Browsed by
Tag: Physical Security

Blink: Get Notified When Your Mac Wakes

Blink: Get Notified When Your Mac Wakes

Chances are good that most – if not all – of us leave our computers unattended somewhere, sometime. For me this is at home. Though I generally abide by best practices and shut down before leaving my computer, occasionally I don’t. I can be caught close my MacBook’s lid and heading out the door to run an errand, walk the dog, whatever. I do have some peace of mind that no one is messing with my computer, however. This is…

Read More Read More

Vehicle Privacy and Security

Vehicle Privacy and Security

After hearing my recent interview with Aaron on the In the Rabbit Hole Urban Survival Podcast a couple weeks ago, I realized that I’ve yet to talk about vehicle privacy and security. For those of us in North America, vehicles are a way of life. Vehicles present some unique privacy and security challenges. In this post I’m going to talk about a few things you can do to improve vehicle privacy and security. Most requires some minor behavioral modification.

ITRH Interview on Physical Security

ITRH Interview on Physical Security

Quick announcement: I was recently interviewed for the In the Rabbit Hole Urban Survival Podcast. This time Aaron and I talked about physical security. We had time to delve pretty deeply into some good topics including general security considerations, deadbolts, padlocks, and safes (a lot of stuff about safes). If you’re interested check it out at https://www.intherabbithole.com/e179/. If you like it, feel free to let Aaron know.

Enhancing Deadbolt Security

Enhancing Deadbolt Security

In my last post I recommended some specific locks. This week’s post will cover improving the security of existing locks, or the Grade 1 hardware I recommended. The goal is to create a “Grade 1+” lock, by adding some additional security measures. Enhancing deadbolt security very achievable with just a little spare time, access to a locksmith, and some basic hand tools.

Threat Model-Based Deadbolt Selection

Threat Model-Based Deadbolt Selection

Several weeks I ago I wrote a post about Mechnical Lock Threat Models, detailing categories of locks, and the users who should have them. In this post I am looking specifically at deadbolt selection, and offering some recommendations based on my mechanical lock threat models.

Lock Safari NYC – New York, New York!

Lock Safari NYC – New York, New York!

I recently had the chance to spend a few days in New York, New York.  This was a personal trip, and I covered a lot of ground. This time, I actually managed to focus on the locks I saw, and I saw some good ones on Lock Safari NYC. I noticed some interesting things about New York’s locks. First, there are a LOT of high-security locks on the street. In Manhattan (LES, SoHo, Midtown, Theatre District) and Brooklyn (including DUMBO…

Read More Read More

Hotel Room Insecurity

Hotel Room Insecurity

I travel a lot, and I stay in a lot of hotels. For the last five years I have averaged somewhere 150-200 nights a year in hotels.  This year (so far) has seen me in hotels in at least 32 different cities including Boston, Charleston, Knoxville, Las Vegas, New York, Phoenix, Salt Lake City, San Diego, Tampa, Vancouver, and a host of military towns.  This gives me a lot of opportunities to see and think about the security of hotels…

Read More Read More

Sighthound Video Surveillance App

Sighthound Video Surveillance App

Physical security is an inherent part of information security. If an attacker can achieve physical access to your devices, you are already behind the power curve.  Maintaining physical control of your devices is maybe the most important step you can take to protect your data-at-rest.  However, there are some occasions when maintaining physical control is not possible or practical.  One of these occasions is during hotel stays.  Hotel rooms – and even their safes – are incredibly insecure (I’ll talk…

Read More Read More

Threat-Model Based Padlock Selection

Threat-Model Based Padlock Selection

Today I will cover some padlocks that I use and personally recommend.  Padlock selection should occur based on the threats they are likely to face.  There are two basic threat models I use when selecting padlocks.  The first is low-to-medium security applications.  These locks will be robust enough against forced entry and offer some light protection against picking and other surreptitious defeat.  The other is high security.  The cost of a high security lock is justified in several instances: if…

Read More Read More

Physical Security Books

Physical Security Books

Since beginning the Lock Safari series of articles I have been asked by several of you about physical security books.  Today’s post will quickly cover the four most useful volumes in my library that pertain to physical security.  Some of these books are quite costly; I am not suggesting you need them all.  For this reason I have broken them down into categories.  Exactly half of these books deal with defeating lock through lock picking or other methodology.  I believe…

Read More Read More