{"id":36750,"date":"2020-08-21T09:31:05","date_gmt":"2020-08-21T09:31:05","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/"},"modified":"2020-08-21T09:31:05","modified_gmt":"2020-08-21T09:31:05","slug":"physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/","title":{"rendered":"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2015\/09\/24\/keys.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>A computer scientist at the National University of Singapore claims to have demonstrated how recording the sound of a lock turning can be sufficient to make working replica keys.<\/p>\n<p>In March 2020, Soundarya Ramesh, a third-year PhD candidate at the National University of Singapore, published a <a target=\"_blank\" href=\"https:\/\/soundaryaramesh.github.io\/papers\/spikey_hotmobile.pdf\" rel=\"noopener noreferrer\">paper [PDF]<\/a> co-authored by security researcher Harini Ramprasad and Professor Jun Han on the topic of &#8220;acoustics-based physical key inference&#8221;.<\/p>\n<p>&#8220;Since March, we have heard back from a security company that was interested in converting our research into a product, and also an amateur lockpicker who wanted to improve upon our initial idea,&#8221; Ramesh told <i>The Register<\/i>.<\/p>\n<p>The paper presents &#8220;SpiKey, a novel attack that utilizes a smartphone microphone to capture the sound of key insertion\/withdrawal to infer the shape of the key, i.e., cut depths (referred to as bittings) that form the &#8216;secret&#8217; of the key, solely by the captured acoustic signal.&#8221;<\/p>\n<p>The software works by using the time difference between clicks made as the key contacts the pins in the lock to infer the distance between the ridges of the key. The theory is that it would then be possible to manufacture a replica key using a 3D printer, for example.<\/p>\n<p>The researchers explained that there will be more than one &#8220;candidate keys&#8221; rather than a single one that fits the pattern, but that in the case of the particular six-pin key analysed, &#8220;SpiKey guarantees reducing more than 94 per cent of keys to less than 10 candidate keys&#8221; with three candidates being &#8220;the most frequent case&#8221;.<\/p>\n<p>There are several mitigating factors. Some types of key create &#8220;overlapping clicks&#8221; that are hard to analyse so only around 56 per cent of keys are vulnerable. In addition, the software assumes a constant speed of key turning, which is not the case in the real world \u2013 though by recording multiple instances this might be overcome. Future work might include &#8220;other approaches of collecting click sounds such as installing malware on a victim&#8217;s smartphone or smartwatch, or from door sensors that contain microphones,&#8221; said the researchers.<\/p>\n<p>How close does the microphone have to be to the lock for this to work? &#8220;Currently, we are investigating short distances at about 10cm from the lock for scenarios such as smart doorbells where an attack seems plausible,&#8221; Ramesh told us. &#8220;At a farther distance, the attack should be feasible with a parabolic microphone, although we&#8217;ve yet to confirm this.&#8221;<\/p>\n<p>Is it not easier just to pick a lock with traditional tools \u2013 alarmingly easy for an expert to accomplish? &#8220;We wanted to explore the possibility of a novel attack on physical lock-key systems that can remove human expertise out of the equation, while also keeping the attack completely surreptitious,&#8221; Ramesh said. &#8220;Lock picking, although quite effective on various lock types, still requires meddling with locks and human expertise. Further, lock picking also leaves traces on the lock&#8217;s interior that can be identified by forensic experts.&#8221;<\/p>\n<p>While the research is largely theoretical, it is a reminder that sensors combined with software can overturn assumptions about physical security.<\/p>\n<p>If a physical lock can be cracked with a microphone, are digital locks, such as those operated by cloud-controlled security systems, more secure? Ramesh has little patience with the idea. &#8220;There is no reason to believe that digital locks provide better security given the number of cyber attacks we witness. While attacks on physical locks require the attacker to be present, digital attacks allow for remote attacks as well, which is quite horrifying. Inspired by the two-factor authentication of the digital world, maybe a combination of both physical and digital locks for our doors can be a safe way forward.&#8221;<\/p>\n<p>The purpose of the research? &#8220;We hope that our work inspires other security researchers and professionals to pay more attention to the security of our door locks,&#8221; said Ramesh. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/08\/21\/spikey_paper_acoustic_lock_pick\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On the other hand, security of cloud-controlled locks &#8216;quite horrifying&#8217; say &#8216;cyber-physical&#8217; engineers A computer scientist at the National University of Singapore claims to have demonstrated how recording the sound of a lock turning can be sufficient to make working replica keys.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36751,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-36750","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-21T09:31:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"666\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone\",\"datePublished\":\"2020-08-21T09:31:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/\"},\"wordCount\":657,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/\",\"name\":\"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg\",\"datePublished\":\"2020-08-21T09:31:05+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg\",\"width\":1000,\"height\":666},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/","og_locale":"en_US","og_type":"article","og_title":"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-21T09:31:05+00:00","og_image":[{"width":1000,"height":666,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone","datePublished":"2020-08-21T09:31:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/"},"wordCount":657,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/","url":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/","name":"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg","datePublished":"2020-08-21T09:31:05+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/08\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone.jpg","width":1000,"height":666},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/physical-locks-are-less-hackable-than-digital-locks-right-maybe-not-boffins-break-in-with-a-microphone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Physical locks are less hackable than digital locks, right? Maybe not: Boffins break in with a microphone"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36750","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36750"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36750\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36751"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36750"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36750"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36750"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}