{"id":5159,"date":"2016-10-27T06:49:58","date_gmt":"2016-10-27T11:49:58","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=5159"},"modified":"2016-11-09T10:45:18","modified_gmt":"2016-11-09T15:45:18","slug":"everything-know-safety-smart-locks","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/everything-know-safety-smart-locks\/","title":{"rendered":"Everything You Should Know About the Safety of Smart Locks"},"content":{"rendered":"<p>Smart technology has taken over our lives. From making our coffee in the morning to controlling the temperature of our home, we trust a variety of smart objects to complete tasks for us. Unfortunately, the abundance of this smart technology also contributes to its lack of security. We\u2019re so focused on how a smart lock, for example, can make our home more secure against intruders that we may ignore the fact that it\u2019s a device that can easily be hacked. Odds are, if you have a smart lock \u2014 or are interested in purchasing one \u2014 then security is a top concern for you. It\u2019s time then to get informed about potential security risks with smart locks. After all, a smart lock system might set you back a few hundred dollars \u2014 and it might not be worth it.<\/p>\n<p><strong>Unencrypted Passwords<br \/>\n<\/strong>One of the biggest risks with some smart locks is an unencrypted password. Certain models from Quicklock, for example, store the lock\u2019s password in plain text. This is the easiest way for a hacker to gain access to your lock \u2014 and your home. Further, there are many locks that have this issue. This seems like a big oversight. If you still want to invest in a smart lock after this, make sure you do your research on what specific models have to offer.<\/p>\n<p><a href=\"https:\/\/www.psafe.com\/en\/blog\/piper-home-monitoring-security-app-android-perch\/\" target=\"_blank\"><strong>Read More: Piper \u2014 Home Monitoring\/Security App for Android + Perch<\/strong><\/a><\/p>\n<p><strong>Lack of Updates<br \/>\n<\/strong>While this can be an issue with many Android devices, it\u2019s an even bigger issue with smart locks. Smart locks are designed to be \u201csecure.\u201d But how can they truly be secure against cyberthreats without frequent security updates or bug fixes?<\/p>\n<p><strong>Hacking Opportunities<br \/>\n<\/strong>There are many ways that a hacker can gain access to your home through your smart lock. One way a hacker could take control of your lock involves you unlocking your door. A hacker could essentially \u201ccopy\u201d the information sent to unlock the door, and then \u201creplay\u201d it to gain access to the lock. DEF CON 2016 showed that, with little money spent, a hacker could gain access to more than 75% of the smart locks currently available. Many Bluetooth locks from Kwikset and August (among others) were the safest to use.<\/p>\n<p><strong>\u00a0<\/strong><strong>The Conclusion<br \/>\n<\/strong>Smart locks don\u2019t offer all that much more than a regular lock. The technology is cool, but there are still a lot of improvements that need to be made to the current selection. Even though a smart lock might help to protect your home from old-fashioned lock picking, many smart locks are still capable of being dismantled \u2014 in addition to all of the ways they can be hacked.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Don\u2019t throw away your keys just yet. As with most smart technology, a smart lock is also vulnerable to hacking opportunities.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[6],"tags":[3373,3376,3379,3370,3382,2675],"class_list":["post-5159","post","type-post","status-publish","format-standard","hentry","category-privacy","tag-door-lock","tag-locks","tag-smart-house","tag-smart-locks","tag-smart-things","tag-smartthings"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/5159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=5159"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/5159\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=5159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=5159"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=5159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}