Download presentation
Presentation is loading. Please wait.
1
Adelina Tinoco Mis 304 November 6, 2008
Sneakey Adelina Tinoco Mis 304 November 6, 2008
2
What is Sneakey? Software that can duplicate keys via distant digital images
3
How it works Extracts a keys bitting code via optical decoding
It then cuts precise duplicates Sneakey’s software can determine a key’s bitting code from any angle Software is also capable of duplicating a key with an image taken from a cell phone camera
4
Origin Software was developed by a group of computer scientists at the University of California San Diego (Benjamin Laxton, Kai Wang, Stefan Savage) Code was developed in MatLab You only need to click a few control points in the image of the key and the 'Sneakey' program does the rest," programmer Benjamin Laxton told a UCSD reporter, "It normalizes the key's size and position so that each pixel then corresponds to a known distance. From this information the height of each of the key cuts can easily be computed and likewise the bitting code can be extracted.“ MATLAB® is a high-level language and interactive environment that enables you to perform computationally intensive tasks faster than with traditional programming languages such as C, C++, and Fortran.
5
Implications Traditional keys are not as safe as people think
Be careful with displaying keys in public Security can be compromised
6
Bibliography
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.