Producer: Jamie Rasmussen
Associate Producer: Brandon White
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Camera Operator: Jake Kinney
Gaffer: Nicholas Villafuerte
Sound Mixer: Rado Stefanov
Production Assistant: Abigayle Devine
Assistant Editor: Britt Bernstein

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading
Advertisement
174 Comments

174 Comments

  1. @cainfuni5331

    September 11, 2025 at 3:21 pm

    Hahhaah 1337 Classic! Love it

  2. @ScumfuckMcDoucheface

    September 11, 2025 at 3:26 pm

    0:40 That is certainly a bold choice in outfit. I mean, to be fair, she looks far better than I would in it. haha

  3. @Scully1800

    September 11, 2025 at 3:36 pm

    RTA mention!

  4. @RichardBaran

    September 11, 2025 at 3:57 pm

    God I wish I went red instead of green.

  5. @Arachnoid_of_the_underverse

    September 11, 2025 at 4:13 pm

    All locks can be opened its just a matter of technique and time. Even the electronic locks on many vehicles are proving to be less secure than a mechanical lock discarded years ago.

  6. @Remixed_Philosophy_x2

    September 11, 2025 at 4:14 pm

    Tbh most digital locks are like that 🤷 it’s not just that corp.

  7. @Arachnoid_of_the_underverse

    September 11, 2025 at 4:24 pm

    Backdoor, much like those used by authorities on gun cabinets without the owners knowledge of them.

  8. @rsaunders57

    September 11, 2025 at 4:32 pm

    If it’s not made by Kaba Mas or Sargent & Greenleaf, it’s not high security. Better yet, stick with the non-electronics like the S&G 8550. Buy cheap Chinese stuff you get cheap prizes. These two companies are 21 miles apart in Kentucky.

    • @lightcycler4806

      September 11, 2025 at 4:48 pm

      Who made the backdoored keypad that caused the original Liberty scandal? Seem to recall it was S&G.

  9. @michacoine

    September 11, 2025 at 4:38 pm

    I am pretty sure I have seen lock picking lawyer open this safe with a dimple rake and a travelers hook in 3 minutes twice (in case the first time was a fluke)

  10. @sku2007

    September 11, 2025 at 4:46 pm

    a backdoor is always available to everybody. no exceptions, just a matter of time.

  11. @aware2action

    September 11, 2025 at 4:55 pm

    Security is only as strong as the weakest link.🤔 It is laughable, how secure the lock is.😂 one can devise their own secure lock at a tiny fraction of the cost, if they only know how to.🤫❤️👍

  12. @fernandohg225

    September 11, 2025 at 5:23 pm

    A Safe should not have a Reset option or access to the board pins

  13. @starkparker16

    September 11, 2025 at 5:32 pm

    Sweet Casio

  14. @ZiggyMangum

    September 11, 2025 at 5:51 pm

    And you decided to make a video on it to inform thieves worldwide?

    • @Rin-gn4vq

      September 11, 2025 at 7:45 pm

      At least it’s better than concealing the information and making it available to some theives only…

    • @werdwerdus

      September 11, 2025 at 8:16 pm

      it’s better this way so the information is also available to the customers. then it is their choice to replace the lock or not.

    • @rika-chan

      September 11, 2025 at 8:19 pm

      thieves aren’t going to use this kind of technique. plenty of lockpicking videos exist on the internet (despite locksmiths and lock companies insisting that keeping knowledge secret is the only way to keep you safe). yet methods of entry are almost always simply breaking a window or angle grinding a lock.

  15. @nr289

    September 11, 2025 at 6:24 pm

    10:42, how 1337 – my guys! 🤣

  16. @slopes83

    September 11, 2025 at 6:43 pm

    “1337” as the code. I see what you did there. Lol

  17. @TheNorwoodCat

    September 11, 2025 at 6:49 pm

    Wait!!!! A product made in China… has… a… backdoor way in? NOWAY!

  18. @computerprogram1

    September 11, 2025 at 7:07 pm

    There seems to be a flaw in almost every lock I’ve ever seen. there is a huge market for something that actually does what it says. Its probably some government mandate.

  19. @DominatorHDX

    September 11, 2025 at 7:41 pm

    If you leave the debug pins or pads exposed on your final production PCB you are obviously unqualified to design, produce and sell electronics locks. Also the fact that the debug port is accessible through the battery compartment is even more hillarious. Amateur hour right there. At least covering the PCBA with a large epoxy blob after manufacturing would go a long way to make it hard for this kind of hack.

    • @Luna_Cee

      September 11, 2025 at 7:57 pm

      Quali…fica…tion? What is this word you speak of?

  20. @tracydick9808

    September 11, 2025 at 7:54 pm

    Thanks for informing people about this

  21. @werdwerdus

    September 11, 2025 at 8:01 pm

    8:58 of course it’s 1337 😂

  22. @adamrobinson8238

    September 11, 2025 at 8:07 pm

    5:11 if the owner changes the encryption code, they won’t be able to reset the lock without these guys specialist knowledge and programming right?

  23. @werdwerdus

    September 11, 2025 at 8:11 pm

    anything available for a noble use can and will eventually be used for nefarious purposes. see: the license plate reader and tracing systems used across the country that have been used by angry cops to track their ex wives, and so on

  24. @marekdg

    September 11, 2025 at 8:31 pm

    Ahhh china

  25. @MinePossu

    September 12, 2025 at 12:40 pm

    looks like the fet/transistor to drive the latch is real close to the programming port. you could prolly just shove 9v in to pin there to unlock.

  26. @PorkyChopFPV

    September 12, 2025 at 12:47 pm

    What kinda high security are they talking about? That’s box store trash😅

  27. @XBelethorX

    September 12, 2025 at 1:07 pm

    i like how the big guy had a smaller, emotional support buddy with him

  28. @arthurhjorth1490

    September 12, 2025 at 1:35 pm

    1337. Nice

  29. @JeffMcJunkin

    September 12, 2025 at 2:18 pm

    Such a good video, and very well put together. I loved seeing the Red Team Alliance location and folk (hi Babak!) for it as well. Great job!

  30. @loiphin

    September 12, 2025 at 3:05 pm

    Geeks telling geeks they are geeks with 1337

  31. @CraigGood

    September 12, 2025 at 3:28 pm

    Convince me that there is such thing as a secure digital lock.

    • @northernsnow6982

      September 12, 2025 at 4:06 pm

      One created by the owner and impossible to access externally.

  32. @gjkrisa

    September 12, 2025 at 4:02 pm

    like how they made the code leet

  33. @FrostByteUK

    September 12, 2025 at 4:13 pm

    As an electronic engineer: If that debug port also is the access point for rewriting the safe’s microcontroller’s firmware its possible to just make a device to reflash the controller and just drive the lock solenoid to open… it’d write off the lock in the process… Easy way to to help defend against the attacks is that they were only on the back facing silkscreen, making them only accessible during assembly.

  34. @droid_ex1438

    September 12, 2025 at 4:22 pm

    If someone is resourceful enough to try either of these methods on your safe, you got bigger problems to worry about. Method 1 is not necessarily a design flaw, if someone is familiar with low level hardware debugging, it’s quiet simple as they mentioned. Method 2 on the other hand is shows a design flaw for exposing a debugging ports with that much access

  35. @TimHunold

    September 12, 2025 at 4:26 pm

    Magnets

  36. @justayoutuber1906

    September 12, 2025 at 5:40 pm

    Security with safes is an illusion.

  37. @SteelDriving

    September 12, 2025 at 5:44 pm

    Such a simple and clear example of THE problem of our times: It’s corporations, backed by the government, against We the Meatbags.

    Also, we could use like a million more Andy Greenbergs.

  38. @justayoutuber1906

    September 12, 2025 at 5:48 pm

    So mechanical might be better than digital right now.

  39. @richielives

    September 12, 2025 at 6:10 pm

    1337 lol

  40. @Lets_DoWhatWeWant

    September 12, 2025 at 6:58 pm

    Less than a week bet! 😅

  41. @TrollToll-d8d

    September 12, 2025 at 8:40 pm

    @3:17 hahahahahhaha bro who is this guy? why does it look like something was promised to him 3000 years ago? is this his safe company?

  42. @MrBeetsGaming

    September 12, 2025 at 8:45 pm

    WIRED is a disgusting far left extremist channel making excuses for people who celebrated the death of Charlie Kirk and pretending THEY are the victims. Unsubscribed and I’ll never be back. Go look into their most recent articles and tweets, I’m beyond disgusted.

  43. @BlahBlah-k3w

    September 12, 2025 at 8:57 pm

    If you buy cheap Chinese products then expect to get cheap Chinese rubbish. Chinese products are absolutely known for poor quality and potential vulnerabilities, at some point customers who still choose to buy products made in China, deserve what they get.

  44. @ShahabSheikhzadeh

    September 12, 2025 at 9:00 pm

    “we used some default backdoor to reset the safe lock to a default tipping our hand completely”

    This video is a subversive marketing video for RTA. Disappointing.

  45. @ottopartz1

    September 12, 2025 at 9:19 pm

    We usually use a 7-1/2″ cordless Makita as a universal safe opening tool. Less than 3 minutes.

  46. @FuggUp

    September 12, 2025 at 9:26 pm

    Im to tech illiterate so ill just stick to cutting them open

  47. @JohnLara-ir8cl

    September 12, 2025 at 9:55 pm

    Looks like a 💩built safe made in china

  48. @meowmeowbobo

    September 13, 2025 at 12:23 am

    I mean…yeah? if you have the MCU firmware of course it is compromised. Challenge code or debug port. Both method is the same: the firmware is compromised. it is still light year beyond traditional keys and slots. To be honest if I would even bother with MCU firmware dump I would just grab a grinder first. All the lock company is doing wrong is they are not using temper proof MCU. It just cost more. Oh right, that is the problem.

  49. @powerful_people-p7o

    September 13, 2025 at 3:09 am

    those guys should fix the issue and create a new company… boom, millions

  50. @alch3myau

    September 13, 2025 at 4:00 am

    That looks about as high security as a hotel room safe.
    nice try being relevant though guys.

  51. @thedarklord69

    September 13, 2025 at 12:03 pm

    You have lost weight Michael

  52. @paranoidzkitszo

    September 13, 2025 at 12:15 pm

    Can’t unhear the host in this video as Regis Philbin…

  53. @OstrichMilk1286

    September 13, 2025 at 1:53 pm

    Beards together..strong.

  54. @HKim0072

    September 13, 2025 at 3:27 pm

    lol, the safe guy on YT has been breaking into all these safes.

  55. @dougmacqueen1679

    September 13, 2025 at 6:17 pm

    Mostly vulnerable because of idiots like you posting on the internet.

  56. @0oNoiseo0

    September 13, 2025 at 8:24 pm

    GReat video!

  57. @BruteForceAudio

    September 13, 2025 at 8:37 pm

    Very painful to watch. Wired do be going down hill.

  58. @UNcommonSenseAUS

    September 13, 2025 at 8:49 pm

    You can easily pick the backup lock.

  59. @VotedBlue

    September 13, 2025 at 10:31 pm

    J6 wasn’t an invasion. It was a protest.

  60. @Jacky-p9c

    September 14, 2025 at 3:45 am

    The code is 1337 ? my guys you kidding me? For High Security locks, the lengh of the code must be over 6 digits, that’s the common knowledge.

    • @dirtrider88

      September 15, 2025 at 1:01 am

      apparently its an inside(r) joke.

  61. @only1muppet

    September 14, 2025 at 8:18 am

    Here’s a scary and likely possible scenario. We know more and more teenagers are becoming very technologically savvy. It is quite likely one or two will eventually figure out how this was done or come up with their own ideas and then publish it online. I know those locks also likely guard safes with guns in them. One day a smart “nerdy” teenager with no friends will get into serious trouble cracking the lock.

    • @TheNuclearBolton

      September 14, 2025 at 11:37 am

      Bruh

  62. @ocaradospasseios

    September 14, 2025 at 9:33 am

    Analogic always rules.

  63. @martinlutherkingjr.5582

    September 14, 2025 at 11:15 am

    Why doesn’t an open source secure safe lock exist?

    • @ad08star

      September 15, 2025 at 2:39 am

      Because authorities won’t let them. They want backdoors for all the electronic devices be it your phone or the safe.

    • @martinlutherkingjr.5582

      September 15, 2025 at 2:44 am

      ⁠​⁠@@ad08starWhere’s backdoor in Trezor and ColdCard? How would they stop these locks in a jurisdiction that isn’t hostile toward free speech?

  64. @makuikui

    September 14, 2025 at 11:29 am

    China + eletronics = unsafe

  65. @sutats

    September 14, 2025 at 11:30 am

    Ocean’s 14.

  66. @CertifiedSkank

    September 14, 2025 at 12:16 pm

    Pharmacies? Hmmm

  67. @309electronic5

    September 14, 2025 at 1:54 pm

    Leaving the debug pins exposed and having the mcu not read-out-protected is just stupid! I have come across many devi es that had their debug ports disabled, either through firmware or an efuse or physically by removing components between the mcu/cpu and the debug port. Not to mention a lot of products had read protection in place making it so you cant read the firmware but it seems that a product that actually IS MEANT FOR SAFETY does not have this while many normal consumer products have multiple protections in place so nobody copies their patented design…… Its just laughable how bad it is! 😅🤦

  68. @8180634

    September 14, 2025 at 2:25 pm

    They didn’t use a processor that could be locked to prevent downloading the firmware, big flaw. Plus leaving the debug port exposed. An existing lock could be improved by changing the code you can change, and cut the traces to the debug port. Not a perfect fix but an improvement.

  69. @TheDiveO

    September 14, 2025 at 2:59 pm

    lpl: hold my rake.

  70. @brianredban9393

    September 14, 2025 at 3:32 pm

    And they are all made by the trusting Chinese.

  71. @Rezin_8

    September 14, 2025 at 5:17 pm

    😂 much like the blue wire control bump on any “secure” facility 😂 🌐🤺🤣

  72. @tutacat

    September 14, 2025 at 5:56 pm

    4:31 They are recommending you change the default lock codes, not the reset code

  73. @tutacat

    September 14, 2025 at 6:00 pm

    The code is also supposed to be hashed…

  74. @carollalicker

    September 14, 2025 at 11:40 pm

    O.O

  75. @DonnieScott-b3p

    September 15, 2025 at 2:48 am

    I have a question that maybe you cats can answer. Sorry if this is off topic. Does it bug other magicians when they see someone on AGT or some other professional venue and they are doing tricks that you could buy for Five Dollars in a magic shop? ON the same topic, magicians like Copperfield etc. do tricks that require 0 talent, they just have to show up and the trick , more or less, does itself while the magician princes around. Juxtapose that against slight-of-hand magicians who have spent Decades perfecting even a tiny move. How do professional magicians feel about magic that is all show vs. actual talent?

  76. @sydur_graham

    September 15, 2025 at 4:23 am

    Liberty is the same company that gave the police/investigators a man’s safe code because they didn’t want to get a warrant (which they needed either way, but didn’t care). So, Liberty has no problem infringing your rights. Why would they care about making it harder for someone else to get into your safe? As far as I can tell, they want others to open your safe with impunity.

    • @sydur_graham

      September 15, 2025 at 4:27 am

      Just realized the exact case I was referencing was mentioned in the beginning of the video

  77. @BeProductions1000

    September 16, 2025 at 9:09 am

    Jesus. Obscurity is not security… absolutely arrogant take by the manufacturer CEO.

  78. @peterfairlie2296

    September 16, 2025 at 12:51 pm

    If you really want to secure any of these digital safes you really need to modify and customize the standard and known design. I always add a small remote controlled radio receiver inside the safe wired to the lock circuit. This way when you enter the code you also need to have a key FOB close by and be pushing the button on it. Security is all about layers, If you add your own custom layer like this, then it really becomes secure as know one, not even the FBI, will know how it works inside and won’t be getting in using the factory backdoors.

  79. @NoorquackerInd

    September 16, 2025 at 1:12 pm

    Wait a second, G V R T, ain’t no way they just exposed UART that easily 💀

  80. @doomizz

    September 16, 2025 at 2:48 pm

    go back to analog

  81. @protectyour2a482

    September 16, 2025 at 5:42 pm

    10:32 “if someone like me could do it, that means someone could mfg these and sell them on the dark web…”

    No no… not the dark web. Tools like this exist to the public without restriction already. Take the flipper zero for instance. Easily programable, with some newly written code and a couple of wires it could easily recreate the second attack.

  82. @BlackAngelBlackHut

    September 17, 2025 at 5:29 am

    The digitally safe are unsafely you don’t need to hack the code you can reset or most of that safe have for emergency key Wich you can buy universal and open

  83. @markfitzurka9995

    September 17, 2025 at 2:20 pm

    I switched my digital to tumbler style when I keep breaking the wires when I needed to change the 9volt. It takes about 20-30 seconds to get in now but I feel a little better about it.

  84. @mikescholz6429

    September 17, 2025 at 6:43 pm

    Good thing pi picos aren’t available to the public 😉

  85. @MB.Salon.TV.21

    September 18, 2025 at 8:55 am

    LockPickingLawyer: Opens the safe in 1.5 seconds using a fork.

  86. @drk_blood

    September 18, 2025 at 12:33 pm

    LPL and McNally :

    – Are we a joke to you ? 😂

  87. @neddy1287

    September 18, 2025 at 8:36 pm

    Code snatch method can be defeated by cutting away the traces to the debug pads in question then again use harden epoxy to cover the entire pcb so this way nothing to get to it. As for reset method not a clue what can be done to prevent it

  88. @kingrutse3278

    September 19, 2025 at 8:39 am

    Hate say this this isn’t difficult i wouldn’t consider that a secure lock lol

  89. @Ghostanon404

    September 19, 2025 at 7:54 pm

    It’s ’Proven Locks’ adjacent 😂

  90. @moletrap2640

    September 24, 2025 at 11:55 am

    Oh my God, you have found a big scandal. The maker of a device based on firmware with no consumer access will not update firmware. That’s horrible they really should have people rip these things apart, build a bread board and write some code themselves to reprogram the firmware. This is not a consumer upgraded product and you have not exposed some horrible corporate policy.

  91. @arsorc

    September 25, 2025 at 5:23 pm

    the week he mentioned will take an specialist to recreate the tool is the time it takes the fab house to make and deliver the PCB, the rest is a one-day job

  92. @Coolmatt4209

    September 26, 2025 at 6:01 am

    IDK MASTER = ((KEY % 685198) + 202_788 * (KEY // 685198) + 7_869) % 685198 might give you the reset pin, or just a random 6 number, im unsure

  93. @calebethan-x9o

    September 26, 2025 at 1:14 pm

    No security firmware update needed. Its actually very easy to cover the pins electric tape. Done.

  94. @Glynn-d3t

    September 26, 2025 at 3:27 pm

    Two things I use: A heavy duty paper clip and a 9v battery.

  95. @catoomch

    September 26, 2025 at 11:29 pm

    The fact they didn’t use a one way hash algorithm for the unlock code is breathtakingly stupid.

    • @Karnaf142

      September 27, 2025 at 4:33 pm

      That wouldn’t help, you can enumerate 1,000,000 codes in no time.
      Edit:
      Even if they use some insanely complex hash function that takes 1-2 seconds for the microprocessor in the safe, it would take a strong computer a few hours at most

  96. @milutinkubik

    September 27, 2025 at 11:22 am

    Well then don’t buy toys for kids and buy something like M-LOCKS 🙂its easy

  97. @Karnaf142

    September 27, 2025 at 4:32 pm

    Why won’t the reset code need to be signed by the company
    That’s so stupid

  98. @josephlieberman3027

    September 27, 2025 at 10:30 pm

    I suspect that none of the safes that use those locks are UL rated for burgulary “TL-TR 30” for example resists professional burgurlar with tools and torch for 30 minuites.
    UL rated burgulary rating probably will never use that lock.

  99. @josephlieberman3027

    September 27, 2025 at 10:33 pm

    The purpose of a lock is, only, to keep your Friends out.

  100. @stevesteve8098

    September 28, 2025 at 9:12 am

    Yep.. known that company for a long time, their stuff is shite…

  101. @Phrame666

    September 28, 2025 at 9:43 am

    Hahahaha… *cough* *cough* Sentry Safe *cough* *cough*

  102. @TADevelopment

    September 28, 2025 at 2:16 pm

    In my opinion, safes should never use a digital locking mechanism. Having additional digital security features is okay. i.e., a camera, failed entry alerts, etc.

  103. @shanejobe2284

    September 29, 2025 at 6:21 am

    Uhhh the FBI definitely did not have a warrant, or even a subpoena.. they gave it up willingly with no pushback.

  104. @RemixProtocol

    September 29, 2025 at 6:34 am

    If a warrant can bypast security.. than it’s not secure

  105. @thegreyfuzz

    September 29, 2025 at 8:09 am

    This is why many years ago the electronic lock for my safe is in a box somewhere, replaced with a mechanical Group 1R. 100% pick proof? Absolutely Not! But it will take a lot more time and effort….. no and no master bypass codes or hidden back doors (thank you Liberty Safe).

  106. @tom50586

    September 29, 2025 at 12:16 pm

    method 1-> Emulate the key derivation routine in the firmware OR recreate it. Probably a bunch of LCGs and math
    method 2 -> sniff the debug pins with probes. flipper zero can do it too. You’d just have to figure out if it requires a magic packet to spit back the key.

    How securam could avoid:

    method 1-> run an actual cryptographic signature check instead of some in-house numeric “signature”. May require a longer recovery key entry though
    method 2-> encapsulate the circuit with epoxy resin or disconnect the debug pins / make them inaccessible

  107. @channel-ch2hc

    September 29, 2025 at 3:46 pm

    Tool total price gonna 10$

  108. @typograf62

    September 29, 2025 at 4:07 pm

    The Danish government has solved this. Just do not call it a backdoor.

  109. @jamesweldon8118

    September 29, 2025 at 6:38 pm

    V sauce has really cleaned up his act

  110. @kompumaster

    September 29, 2025 at 6:42 pm

    10:00 You must store not a code, but hash of code. So, you can not decrypt code by raspberry pi. Fast, simple, only software changes.

  111. @JohnDokivin

    September 29, 2025 at 6:56 pm

    Is the android app available where? Or do I have to dump and decompile firmware too?

  112. @ricardobino7410

    September 29, 2025 at 7:17 pm

    It’s a chinese company… that’s all you need to know right there. Would you use a Temu or Aliexpress safe?

  113. @omarabu1

    September 29, 2025 at 9:05 pm

    I feel like I want to somehow exploit this but I’m too lazy.

  114. @crispy-k

    September 30, 2025 at 12:35 am

    temu safe, lol

  115. @X2defeQgyb6mXOpZjaT2vtQsB

    September 30, 2025 at 3:48 am

    Director: Lisandro Perez-Rey
    Director of Photography: Charlie Jordan
    Editor: A.J. Schultz
    Talent: James Rowley; Mark Omo
    Host: Andy ((((((Greenberg))))))
    Written by: Andy ((((((Greenberg)))))); Lisandro Perez-Rey
    Line Producer: Jamie Rasmussen
    Associate Producer: Brandon White
    Production Manager: Peter Brunette
    Production Coordinator: Rhyan Lark
    Camera Operator: Jake Kinney
    Gaffer: Nicholas Villafuerte
    Sound Mixer: Rado Stefanov
    Production Assistant: Abigayle Devine
    Assistant Editor: Britt ((((((Bernstein))))))

    again, not surprised with the political insert

    • @hrr597

      September 30, 2025 at 6:12 am

      Ju wish shenanigans

  116. @Eriiiiiiiick

    September 30, 2025 at 4:21 am

    code is : LEET HAXOR

  117. @bigTDevs

    September 30, 2025 at 4:55 am

    Its crazy that the super code was 001337
    Referencing the hacker’s fav number 0x1337

  118. @mrsimo7144

    September 30, 2025 at 4:58 am

    A lot of companies used hardened metals. Right tools and 2 minutes, you’re in. Key code safes are a terrible idea.

  119. @j4ck1337

    September 30, 2025 at 5:54 am

    001337 😀

  120. @statinskill

    September 30, 2025 at 6:26 am

    Microcontrollers often have security bits that disable JTAG/debug port functionality. A firmware could be patched to remove the recovery mode using the JTAG and then the security bit that disables JTAG could be set right after that. Oh and if part of the PCB if the controller is exposed, there’s likely a way to drive the lock solenoid by making contact with the pcb at certain points.

  121. @paulstimpson830

    September 30, 2025 at 7:04 am

    Will the new lock that’s coming out be any better than this one? They’ve said they won’t be fixing the firmware in this lock. Why would we buy the new one since they likely won’t fix that if a problem turns up in it either?

  122. @creepingcharly

    September 30, 2025 at 9:59 am

    Awesome video. Just reinforces why this IT professional went with a physical dial lock 😉

  123. @itwasrightthere

    September 30, 2025 at 10:05 am

    1:20 I don’t believe they had a warrant, did they?

  124. @wangofree

    September 30, 2025 at 11:07 am

    Interesting. Safer than hiding valuables under your mattress.

  125. @EstebanDworak

    September 30, 2025 at 12:03 pm

    Nice video

  126. @mkirkland616

    September 30, 2025 at 12:40 pm

    lol, 1337

  127. @calligraffiting

    September 30, 2025 at 2:20 pm

    Willing to bet company will never update the code. See how master lock treat all of lockpick lawyers videos. They don’t care once they sold the unit

  128. @TheDanielsherer

    September 30, 2025 at 3:02 pm

    Not sure its fair to call a Raspberry Pi Pico “low-tech”. Sure, compared to a AMD Ryzen, it’s a featherweight. But you’re talking about a dual-core system running at 133 million instructions per second. Mounting and reading the linux operating system inside those locks, finding the right memory address and decoding it is actually pretty sophisticated.

  129. @silvertechnolo3958

    September 30, 2025 at 5:58 pm

    So easy it’s not even fun 😭

  130. @macieksoft

    September 30, 2025 at 6:58 pm

    So guys in securam just forgotten to disable debug and firmware download features on the MCUs?

  131. @seti_o

    September 30, 2025 at 7:34 pm

    🙂 No it will not take a week. It will take a JTAG and binwalk and 30 minutes 🙂 Well building the actual tool like theirs may take some time.

  132. @VIRAL_DNA

    September 30, 2025 at 7:57 pm

    These safes with a Digital Pin pad are all insecure.

  133. @authorizedTrolling

    September 30, 2025 at 8:43 pm

    Why would they fix it its called safe cracking there’s always gonna be a way to crack every safe. Fix that and another method will come up in 2.5 hrs. That’s a rabbit hole company’s like this have went through to many times takes them months to fox then in a few minutes another safe cracker found another method. Safes are protected by a very steep felony theu should always be followed up with a surveillance camera.

  134. @luckynumbersevuuun

    September 30, 2025 at 9:20 pm

    keep getting the truth out, thank you. our world is fake, and we are often sold garbage by those who have gained our trust.

  135. @jmr

    October 1, 2025 at 1:42 am

    Why do we need a debug port in the finished product? Removing the debug port isn’t the final answer but it sure would have made it more difficult to exploit if they left it off.

  136. @chibisuke6731

    October 1, 2025 at 2:36 am

    The flaw is not that the supercode is stored in the accessible part of the hardware… The flaw is that it is stored AT ALL!
    When you’re designing something like this, and you absolutely NEED a supercode of some sort (Legal reasons or whatever), when DO NOT store it in the hardware. Storage a hash algorithm. Do enougth rounds so that the validation of a single code takes multiple seconds. That way even of someone gets their hand on the hash itself, it will not be easily reversible.

  137. @khaitomretro

    October 1, 2025 at 3:41 am

    Chinese company has backdoor in products.
    * makes shocked face *
    lol

  138. @foxtail3103

    October 1, 2025 at 4:52 am

    A high security safe lock with a Chinese CEO.

  139. @leobackstrom1344

    October 1, 2025 at 5:12 am

    They say that its a well known teqnique so they will not fix it. Then they say its bad that they show this teqnique because it can end up in the bad hands? If its allready well known, why spes it matter? 😂 Just fix the issue ffs 🤦‍♂️

  140. @titaniummechanism3214

    October 1, 2025 at 5:18 am

    Since the company is chinese, I could imagine that this backdoor “feature” is mandated by the chinese government. That would also explain why they aren’t willing to change it.

  141. @3nertia

    October 1, 2025 at 5:20 am

    Selling a new lock instead of updating the firmware? Welcome to capitalism! Profits over People! :/

  142. @NeverGiveUpYo

    October 1, 2025 at 5:24 am

    Right now when I’m broke. Thanks! I love the internetz! 😎

  143. @संगीतप्रेमी170

    October 1, 2025 at 5:42 am

    Hindi dubbing….??

  144. @sjoer

    October 1, 2025 at 6:30 am

    This was childsplay really, anyone with a basic understanding of reverse engineering could have found this!

  145. @Nubbe999

    October 1, 2025 at 7:27 am

    “hi-tec safe” … its a hotel safe. It’s only there so the burglar needs to spend a bit more time and choose to leave the room.
    If anyone wanted to get in, even with regular methods, it maximum 15 min.

  146. @Inspector_Towelie

    October 1, 2025 at 9:01 am

    i smell a class action law suit…

  147. @shawnruedi

    October 1, 2025 at 10:04 am

    I replaced my digital lock with an old-fashioned dial lock.

  148. @tiredofliars

    October 1, 2025 at 11:05 am

    I love that your Security Professional is shown trying to pick one of the EASIEST locks to open, a knock off, pot metal, Schlage looking lock that is easier to pick than the old Kwiksets! ROFL!!!! Also, if the FBI has a warrant, then not having the code is not going to make a bit of difference!

  149. @geoffreyjames3107

    October 1, 2025 at 11:11 am

    (sic)
    I liked the old days.
    3 2 1
    BOOM

  150. @vishalkumar040393

    October 1, 2025 at 11:19 am

    It is clear that the company don’t care about its customers.

  151. @Kevin-yz7ji

    October 1, 2025 at 11:29 am

    The movie War Games would not be a thing without a backdoor; this kind of stuff is so preventable with a bit of thinking ahead.

  152. @ELEVOPR

    October 1, 2025 at 11:42 am

    I bought the biggest and most expensive safe I Could afford. Then I put my valuables inside my Socks and rolled them up.

  153. @ThatoneNB12

    October 1, 2025 at 1:39 pm

    “Its stored in an encrypted manner” ahh thats good. “But we can just read the encryption keys” 😭

  154. @TallTexasGMan

    October 1, 2025 at 2:59 pm

    That is a nice non-destructive method. Honestly, easiest way into most of these is a simple battery operated angle grinder or oscillating tool. Cut through the weakest part (back and bottom).

  155. @davidg1067

    October 1, 2025 at 3:47 pm

    what a joke. I’d rather keep my valuables in a hollowed out book.

  156. @manjanjatx

    October 1, 2025 at 4:27 pm

    Excellent video – thank you Andy and the white-hat hacking team for the exposé!

  157. @ionutbarna

    October 1, 2025 at 4:37 pm

    Basically they made a Keygen for the safe locks. You know…those types 😛🤓🏴‍☠️

  158. @FlatMcdonaldsSprite

    October 1, 2025 at 6:42 pm

    nothing is higher end than a cheap Arduino project

Leave a Reply

Cancel reply

Your email address will not be published. Required fields are marked *

Entertainment

Professional Birder Answers Birding Questions | Tech Support | WIRED

Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear…

Published

on

Professional Birder Christian Cooper joins WIRED to answer your questions about birding and birdwatching. How does a birder actually find the birds they’re looking for? How do I attract more birds to my garden? Is it okay to put a baby bird back in its nest? How can I start identifying bird calls I hear in nature? What gear does Christian Cooper use while birding? Answers to these questions and plenty more await on Birding Support.

0:00 Quoth the raven…
0:30 Bird accents
1:34 Finding birds
2:52 Birding demonstration
4:20 Mating dances
5:25 Male coloring vs. Female
6:38 Sense of direction
7:06 Solo birding or group birding
8:01 Nothing but respect for pigeons
8:54 Rise and shine
9:33 Identifying bird calls
10:56 Christian Cooper’s birding gear essentials
12:24 Hummingbird brawls
13:06 How do I attract more birds to my garden?
14:03 Is it okay to put a baby bird back in its nest?
14:39 I hear you but I can’t see you
15:17 Bird feeders
17:06 Unique bird abilities
18:44 Who’s that corvid?
20:09 Spotting scope or binoculars?
20:50 Identifying nests and eggs
22:02 Faking bird calls to attract birds
22:57 Birding journals
24:44 Birds and big cities
26:16 IDing birds in flight
27:09 Birdhouse in your soul
28:20 Respect in birding
29:20 Best birding app
29:48 Best time of day for bird watching
30:42 Finding local birdwatching communities
31:03 The sighting that took the most effort for Christian Cooper
31:37 Bird law
32:34 Bucket list birding locations

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Former Deputy National Security Advisor Answers Geopolitics Questions | Tech Support | WIRED

Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here. 0:00 Geopolitics Support 0:14 WW3 2:31 China and the AI Race 6:26 Why Iran and The U.S. are at odds 11:02…

Published

on

Former Deputy National Security Advisor of the United States Ben Rhodes joins WIRED for a super-sized edition of Tech Support to answer the internet’s questions about the geopolitical climate and how we got here.

0:00 Geopolitics Support
0:14 WW3
2:31 China and the AI Race
6:26 Why Iran and The U.S. are at odds
11:02 Sanctions
13:34 When did “globalist” become derogatory?
15:40 The ascendency of The Right
19:28 Solutions for Gaza
22:37 Israel and The West Bank
24:47 Why do people use the term genocide to describe Israeli actions in Gaza?
30:20 Osama bin Laden and post-9/11 America
33:09 Nukes for peace
34:54 US/China relations timeline
38:13 When will Xi invade Taiwan?
45:42 China in the South China Sea
48:22 Why does Putin want Ukraine?
51:38 Ukraine War Outcomes
55:13 US/EU Troops in Ukraine
56:08 Is Putin playing Trump?
59:09 Trump’s Greenland aspirations
1:02:25 Trump’s accurate critiques
1:03:40 Why did the Biden Administration allow so many immigrants to enter the US?
1:08:52 Maduro
1:10:10 Who is running Venezuela right now?
1:11:46 What does the U.S. actually gain from intervening around the world?
1:14:09 Another Arab Spring?
1:15:17 Cyberattacks
1:18:08 Modi and Trump
1:22:46 The geopolitical implications of year round Arctic shipping

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Entertainment

Project Hail Mary: Why Is He All Alone?

When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them? Still haven’t subscribed to WIRED on YouTube? ►► Listen to the Get WIRED podcast ►► Want more WIRED? Get the magazine ►► Follow WIRED: Instagram ►► Twitter ►►…

Published

on

When Rylan Gosling’s character Dr. Ryland Grace awakens aboard the Hail Mary, the other two astronauts that should be with him have perished. What happened to them?

Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►

Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►

Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.

ABOUT WIRED
WIRED is where tomorrow is realized.

Continue Reading

Trending