Having a weblog like this attracts a lot of interesting people. And some people who think they are interesting and just try to feed you with little tidbits of information to ‘tease’ you. Well … I think I have grown pretty immune for that.
One of these people mailed me little over a year ago is interesting though. He claimed to had developed a method of decoding an Abloy protec ‘in around ten minutes, fifteen max’. His real problem was cutting the keys after decoding the lock. During some long talks he explained that decoding a 2, 3 or 4 cut disk was the most easy, without telling me how he did it.
And all of a sudden today there is a video on Youtube, showing the decoding of an Abloy Protec. What you see is some sort of probe tool (made from a keyblank), a scale and a laser pointer to tell you how far the probe can be turned. It seems as if this way you can identify the position of the disc, and the laser pointer will tell you the number of the cut. It is a pity he is holding the lock in his hand and that he is using a cut-away lock that is set to the factory cutaway combination ….
But this sure is a big dent in Abloy’s reputation. First the video of a destructive opening technique and now a video of decoding the ‘pickproof lock’.
I am convinced the person who made this video is very skilled and bright, and I think the video and tool are for real. I would just love to see some more close ups of the tip of the tool and some more info. And that also goes for another strange video that was released on Youtube: Pick Mottura doppia mappa.
If all goes well I will meet the person behind these tools and techniques in a month orso, and hopefully can give you some more details. In the meantime we can all speculate about the tool in the comments ;)
* Update 06-02-2009 (19:15) : the video was removed before it even got 500 hits. It is a good thing I captured it before it went offline …
** Update 08-02-2009: the video became online again on youtube and could been found here.
*** Update 14-02-2009 video was removed from youtube again…