Safes are everywhere in America, securing everything from cash and guns to narcotics and sensitive personal documents—in both homes and workplaces. But with no drills or cutting tools, security researchers James Rowley and Mark Omo have developed two separate techniques for cracking the Securam ProLogic L02, a digital lock used on 8 popular brands of high security electronic safes sold in the U.S. The kicker? The company that makes the lock has no plans to update its code, leaving safes across the country vulnerable.
Read more:
Director: Lisandro Perez-Rey
Director of Photography: Charlie Jordan
Editor: A.J. Schultz
Talent: James Rowley; Mark Omo
Host: Andy Greenberg
Written by: Andy Greenberg; Lisandro Perez-Rey
Line Producer: Jamie Rasmussen
Associate Producer: Brandon White
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Camera Operator: Jake Kinney
Gaffer: Nicholas Villafuerte
Sound Mixer: Rado Stefanov
Production Assistant: Abigayle Devine
Assistant Editor: Britt Bernstein
Still haven’t subscribed to WIRED on YouTube? ►►
Listen to the Get WIRED podcast ►►
Want more WIRED? Get the magazine ►►
Follow WIRED:
Instagram ►►
Twitter ►►
Facebook ►►
Tik Tok ►►
Also, check out the free WIRED channel on Roku, Apple TV, Amazon Fire TV, and Android TV.
ABOUT WIRED
WIRED is where tomorrow is realized.
@cainfuni5331
September 11, 2025 at 3:21 pm
Hahhaah 1337 Classic! Love it
@ScumfuckMcDoucheface
September 11, 2025 at 3:26 pm
0:40 That is certainly a bold choice in outfit. I mean, to be fair, she looks far better than I would in it. haha
@Scully1800
September 11, 2025 at 3:36 pm
RTA mention!
@RichardBaran
September 11, 2025 at 3:57 pm
God I wish I went red instead of green.
@Arachnoid_of_the_underverse
September 11, 2025 at 4:13 pm
All locks can be opened its just a matter of technique and time. Even the electronic locks on many vehicles are proving to be less secure than a mechanical lock discarded years ago.
@Remixed_Philosophy_x2
September 11, 2025 at 4:14 pm
Tbh most digital locks are like that 🤷 it’s not just that corp.
@Arachnoid_of_the_underverse
September 11, 2025 at 4:24 pm
Backdoor, much like those used by authorities on gun cabinets without the owners knowledge of them.
@rsaunders57
September 11, 2025 at 4:32 pm
If it’s not made by Kaba Mas or Sargent & Greenleaf, it’s not high security. Better yet, stick with the non-electronics like the S&G 8550. Buy cheap Chinese stuff you get cheap prizes. These two companies are 21 miles apart in Kentucky.
@lightcycler4806
September 11, 2025 at 4:48 pm
Who made the backdoored keypad that caused the original Liberty scandal? Seem to recall it was S&G.
@michacoine
September 11, 2025 at 4:38 pm
I am pretty sure I have seen lock picking lawyer open this safe with a dimple rake and a travelers hook in 3 minutes twice (in case the first time was a fluke)
@sku2007
September 11, 2025 at 4:46 pm
a backdoor is always available to everybody. no exceptions, just a matter of time.
@aware2action
September 11, 2025 at 4:55 pm
Security is only as strong as the weakest link.🤔 It is laughable, how secure the lock is.😂 one can devise their own secure lock at a tiny fraction of the cost, if they only know how to.🤫❤️👍
@fernandohg225
September 11, 2025 at 5:23 pm
A Safe should not have a Reset option or access to the board pins
@starkparker16
September 11, 2025 at 5:32 pm
Sweet Casio
@ZiggyMangum
September 11, 2025 at 5:51 pm
And you decided to make a video on it to inform thieves worldwide?
@Rin-gn4vq
September 11, 2025 at 7:45 pm
At least it’s better than concealing the information and making it available to some theives only…
@werdwerdus
September 11, 2025 at 8:16 pm
it’s better this way so the information is also available to the customers. then it is their choice to replace the lock or not.
@rika-chan
September 11, 2025 at 8:19 pm
thieves aren’t going to use this kind of technique. plenty of lockpicking videos exist on the internet (despite locksmiths and lock companies insisting that keeping knowledge secret is the only way to keep you safe). yet methods of entry are almost always simply breaking a window or angle grinding a lock.
@nr289
September 11, 2025 at 6:24 pm
10:42, how 1337 – my guys! 🤣
@slopes83
September 11, 2025 at 6:43 pm
“1337” as the code. I see what you did there. Lol
@TheNorwoodCat
September 11, 2025 at 6:49 pm
Wait!!!! A product made in China… has… a… backdoor way in? NOWAY!
@computerprogram1
September 11, 2025 at 7:07 pm
There seems to be a flaw in almost every lock I’ve ever seen. there is a huge market for something that actually does what it says. Its probably some government mandate.
@DominatorHDX
September 11, 2025 at 7:41 pm
If you leave the debug pins or pads exposed on your final production PCB you are obviously unqualified to design, produce and sell electronics locks. Also the fact that the debug port is accessible through the battery compartment is even more hillarious. Amateur hour right there. At least covering the PCBA with a large epoxy blob after manufacturing would go a long way to make it hard for this kind of hack.
@Luna_Cee
September 11, 2025 at 7:57 pm
Quali…fica…tion? What is this word you speak of?
@tracydick9808
September 11, 2025 at 7:54 pm
Thanks for informing people about this
@werdwerdus
September 11, 2025 at 8:01 pm
8:58 of course it’s 1337 😂
@adamrobinson8238
September 11, 2025 at 8:07 pm
5:11 if the owner changes the encryption code, they won’t be able to reset the lock without these guys specialist knowledge and programming right?
@werdwerdus
September 11, 2025 at 8:11 pm
anything available for a noble use can and will eventually be used for nefarious purposes. see: the license plate reader and tracing systems used across the country that have been used by angry cops to track their ex wives, and so on
@marekdg
September 11, 2025 at 8:31 pm
Ahhh china
@MinePossu
September 12, 2025 at 12:40 pm
looks like the fet/transistor to drive the latch is real close to the programming port. you could prolly just shove 9v in to pin there to unlock.
@PorkyChopFPV
September 12, 2025 at 12:47 pm
What kinda high security are they talking about? That’s box store trash😅
@XBelethorX
September 12, 2025 at 1:07 pm
i like how the big guy had a smaller, emotional support buddy with him
@arthurhjorth1490
September 12, 2025 at 1:35 pm
1337. Nice
@JeffMcJunkin
September 12, 2025 at 2:18 pm
Such a good video, and very well put together. I loved seeing the Red Team Alliance location and folk (hi Babak!) for it as well. Great job!
@loiphin
September 12, 2025 at 3:05 pm
Geeks telling geeks they are geeks with 1337
@CraigGood
September 12, 2025 at 3:28 pm
Convince me that there is such thing as a secure digital lock.
@northernsnow6982
September 12, 2025 at 4:06 pm
One created by the owner and impossible to access externally.
@gjkrisa
September 12, 2025 at 4:02 pm
like how they made the code leet
@FrostByteUK
September 12, 2025 at 4:13 pm
As an electronic engineer: If that debug port also is the access point for rewriting the safe’s microcontroller’s firmware its possible to just make a device to reflash the controller and just drive the lock solenoid to open… it’d write off the lock in the process… Easy way to to help defend against the attacks is that they were only on the back facing silkscreen, making them only accessible during assembly.
@droid_ex1438
September 12, 2025 at 4:22 pm
If someone is resourceful enough to try either of these methods on your safe, you got bigger problems to worry about. Method 1 is not necessarily a design flaw, if someone is familiar with low level hardware debugging, it’s quiet simple as they mentioned. Method 2 on the other hand is shows a design flaw for exposing a debugging ports with that much access
@TimHunold
September 12, 2025 at 4:26 pm
Magnets
@justayoutuber1906
September 12, 2025 at 5:40 pm
Security with safes is an illusion.
@SteelDriving
September 12, 2025 at 5:44 pm
Such a simple and clear example of THE problem of our times: It’s corporations, backed by the government, against We the Meatbags.
Also, we could use like a million more Andy Greenbergs.
@justayoutuber1906
September 12, 2025 at 5:48 pm
So mechanical might be better than digital right now.
@richielives
September 12, 2025 at 6:10 pm
1337 lol
@Lets_DoWhatWeWant
September 12, 2025 at 6:58 pm
Less than a week bet! 😅
@TrollToll-d8d
September 12, 2025 at 8:40 pm
@3:17 hahahahahhaha bro who is this guy? why does it look like something was promised to him 3000 years ago? is this his safe company?
@MrBeetsGaming
September 12, 2025 at 8:45 pm
WIRED is a disgusting far left extremist channel making excuses for people who celebrated the death of Charlie Kirk and pretending THEY are the victims. Unsubscribed and I’ll never be back. Go look into their most recent articles and tweets, I’m beyond disgusted.
@BlahBlah-k3w
September 12, 2025 at 8:57 pm
If you buy cheap Chinese products then expect to get cheap Chinese rubbish. Chinese products are absolutely known for poor quality and potential vulnerabilities, at some point customers who still choose to buy products made in China, deserve what they get.
@ShahabSheikhzadeh
September 12, 2025 at 9:00 pm
“we used some default backdoor to reset the safe lock to a default tipping our hand completely”
This video is a subversive marketing video for RTA. Disappointing.
@ottopartz1
September 12, 2025 at 9:19 pm
We usually use a 7-1/2″ cordless Makita as a universal safe opening tool. Less than 3 minutes.
@FuggUp
September 12, 2025 at 9:26 pm
Im to tech illiterate so ill just stick to cutting them open
@JohnLara-ir8cl
September 12, 2025 at 9:55 pm
Looks like a 💩built safe made in china
@meowmeowbobo
September 13, 2025 at 12:23 am
I mean…yeah? if you have the MCU firmware of course it is compromised. Challenge code or debug port. Both method is the same: the firmware is compromised. it is still light year beyond traditional keys and slots. To be honest if I would even bother with MCU firmware dump I would just grab a grinder first. All the lock company is doing wrong is they are not using temper proof MCU. It just cost more. Oh right, that is the problem.
@powerful_people-p7o
September 13, 2025 at 3:09 am
those guys should fix the issue and create a new company… boom, millions
@alch3myau
September 13, 2025 at 4:00 am
That looks about as high security as a hotel room safe.
nice try being relevant though guys.
@thedarklord69
September 13, 2025 at 12:03 pm
You have lost weight Michael
@paranoidzkitszo
September 13, 2025 at 12:15 pm
Can’t unhear the host in this video as Regis Philbin…
@OstrichMilk1286
September 13, 2025 at 1:53 pm
Beards together..strong.
@HKim0072
September 13, 2025 at 3:27 pm
lol, the safe guy on YT has been breaking into all these safes.
@dougmacqueen1679
September 13, 2025 at 6:17 pm
Mostly vulnerable because of idiots like you posting on the internet.
@0oNoiseo0
September 13, 2025 at 8:24 pm
GReat video!
@BruteForceAudio
September 13, 2025 at 8:37 pm
Very painful to watch. Wired do be going down hill.
@UNcommonSenseAUS
September 13, 2025 at 8:49 pm
You can easily pick the backup lock.
@VotedBlue
September 13, 2025 at 10:31 pm
J6 wasn’t an invasion. It was a protest.
@Jacky-p9c
September 14, 2025 at 3:45 am
The code is 1337 ? my guys you kidding me? For High Security locks, the lengh of the code must be over 6 digits, that’s the common knowledge.
@dirtrider88
September 15, 2025 at 1:01 am
apparently its an inside(r) joke.
@only1muppet
September 14, 2025 at 8:18 am
Here’s a scary and likely possible scenario. We know more and more teenagers are becoming very technologically savvy. It is quite likely one or two will eventually figure out how this was done or come up with their own ideas and then publish it online. I know those locks also likely guard safes with guns in them. One day a smart “nerdy” teenager with no friends will get into serious trouble cracking the lock.
@TheNuclearBolton
September 14, 2025 at 11:37 am
Bruh
@ocaradospasseios
September 14, 2025 at 9:33 am
Analogic always rules.
@martinlutherkingjr.5582
September 14, 2025 at 11:15 am
Why doesn’t an open source secure safe lock exist?
@ad08star
September 15, 2025 at 2:39 am
Because authorities won’t let them. They want backdoors for all the electronic devices be it your phone or the safe.
@martinlutherkingjr.5582
September 15, 2025 at 2:44 am
@@ad08starWhere’s backdoor in Trezor and ColdCard? How would they stop these locks in a jurisdiction that isn’t hostile toward free speech?
@makuikui
September 14, 2025 at 11:29 am
China + eletronics = unsafe
@sutats
September 14, 2025 at 11:30 am
Ocean’s 14.
@CertifiedSkank
September 14, 2025 at 12:16 pm
Pharmacies? Hmmm
@309electronic5
September 14, 2025 at 1:54 pm
Leaving the debug pins exposed and having the mcu not read-out-protected is just stupid! I have come across many devi es that had their debug ports disabled, either through firmware or an efuse or physically by removing components between the mcu/cpu and the debug port. Not to mention a lot of products had read protection in place making it so you cant read the firmware but it seems that a product that actually IS MEANT FOR SAFETY does not have this while many normal consumer products have multiple protections in place so nobody copies their patented design…… Its just laughable how bad it is! 😅🤦
@8180634
September 14, 2025 at 2:25 pm
They didn’t use a processor that could be locked to prevent downloading the firmware, big flaw. Plus leaving the debug port exposed. An existing lock could be improved by changing the code you can change, and cut the traces to the debug port. Not a perfect fix but an improvement.
@TheDiveO
September 14, 2025 at 2:59 pm
lpl: hold my rake.
@brianredban9393
September 14, 2025 at 3:32 pm
And they are all made by the trusting Chinese.
@Rezin_8
September 14, 2025 at 5:17 pm
😂 much like the blue wire control bump on any “secure” facility 😂 🌐🤺🤣
@tutacat
September 14, 2025 at 5:56 pm
4:31 They are recommending you change the default lock codes, not the reset code
@tutacat
September 14, 2025 at 6:00 pm
The code is also supposed to be hashed…
@carollalicker
September 14, 2025 at 11:40 pm
O.O
@DonnieScott-b3p
September 15, 2025 at 2:48 am
I have a question that maybe you cats can answer. Sorry if this is off topic. Does it bug other magicians when they see someone on AGT or some other professional venue and they are doing tricks that you could buy for Five Dollars in a magic shop? ON the same topic, magicians like Copperfield etc. do tricks that require 0 talent, they just have to show up and the trick , more or less, does itself while the magician princes around. Juxtapose that against slight-of-hand magicians who have spent Decades perfecting even a tiny move. How do professional magicians feel about magic that is all show vs. actual talent?
@sydur_graham
September 15, 2025 at 4:23 am
Liberty is the same company that gave the police/investigators a man’s safe code because they didn’t want to get a warrant (which they needed either way, but didn’t care). So, Liberty has no problem infringing your rights. Why would they care about making it harder for someone else to get into your safe? As far as I can tell, they want others to open your safe with impunity.
@sydur_graham
September 15, 2025 at 4:27 am
Just realized the exact case I was referencing was mentioned in the beginning of the video
@BeProductions1000
September 16, 2025 at 9:09 am
Jesus. Obscurity is not security… absolutely arrogant take by the manufacturer CEO.
@peterfairlie2296
September 16, 2025 at 12:51 pm
If you really want to secure any of these digital safes you really need to modify and customize the standard and known design. I always add a small remote controlled radio receiver inside the safe wired to the lock circuit. This way when you enter the code you also need to have a key FOB close by and be pushing the button on it. Security is all about layers, If you add your own custom layer like this, then it really becomes secure as know one, not even the FBI, will know how it works inside and won’t be getting in using the factory backdoors.
@NoorquackerInd
September 16, 2025 at 1:12 pm
Wait a second, G V R T, ain’t no way they just exposed UART that easily 💀
@doomizz
September 16, 2025 at 2:48 pm
go back to analog
@protectyour2a482
September 16, 2025 at 5:42 pm
10:32 “if someone like me could do it, that means someone could mfg these and sell them on the dark web…”
No no… not the dark web. Tools like this exist to the public without restriction already. Take the flipper zero for instance. Easily programable, with some newly written code and a couple of wires it could easily recreate the second attack.
@BlackAngelBlackHut
September 17, 2025 at 5:29 am
The digitally safe are unsafely you don’t need to hack the code you can reset or most of that safe have for emergency key Wich you can buy universal and open
@markfitzurka9995
September 17, 2025 at 2:20 pm
I switched my digital to tumbler style when I keep breaking the wires when I needed to change the 9volt. It takes about 20-30 seconds to get in now but I feel a little better about it.
@mikescholz6429
September 17, 2025 at 6:43 pm
Good thing pi picos aren’t available to the public 😉
@MB.Salon.TV.21
September 18, 2025 at 8:55 am
LockPickingLawyer: Opens the safe in 1.5 seconds using a fork.
@drk_blood
September 18, 2025 at 12:33 pm
LPL and McNally :
– Are we a joke to you ? 😂
@neddy1287
September 18, 2025 at 8:36 pm
Code snatch method can be defeated by cutting away the traces to the debug pads in question then again use harden epoxy to cover the entire pcb so this way nothing to get to it. As for reset method not a clue what can be done to prevent it
@kingrutse3278
September 19, 2025 at 8:39 am
Hate say this this isn’t difficult i wouldn’t consider that a secure lock lol
@Ghostanon404
September 19, 2025 at 7:54 pm
It’s ’Proven Locks’ adjacent 😂
@moletrap2640
September 24, 2025 at 11:55 am
Oh my God, you have found a big scandal. The maker of a device based on firmware with no consumer access will not update firmware. That’s horrible they really should have people rip these things apart, build a bread board and write some code themselves to reprogram the firmware. This is not a consumer upgraded product and you have not exposed some horrible corporate policy.
@arsorc
September 25, 2025 at 5:23 pm
the week he mentioned will take an specialist to recreate the tool is the time it takes the fab house to make and deliver the PCB, the rest is a one-day job
@Coolmatt4209
September 26, 2025 at 6:01 am
IDK MASTER = ((KEY % 685198) + 202_788 * (KEY // 685198) + 7_869) % 685198 might give you the reset pin, or just a random 6 number, im unsure
@calebethan-x9o
September 26, 2025 at 1:14 pm
No security firmware update needed. Its actually very easy to cover the pins electric tape. Done.
@Glynn-d3t
September 26, 2025 at 3:27 pm
Two things I use: A heavy duty paper clip and a 9v battery.
@catoomch
September 26, 2025 at 11:29 pm
The fact they didn’t use a one way hash algorithm for the unlock code is breathtakingly stupid.
@Karnaf142
September 27, 2025 at 4:33 pm
That wouldn’t help, you can enumerate 1,000,000 codes in no time.
Edit:
Even if they use some insanely complex hash function that takes 1-2 seconds for the microprocessor in the safe, it would take a strong computer a few hours at most
@milutinkubik
September 27, 2025 at 11:22 am
Well then don’t buy toys for kids and buy something like M-LOCKS 🙂its easy
@Karnaf142
September 27, 2025 at 4:32 pm
Why won’t the reset code need to be signed by the company
That’s so stupid
@josephlieberman3027
September 27, 2025 at 10:30 pm
I suspect that none of the safes that use those locks are UL rated for burgulary “TL-TR 30” for example resists professional burgurlar with tools and torch for 30 minuites.
UL rated burgulary rating probably will never use that lock.
@josephlieberman3027
September 27, 2025 at 10:33 pm
The purpose of a lock is, only, to keep your Friends out.
@stevesteve8098
September 28, 2025 at 9:12 am
Yep.. known that company for a long time, their stuff is shite…
@Phrame666
September 28, 2025 at 9:43 am
Hahahaha… *cough* *cough* Sentry Safe *cough* *cough*
@TADevelopment
September 28, 2025 at 2:16 pm
In my opinion, safes should never use a digital locking mechanism. Having additional digital security features is okay. i.e., a camera, failed entry alerts, etc.
@shanejobe2284
September 29, 2025 at 6:21 am
Uhhh the FBI definitely did not have a warrant, or even a subpoena.. they gave it up willingly with no pushback.
@RemixProtocol
September 29, 2025 at 6:34 am
If a warrant can bypast security.. than it’s not secure
@thegreyfuzz
September 29, 2025 at 8:09 am
This is why many years ago the electronic lock for my safe is in a box somewhere, replaced with a mechanical Group 1R. 100% pick proof? Absolutely Not! But it will take a lot more time and effort….. no and no master bypass codes or hidden back doors (thank you Liberty Safe).
@tom50586
September 29, 2025 at 12:16 pm
method 1-> Emulate the key derivation routine in the firmware OR recreate it. Probably a bunch of LCGs and math
method 2 -> sniff the debug pins with probes. flipper zero can do it too. You’d just have to figure out if it requires a magic packet to spit back the key.
How securam could avoid:
method 1-> run an actual cryptographic signature check instead of some in-house numeric “signature”. May require a longer recovery key entry though
method 2-> encapsulate the circuit with epoxy resin or disconnect the debug pins / make them inaccessible
@channel-ch2hc
September 29, 2025 at 3:46 pm
Tool total price gonna 10$
@typograf62
September 29, 2025 at 4:07 pm
The Danish government has solved this. Just do not call it a backdoor.
@jamesweldon8118
September 29, 2025 at 6:38 pm
V sauce has really cleaned up his act
@kompumaster
September 29, 2025 at 6:42 pm
10:00 You must store not a code, but hash of code. So, you can not decrypt code by raspberry pi. Fast, simple, only software changes.
@JohnDokivin
September 29, 2025 at 6:56 pm
Is the android app available where? Or do I have to dump and decompile firmware too?
@ricardobino7410
September 29, 2025 at 7:17 pm
It’s a chinese company… that’s all you need to know right there. Would you use a Temu or Aliexpress safe?
@omarabu1
September 29, 2025 at 9:05 pm
I feel like I want to somehow exploit this but I’m too lazy.
@crispy-k
September 30, 2025 at 12:35 am
temu safe, lol
@X2defeQgyb6mXOpZjaT2vtQsB
September 30, 2025 at 3:48 am
Director: Lisandro Perez-Rey
Director of Photography: Charlie Jordan
Editor: A.J. Schultz
Talent: James Rowley; Mark Omo
Host: Andy ((((((Greenberg))))))
Written by: Andy ((((((Greenberg)))))); Lisandro Perez-Rey
Line Producer: Jamie Rasmussen
Associate Producer: Brandon White
Production Manager: Peter Brunette
Production Coordinator: Rhyan Lark
Camera Operator: Jake Kinney
Gaffer: Nicholas Villafuerte
Sound Mixer: Rado Stefanov
Production Assistant: Abigayle Devine
Assistant Editor: Britt ((((((Bernstein))))))
again, not surprised with the political insert
@hrr597
September 30, 2025 at 6:12 am
Ju wish shenanigans
@Eriiiiiiiick
September 30, 2025 at 4:21 am
code is : LEET HAXOR
@bigTDevs
September 30, 2025 at 4:55 am
Its crazy that the super code was 001337
Referencing the hacker’s fav number 0x1337
@mrsimo7144
September 30, 2025 at 4:58 am
A lot of companies used hardened metals. Right tools and 2 minutes, you’re in. Key code safes are a terrible idea.
@j4ck1337
September 30, 2025 at 5:54 am
001337 😀
@statinskill
September 30, 2025 at 6:26 am
Microcontrollers often have security bits that disable JTAG/debug port functionality. A firmware could be patched to remove the recovery mode using the JTAG and then the security bit that disables JTAG could be set right after that. Oh and if part of the PCB if the controller is exposed, there’s likely a way to drive the lock solenoid by making contact with the pcb at certain points.
@paulstimpson830
September 30, 2025 at 7:04 am
Will the new lock that’s coming out be any better than this one? They’ve said they won’t be fixing the firmware in this lock. Why would we buy the new one since they likely won’t fix that if a problem turns up in it either?
@creepingcharly
September 30, 2025 at 9:59 am
Awesome video. Just reinforces why this IT professional went with a physical dial lock 😉
@itwasrightthere
September 30, 2025 at 10:05 am
1:20 I don’t believe they had a warrant, did they?
@wangofree
September 30, 2025 at 11:07 am
Interesting. Safer than hiding valuables under your mattress.
@EstebanDworak
September 30, 2025 at 12:03 pm
Nice video
@mkirkland616
September 30, 2025 at 12:40 pm
lol, 1337
@calligraffiting
September 30, 2025 at 2:20 pm
Willing to bet company will never update the code. See how master lock treat all of lockpick lawyers videos. They don’t care once they sold the unit
@TheDanielsherer
September 30, 2025 at 3:02 pm
Not sure its fair to call a Raspberry Pi Pico “low-tech”. Sure, compared to a AMD Ryzen, it’s a featherweight. But you’re talking about a dual-core system running at 133 million instructions per second. Mounting and reading the linux operating system inside those locks, finding the right memory address and decoding it is actually pretty sophisticated.
@silvertechnolo3958
September 30, 2025 at 5:58 pm
So easy it’s not even fun 😭
@macieksoft
September 30, 2025 at 6:58 pm
So guys in securam just forgotten to disable debug and firmware download features on the MCUs?
@seti_o
September 30, 2025 at 7:34 pm
🙂 No it will not take a week. It will take a JTAG and binwalk and 30 minutes 🙂 Well building the actual tool like theirs may take some time.
@VIRAL_DNA
September 30, 2025 at 7:57 pm
These safes with a Digital Pin pad are all insecure.
@authorizedTrolling
September 30, 2025 at 8:43 pm
Why would they fix it its called safe cracking there’s always gonna be a way to crack every safe. Fix that and another method will come up in 2.5 hrs. That’s a rabbit hole company’s like this have went through to many times takes them months to fox then in a few minutes another safe cracker found another method. Safes are protected by a very steep felony theu should always be followed up with a surveillance camera.
@luckynumbersevuuun
September 30, 2025 at 9:20 pm
keep getting the truth out, thank you. our world is fake, and we are often sold garbage by those who have gained our trust.
@jmr
October 1, 2025 at 1:42 am
Why do we need a debug port in the finished product? Removing the debug port isn’t the final answer but it sure would have made it more difficult to exploit if they left it off.
@chibisuke6731
October 1, 2025 at 2:36 am
The flaw is not that the supercode is stored in the accessible part of the hardware… The flaw is that it is stored AT ALL!
When you’re designing something like this, and you absolutely NEED a supercode of some sort (Legal reasons or whatever), when DO NOT store it in the hardware. Storage a hash algorithm. Do enougth rounds so that the validation of a single code takes multiple seconds. That way even of someone gets their hand on the hash itself, it will not be easily reversible.
@khaitomretro
October 1, 2025 at 3:41 am
Chinese company has backdoor in products.
* makes shocked face *
lol
@foxtail3103
October 1, 2025 at 4:52 am
A high security safe lock with a Chinese CEO.
@leobackstrom1344
October 1, 2025 at 5:12 am
They say that its a well known teqnique so they will not fix it. Then they say its bad that they show this teqnique because it can end up in the bad hands? If its allready well known, why spes it matter? 😂 Just fix the issue ffs 🤦♂️
@titaniummechanism3214
October 1, 2025 at 5:18 am
Since the company is chinese, I could imagine that this backdoor “feature” is mandated by the chinese government. That would also explain why they aren’t willing to change it.
@3nertia
October 1, 2025 at 5:20 am
Selling a new lock instead of updating the firmware? Welcome to capitalism! Profits over People! :/
@NeverGiveUpYo
October 1, 2025 at 5:24 am
Right now when I’m broke. Thanks! I love the internetz! 😎
@संगीतप्रेमी170
October 1, 2025 at 5:42 am
Hindi dubbing….??
@sjoer
October 1, 2025 at 6:30 am
This was childsplay really, anyone with a basic understanding of reverse engineering could have found this!
@Nubbe999
October 1, 2025 at 7:27 am
“hi-tec safe” … its a hotel safe. It’s only there so the burglar needs to spend a bit more time and choose to leave the room.
If anyone wanted to get in, even with regular methods, it maximum 15 min.
@Inspector_Towelie
October 1, 2025 at 9:01 am
i smell a class action law suit…
@shawnruedi
October 1, 2025 at 10:04 am
I replaced my digital lock with an old-fashioned dial lock.
@tiredofliars
October 1, 2025 at 11:05 am
I love that your Security Professional is shown trying to pick one of the EASIEST locks to open, a knock off, pot metal, Schlage looking lock that is easier to pick than the old Kwiksets! ROFL!!!! Also, if the FBI has a warrant, then not having the code is not going to make a bit of difference!
@geoffreyjames3107
October 1, 2025 at 11:11 am
(sic)
I liked the old days.
3 2 1
BOOM
@vishalkumar040393
October 1, 2025 at 11:19 am
It is clear that the company don’t care about its customers.
@Kevin-yz7ji
October 1, 2025 at 11:29 am
The movie War Games would not be a thing without a backdoor; this kind of stuff is so preventable with a bit of thinking ahead.
@ELEVOPR
October 1, 2025 at 11:42 am
I bought the biggest and most expensive safe I Could afford. Then I put my valuables inside my Socks and rolled them up.
@ThatoneNB12
October 1, 2025 at 1:39 pm
“Its stored in an encrypted manner” ahh thats good. “But we can just read the encryption keys” 😭
@TallTexasGMan
October 1, 2025 at 2:59 pm
That is a nice non-destructive method. Honestly, easiest way into most of these is a simple battery operated angle grinder or oscillating tool. Cut through the weakest part (back and bottom).
@davidg1067
October 1, 2025 at 3:47 pm
what a joke. I’d rather keep my valuables in a hollowed out book.
@manjanjatx
October 1, 2025 at 4:27 pm
Excellent video – thank you Andy and the white-hat hacking team for the exposé!
@ionutbarna
October 1, 2025 at 4:37 pm
Basically they made a Keygen for the safe locks. You know…those types 😛🤓🏴☠️
@FlatMcdonaldsSprite
October 1, 2025 at 6:42 pm
nothing is higher end than a cheap Arduino project