Abusing the Internet of Things

(Rick Simeone) #1

FIGURE 2-11. Program button on physical lock to associate an iPhone


A caveat to this is that the individual would have to be inside the location being protected,
because the reset and program buttons are internally facing. However, there is still a risk that
temporary workers or visitors could abuse this feature to reenter the house without permis-
sion. Furthermore, they would then be able to issue additional electronic keys to others.


BLUETOOTH LOW ENERGY AND UNLOCKING VIA MOBILE APPS 55
Free download pdf