{"id":3109,"date":"2018-06-15T16:18:00","date_gmt":"2018-06-15T16:18:00","guid":{"rendered":"http:\/\/6ba26ef7-296b-4fcd-9730-3087002899b5"},"modified":"2018-06-15T16:18:00","modified_gmt":"2018-06-15T16:18:00","slug":"another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/","title":{"rendered":"Another flaw hits Tapplock smart locks, thanks to leaky server"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/06\/15\/f1f36b68-7997-44da-92d6-523cca86a3af\/resize\/770xauto\/f454cecc788dd41a6da09290bf51eebf\/tapplock-hero.jpg\" class=\"\" alt=\"\" height=\"auto\" width=\"770\"\/><\/span><\/p>\n<p><span class=\"caption\">(Image: Tapplock)<\/span><\/p>\n<p>For the second time this week, smart lock maker Tapplock is under fire over its security.<\/p>\n<p>Security researcher <a href=\"https:\/\/twitter.com\/evstykas\">Vangelis Stykas<\/a> found anyone can obtain sensitive information to locate and open a lock, simply by pulling the information directly from a leaky company&#8217;s API server.<\/p>\n<p>He demonstrated how to retrieve the lock&#8217;s last known postal address, and enough data to create an unlock code, which can be used to locate and open any smart lock.<\/p>\n<p><strong>CNET:<\/strong> <a href=\"https:\/\/www.cnet.com\/topics\/smart-home\/best-smart-home-devices\/best-smart-locks\/?ftag=CMG-01-10aaa1b\" target=\"_blank\">Best Smart Home Locks for 2018<\/a><\/p>\n<p>Stykas&#8217; work builds on research published <a href=\"https:\/\/www.pentestpartners.com\/security-blog\/totally-pwning-the-tapplock-smart-lock\/\" target=\"_blank\">earlier this week<\/a>. Andrew Tierney found the lock <a href=\"https:\/\/www.pentestpartners.com\/security-blog\/totally-pwning-the-tapplock-smart-lock\/\" target=\"_blank\">can be easily opened<\/a> without the owner&#8217;s fingerprint, because the unlock code is generated from the unique, hard-coded networking address &#8212; known as a MAC address &#8212; that all Bluetooth devices have. Tierney found the lock takes that MAC address and converts it using the MD5 algorithm, an old algorithm that can be easily cracked. But because all Bluetooth devices broadcast their MAC address, a malicious hacker within a close proximity can obtain it, then convert it to an MD5 hash, and unlock the device.<\/p>\n<p>Tapplock said <a href=\"https:\/\/tapplock.com\/notice\/20180612\/\" target=\"_blank\">it will fix<\/a> the security issue in an upcoming app update. Android users are expected to get the app later today, while iOS users have to wait until Apple approves the app.<\/p>\n<p>In a statement Friday, Tapplock confirmed it has pulled the API, which the app relies on to wirelessly open the lock using Bluetooth, given the risk of a data breach.<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The lock can still be opened with a user&#8217;s fingerprint and the <a href=\"http:\/\/help.tapplock.com\/customer\/en\/portal\/articles\/2817477-how-do-i-setup-and-use-morse-code-\" target=\"_blank\">backup Morse code feature<\/a>, however, the <a href=\"https:\/\/tapplock.com\/notice\/20180615\/\" target=\"_blank\">statement<\/a> said.<\/p>\n<p>&#8220;This patch addresses several security issues and upgrades Tapplock&#8217;s communication and authentication security protocols. We will continue to monitor the latest security trends and provide updates from time to time,&#8221; the company said.<\/p>\n<p>Stykas shared <a href=\"https:\/\/medium.com\/@evstykas\/c8d89915f025\" target=\"_blank\">his findings<\/a> with <em>ZDNet<\/em>, which we tested and verified.<\/p>\n<p>The API requires a registered email address to work, which anyone can create using the mobile app. Using a few terminal commands that anyone can run from their computer, Stykas showed a malicious actor could obtain the lock&#8217;s location and its MAC address, which, using Tierney&#8217;s technique, can be easily converted to a code that can unlock the device in a close proximity.<\/p>\n<p>Stykas also found that every time a new fingerprint was enrolled with a user&#8217;s lock, a new record was uploaded to the server and was given a unique, automatically incrementing user number &#8212; making it easy to try different user number combinations and obtain other users&#8217; data.<\/p>\n<p>And because he found no evidence that the API was rate-limited, he said anyone could pull as much user data from the server as they want.<\/p>\n<p>He also explained he could permanently share any lock with any other users&#8217; account without the owner&#8217;s consent.<\/p>\n<p>&#8220;I would not buy this lock,&#8221; said Stykas, in <a href=\"https:\/\/medium.com\/@evstykas\/c8d89915f025\" target=\"_blank\">his write-up<\/a>.<\/p>\n<p>Tapplock also came under fire earlier this month after its &#8220;unbreakable durability&#8221; claim was disproved. A YouTube user, JerryRigEverything, <a href=\"https:\/\/www.youtube.com\/watch?v=RxM55DNS9CE\" target=\"_blank\">found that the design of the lock<\/a> could be cracked open using a suction cup, defeating the lock&#8217;s physical security.<\/p>\n<p>The company said this one lock had a manufacturing defect, and all other locks were safe.<\/p>\n<div class=\"relatedContent alignNone\" readability=\"7.2083333333333\">\n<p class=\"title\"><a href=\"https:\/\/medium.com\/@zackwhittaker\/how-to-contact-me-securely-38dc5c5bc756\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Got a tip?<\/a><\/p>\n<p class=\"dek\">You can send tips securely over Signal and WhatsApp at 646-755\u20138849. You can also send PGP email with the fingerprint: 4D0E 92F2 E36A EC51 DAAE 5D97 CB8C 15FA EB6C EEA5.<\/p>\n<p class=\"read-more\"><a href=\"https:\/\/medium.com\/@zackwhittaker\/how-to-contact-me-securely-38dc5c5bc756\" data-omniture-track=\"moduleClick\" data-omniture-track-data=\"{&quot;moduleInfo&quot;: &quot;pinbox&quot;, &quot;pageType&quot;: &quot;article&quot;}\">Read More<\/a><\/p>\n<\/div>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"><span class=\"int\">ZDNET INVESTIGATIONS<\/span><\/h3>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/another-security-flaw-tapplock-smart-lock-hacking\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anyone could pull a lock&#8217;s location and unlock code details directly from the company&#8217;s servers.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":3110,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-3109","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Another flaw hits Tapplock smart locks, thanks to leaky server 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Another flaw hits Tapplock smart locks, thanks to leaky server 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-15T16:18:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"555\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Another flaw hits Tapplock smart locks, thanks to leaky server\",\"datePublished\":\"2018-06-15T16:18:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/\"},\"wordCount\":593,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/\",\"name\":\"Another flaw hits Tapplock smart locks, thanks to leaky server 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg\",\"datePublished\":\"2018-06-15T16:18:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/06\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg\",\"width\":770,\"height\":555},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Another flaw hits Tapplock smart locks, thanks to leaky server\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Another flaw hits Tapplock smart locks, thanks to leaky server 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/","og_locale":"en_US","og_type":"article","og_title":"Another flaw hits Tapplock smart locks, thanks to leaky server 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-06-15T16:18:00+00:00","og_image":[{"width":770,"height":555,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Another flaw hits Tapplock smart locks, thanks to leaky server","datePublished":"2018-06-15T16:18:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/"},"wordCount":593,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/","url":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/","name":"Another flaw hits Tapplock smart locks, thanks to leaky server 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg","datePublished":"2018-06-15T16:18:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/06\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server.jpg","width":770,"height":555},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/another-flaw-hits-tapplock-smart-locks-thanks-to-leaky-server\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Another flaw hits Tapplock smart locks, thanks to leaky server"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=3109"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/3109\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/3110"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=3109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=3109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=3109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}