The anti🚫-derailment🚃 & thread🧵 hijackingšŸ”« thread🧵 ⁉

I wouldn’t say it’s totally junk,
It works pretty fine with fobs and cards, and it programs like it supposed to, and I can get a 1 inch read

Just not implants

Granted it’s a semi plastic body, and a slightly thinner shackle, but I don’t think I could break it off with anything less than a decent hammer, and I can’t shim it

It’s clearly not meant as a high level of security, but all I want is something fun and basic for a gym locker

I wasn’t going to post a link until I got my hands on it because… it’s among us themed… which is really dumb

But it’s just a sticker so I peeled it off ( yes already, yes even though I am returning it… I don’t care)

https://www.amazon.com/dp/B09BN98FGV/ref=cm_sw_r_cp_api_glt_fabc_WZRH7YAYCQ6Y0RCH0N42?_encoding=UTF8&psc=1

But yea no dice

1 Like

Ah fair enough. I would keep trying till I at least found one that would work with an implant personally.

1 Like

Can you shim it? Not that it matter whether it’s a good padlock, since it’s not even a good NFC implant padlock to begin with, but I’m curious.

Anyway, thanks for taking one for us. That’s one less POS nobody here will have to buy and get disappointed with. Pilgrimsmaster: that there’s a good entry for the compatibility Excel sheet.

Also, lucky you, you got it really quick: my craptastic 460 euro padlock hasn’t even left Digiwell yet and it’s been several days now. They’re really not in a hurry to process orders. I’m a bit miffed actually.

2 Likes

it was I the spread sheet, I removed it

I could put it back though.

It was originally mentioned here

1 Like

Hmm I missed that one. Thanks!’

I reckon you should. Total failures are as important as working devices for the prospective buyer.

3 Likes

yeah you are correct. I removed it when I was smallifying a bunch of images. To reduce the lag on the sheets.

I am away from a PC for about 5 days, so I’ll put it back then.
In have a couple of Pay terminals to add also.

1 Like

Maybe failures don’t need an image. Just a list of confirmed stuff to avoid would be enough, just so that people know what’s already been unsuccessfully tried.

3 Likes

Nope doesn’t look shimable, the Lugs on the shackle are only one sided, but internal in the lock body on the locking side

Supposedly it’s waterproof

I guess this is public now…

Time to start collecting emails…

7 Likes

Done

1 Like

Ditto

1 Like

5 Likes

vivokey link on homepage is broken, sends you to https://apexring.com/vivokey.com.

I also don’t see anywhere to put an email in to sign up to the mailing list, but that might be my combination of extensions :man_shrugging:

1 Like

well i think i actually caused a bit of a fuckup while mucking around with it… its being fixed now

Dude… This marketing trick is old as dirt. Microsoft has been using it for decades with their so-called Windows build leaks, that everybody and their dog knows they organized themselves to wet people’s appetite.

I can see right through you. That was no fuckup :slight_smile:

1 Like

Why is that a design fail? The unicorn looks pretty happy…
:unicorn_starstruck:

3 Likes

I wonder if ā€œUnicorn rimmingā€ is in the urban dictionary?

Apparently not :unicorn_crying:

image

3 Likes

This is very off-topic for the forum, so I figured I’d just throw this in this thread. I know there’s several other radio nerds here (and security folks), thought you might find this interesting. I’ll put it in a drop down,

Fun security/radio project inside!

I learned today that using the TEMPEST vulnerability, it’s possible to read the contents of a monitor’s screen, wirelessly, using nothing but an SDR and an antenna. This works by decoding the RF leakage from the monitor’s image processing circuits, and it’s especially effective on older monitors and cheaper monitors (less shielding).

Obviously, being the proud owner of a HackRF, I had to give it a try. There only seems to be one program for decoding, TempestSDR. It was written in Java, and it was an absolute pain in the ass to get running. It took me a solid hour to get all of the libraries installed that it needed (it needed a whole MinGW install…). It also seems to only like windows, I couldn’t get it to run at all on my linux install with my HackRF in particular. It would launch, but no IO. However, I can’t give TempestSDR too much grief, it’s the only program I know of that can do what it does.

You also have to first use another SDR program to find the frequency of the leakage, it should be somewhere around 400MHz (mine is ~355MHz).

For my antenna, I’m using a cheap dipole, although sadly I seem to have misplaced my shorter telescopic antennas for it :frowning: Ideally I’d have one roughly matched to the proper frequency, but this one’s too long. Regardless, it’s good enough to get a basic image.

The range you’ll get is dependent on how bad the monitor is. My antenna had to be basically touching the plastic casing of the monitor, but some people have had success from the next room over with some monitors.

I had a really hard time keeping a consistent lock on the signal (and it took me forever to get it to lock on at all), but I got it to work :grinning_face_with_smiling_eyes:

Next, I threw up some sensitive data, that no one should ever see…


Totally readable.

While it messes up the tracking, pivoting the antenna can yield even clearer results for text:

Here’s the classic ā€œIndian-head test patternā€:

I hope someone else finds this as interesting as I did, it took me about 2-3 hours to get it working. Figured it was worth a post.

Bn1Mty

10 Likes