{"guid":"8c32309e-7136-4899-8ee4-1558e63ad137","title":"Lockpicking in the IoT","subtitle":"...or why adding BTLE to a device sometimes isn't smart at all","slug":"33c3-8019-lockpicking_in_the_iot","link":"https://fahrplan.events.ccc.de/congress/2016/Fahrplan/events/8019.html","description":"\"Smart\" devices using BTLE, a mobile phone and the Internet are becoming more and more popular. We will be using mechanical and electronic hardware attacks, TLS MitM, BTLE sniffing and App decompilation to show why those devices and their manufacturers aren't always that smart after all. And that even AES128 on top of the BTLE layer doesn't have to mean \"unbreakable\". Our main target will be electronic locks, but the methods shown apply to many other smart devices as well...","original_language":"eng","persons":["Ray"],"tags":["Hardware \u0026 Making"],"view_count":7818,"promoted":false,"date":"2016-12-27T21:45:00.000+01:00","release_date":"2016-12-28T01:00:00.000+01:00","updated_at":"2026-04-17T13:00:06.529+02:00","length":3640,"duration":3640,"thumb_url":"https://static.media.ccc.de/media/congress/2016/8019-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2016/8019-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2016/8c32309e-7136-4899-8ee4-1558e63ad137-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2016/8c32309e-7136-4899-8ee4-1558e63ad137-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/33c3-8019-lockpicking_in_the_iot","url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_title":"33C3: works for me","conference_url":"https://api.media.ccc.de/public/conferences/33c3","related":[{"event_id":2987,"event_guid":"9a2446e0-f287-4e92-9030-0df63edef025","weight":55},{"event_id":3597,"event_guid":"87092ad2-d3fd-4a37-bb58-1fe71217a06b","weight":36},{"event_id":3601,"event_guid":"5a517be2-220b-4eb6-88c3-e7ef08c98ace","weight":98},{"event_id":3606,"event_guid":"1aa7a4c5-1a3f-444f-99fb-e9c7b4744794","weight":36},{"event_id":3607,"event_guid":"64c07cb5-ec19-4972-a2c8-96c0e0df83c6","weight":52},{"event_id":3610,"event_guid":"56537f49-c8f0-4d73-bdba-d4d8307fc170","weight":66},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":130},{"event_id":3625,"event_guid":"65d150d3-f432-4a36-b3e3-20ee80ad913c","weight":39},{"event_id":3627,"event_guid":"143759c6-2cad-4fc8-a120-86dcc8de97e6","weight":91},{"event_id":3628,"event_guid":"4de841b2-0f34-494e-ba5b-0b79ba2c88cd","weight":73},{"event_id":3629,"event_guid":"686b1941-b211-4902-b4c4-1d642398e08b","weight":98},{"event_id":3632,"event_guid":"378cdf23-350b-4a05-afd0-6360139a7a06","weight":62},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":113},{"event_id":3636,"event_guid":"a1a52c4c-8233-403b-8f04-db981df016c1","weight":62},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":128},{"event_id":3643,"event_guid":"2689ebfe-0d84-4c88-9ea6-5cadad9d4fa4","weight":75},{"event_id":3644,"event_guid":"d1681340-162c-48ce-8c0b-61c3e176696d","weight":36},{"event_id":3646,"event_guid":"f32a1a13-b244-4a1d-a6cf-99c5e3bdad27","weight":37},{"event_id":3652,"event_guid":"60b52369-b0ee-455f-904a-4dfef49596eb","weight":45},{"event_id":3653,"event_guid":"658b276a-e3a2-4698-b2a8-2edb724be17e","weight":36},{"event_id":3654,"event_guid":"ac80424a-f4dc-431d-95f3-3f85664ba2dc","weight":99},{"event_id":3656,"event_guid":"1a6657a2-b6c2-4acc-b8fc-5ec081c0877f","weight":56},{"event_id":3665,"event_guid":"e204268f-0cea-4a1f-bb38-e7d50496492e","weight":36},{"event_id":3667,"event_guid":"6347d122-daf0-4b30-851c-32cac06bf6bd","weight":73},{"event_id":3671,"event_guid":"4ef69e6a-026f-4b30-888d-af654b220a3d","weight":76},{"event_id":3687,"event_guid":"5ae90a09-0b83-4357-bdb4-9afc04100c68","weight":55},{"event_id":3689,"event_guid":"1f7eb981-2819-4824-8f40-4ddde0be7bf3","weight":118},{"event_id":3692,"event_guid":"f21478d4-e8db-4f19-854c-2f74b5824706","weight":71},{"event_id":3694,"event_guid":"ef62eb53-cb69-42c6-aab0-bc9d3b0e1e92","weight":38},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":139},{"event_id":3701,"event_guid":"155a622a-196e-4e05-a262-88f3a7726bbe","weight":108},{"event_id":3702,"event_guid":"5fb5e620-383a-4679-b37a-beef20bcd4fe","weight":43},{"event_id":3726,"event_guid":"7c3a4ac8-1925-4459-bdd8-b9d9e18a6cfa","weight":39},{"event_id":3731,"event_guid":"bc638f9f-0370-42f9-b83c-f85cca4ca38d","weight":53},{"event_id":3734,"event_guid":"34ea8f1f-9fad-41aa-8424-e833f10e5e8b","weight":84},{"event_id":3737,"event_guid":"d51d9e44-947b-4a09-94ad-c31c5cf5e5e1","weight":63},{"event_id":3742,"event_guid":"7a5971c8-746b-4450-ba89-6569667f77c2","weight":42},{"event_id":3747,"event_guid":"fc6c53de-ec9d-4966-a912-5cfaf54c0dd2","weight":51},{"event_id":3760,"event_guid":"1c75e6a1-e586-4b91-abce-92a4561d0181","weight":74},{"event_id":3761,"event_guid":"b598ebbf-0fc6-4127-bb9d-20ae18f1171d","weight":48},{"event_id":3762,"event_guid":"25e2df7d-5740-4c2f-bc34-986326d606fe","weight":133},{"event_id":3763,"event_guid":"8fbee7ff-b50c-4310-af9d-d44794669f25","weight":89},{"event_id":3767,"event_guid":"0c197c9a-35eb-4780-a38d-9c53b7ff9bea","weight":43}],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"fin","filename":"33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT.fi.srt","state":"translated","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2023-09-02T02:39:37.190+02:00","recording_url":"https://cdn.media.ccc.de/congress/2016/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT.fi.srt","url":"https://api.media.ccc.de/public/recordings/69685","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2020-01-03T19:22:48.026+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT.en.srt","url":"https://api.media.ccc.de/public/recordings/44392","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":321,"length":3640,"mime_type":"video/mp4","language":"eng","filename":"33c3-8019-eng-Lockpicking_in_the_IoT.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T16:39:53.772+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8019-eng-Lockpicking_in_the_IoT.mp4","url":"https://api.media.ccc.de/public/recordings/13897","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":362,"length":3640,"mime_type":"video/mp4","language":"deu","filename":"33c3-8019-deu-Lockpicking_in_the_IoT.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T16:40:14.803+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8019-deu-Lockpicking_in_the_IoT.mp4","url":"https://api.media.ccc.de/public/recordings/13898","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":362,"length":3640,"mime_type":"video/mp4","language":"fra","filename":"33c3-8019-fra-Lockpicking_in_the_IoT.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T16:40:32.133+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8019-fra-Lockpicking_in_the_IoT.mp4","url":"https://api.media.ccc.de/public/recordings/13899","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":572,"length":3640,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T16:40:54.232+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-hd/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_hd.mp4","url":"https://api.media.ccc.de/public/recordings/13900","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":55,"length":3627,"mime_type":"audio/mpeg","language":"eng","filename":"33c3-8019-eng-Lockpicking_in_the_IoT.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-28T18:46:35.505+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/mp3/33c3-8019-eng-Lockpicking_in_the_IoT.mp3","url":"https://api.media.ccc.de/public/recordings/13948","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":47,"length":3627,"mime_type":"audio/opus","language":"eng","filename":"33c3-8019-eng-Lockpicking_in_the_IoT.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2016-12-28T20:01:39.500+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/opus/33c3-8019-eng-Lockpicking_in_the_IoT.opus","url":"https://api.media.ccc.de/public/recordings/13981","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":223,"length":3640,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-28T20:02:11.731+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/h264-sd/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_sd.mp4","url":"https://api.media.ccc.de/public/recordings/13982","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":409,"length":3640,"mime_type":"video/webm","language":"eng-deu-fra","filename":"33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2016-12-28T20:02:50.827+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-hd/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/13983","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"},{"size":201,"length":3640,"mime_type":"video/webm","language":"eng-deu-fra","filename":"33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2016-12-28T20:03:21.113+01:00","recording_url":"https://cdn.media.ccc.de/congress/2016/webm-sd/33c3-8019-eng-deu-fra-Lockpicking_in_the_IoT_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/13984","event_url":"https://api.media.ccc.de/public/events/8c32309e-7136-4899-8ee4-1558e63ad137","conference_url":"https://api.media.ccc.de/public/conferences/33c3"}]}