FIGURE 2-12. Reset button on physical lock
This section provides a good example of issues we need to think through as we increas-
ingly become dependent on mobile apps for ensuring our physical safety. Attacks such as
password guessing and phishing have traditionally been used to compromise our digital
CHAPTER 2: ELECTRONIC LOCK PICKING—ABUSING DOOR LOCKS TO COMPROMISE
(^56) PHYSICAL SECURITY