[00:00.000 --> 00:07.000] Hello hackers, hello lockpickers, and thank you all for your interest in today's presentation. [00:07.280 --> 00:11.680] Every year we try to prepare something special for you. [00:11.900 --> 00:13.900] Today is the same. [00:13.900 --> 00:24.840] When I saw that Josh was ahead of me, I quickly sat down and looked at the ceiling for an hour and a half, [00:24.840 --> 00:28.880] to see what lesson I should give, because I don't want to talk about physical safety after him. [00:30.000 --> 00:37.600] That's why I chose a very special area this year, a very special lock and its opening method, [00:37.600 --> 00:42.060] which is especially dear to me, because I was also a member of this project, [00:42.060 --> 00:48.500] and I was a member of the method that eventually came up with this opening method. [00:48.540 --> 00:51.340] What I'm going to talk about today are the lockpickers. [00:53.740 --> 00:56.200] And first, the obligatory part. [00:56.200 --> 01:01.940] In Hungary, everything we do is gradually prohibited, [01:01.940 --> 01:05.680] and after the violation of the rules and the theft of the devices, [01:06.200 --> 01:10.380] we don't walk around with the lockpicks in our pockets at night. [01:11.740 --> 01:13.320] Only... other times. [01:15.080 --> 01:18.300] What we're talking about today are the so-called lockpickers, [01:18.720 --> 01:22.380] and if someone can't immediately identify it by its name, [01:23.340 --> 01:25.580] it's called Disk Detainer Lock in English, [01:26.800 --> 01:29.480] but the best way to identify it is by its key opening. [01:29.720 --> 01:32.440] So, if you look at the end of a lock or a lock, [01:33.080 --> 01:35.460] you can see a circle-shaped key opening, [01:35.460 --> 01:39.460] and if you look at it closely, you can see either a square-shaped key opening, [01:39.960 --> 01:43.200] or a diamond-shaped key opening. [01:43.200 --> 01:45.400] We see a relatively large and straight key opening, [01:46.220 --> 01:51.340] and based on this, it's very easy to recognize these locks. [01:51.340 --> 01:55.200] What distinguishes the lockpicks, [01:55.200 --> 02:01.680] is the circle-shaped ring that holds the key opening. [02:01.920 --> 02:05.580] Whether the lock is a more expensive lock, [02:05.580 --> 02:08.860] or a cheaper lock, or a Chinese type, or a German type, [02:08.860 --> 02:12.620] can be distinguished by its name, and by its price. [02:13.620 --> 02:16.240] But basically, based on this key opening, [02:16.240 --> 02:19.060] we're always talking about disk locks. [02:20.340 --> 02:24.440] A disk lock also has a distinctive key shape. [02:24.440 --> 02:26.900] This is more or less a long, [02:26.900 --> 02:30.720] with multiple cuts, key. [02:30.720 --> 02:33.240] It's a very distinctive shape. [02:33.480 --> 02:34.960] With the cuts, [02:34.960 --> 02:36.300] we find a distinctive, [02:36.300 --> 02:40.420] with multiple cuts, cut. [02:43.140 --> 02:44.860] The number of these cuts [02:47.040 --> 02:51.080] indicates how many keys can be found in a lock, [02:51.080 --> 02:54.080] what complexity of a lock we're talking about, [02:54.080 --> 02:55.860] and if we look at these cuts, [02:56.600 --> 02:59.980] the width of the cuts shows again [02:59.980 --> 03:03.260] what complexity of a lock we're talking about. [03:03.260 --> 03:04.580] In German locks, [03:04.580 --> 03:06.860] we usually find 6 different cuts, [03:07.700 --> 03:10.180] and about 7 or 8 types of cuts, [03:10.440 --> 03:13.480] while in the Chinese version, [03:13.480 --> 03:16.980] we can distinguish 4 different types of cuts, [03:16.980 --> 03:20.360] and we find 4, 5 or 6 cuts in total, [03:20.360 --> 03:21.820] but it also happens that [03:22.020 --> 03:24.920] there are 2 or 3 keys in the bottom of the lock, [03:24.920 --> 03:28.700] and all the others don't play a role in the lock. [03:29.880 --> 03:31.860] So, as I said, [03:31.860 --> 03:34.040] the distinctive shape of the key [03:34.040 --> 03:36.420] also defines these locks. [03:36.420 --> 03:39.560] We can easily recognize them from here. [03:40.580 --> 03:42.520] Moving forward a little, [03:42.520 --> 03:44.120] these locks also have a special [03:44.120 --> 03:47.000] opening and closing tool. [03:47.440 --> 03:49.720] These tools are very large in size, [03:49.720 --> 03:52.860] and their prices are also very high. [03:53.180 --> 03:56.700] From 400 euros to 15 dollars, [03:56.700 --> 03:58.820] practically everything is available. [03:59.140 --> 04:02.200] You can find a lot of pictures on the internet [04:02.200 --> 04:04.300] about custom-made tools, [04:04.300 --> 04:08.020] and when I finished my presentation, [04:08.020 --> 04:09.260] everyone will see that [04:09.260 --> 04:11.760] it is infinitely easy to make a tool for it, [04:12.520 --> 04:14.480] because it has a lot of knowledge of metalworking. [04:15.720 --> 04:18.820] Of course, the tool must be precise and durable, [04:19.980 --> 04:22.620] but basically, the opening and closing [04:22.620 --> 04:24.800] is not necessarily determined by the tool, [04:25.140 --> 04:27.660] but rather by the practice and the knowledge of the lock. [04:27.660 --> 04:32.800] This helps a lot in getting to know the lock. [04:34.460 --> 04:36.920] How did the story begin? [04:37.220 --> 04:40.060] Somewhere in 2007, [04:40.760 --> 04:41.280] a young guy named Jakó [04:43.700 --> 04:47.860] claimed that he could decode the Abus Granit lock. [04:48.560 --> 04:51.400] At that time, Abus was making the Granit lock [04:52.260 --> 04:54.560] by printing these little codes [04:55.620 --> 04:59.180] according to a number. [05:00.140 --> 05:02.840] They printed the code of the given lock [05:03.720 --> 05:05.340] on the lock, [05:05.340 --> 05:08.060] and with a small tool, [05:08.060 --> 05:09.200] he could push it into the lock [05:10.060 --> 05:11.860] and by pushing the corresponding part of the lock, [05:11.860 --> 05:13.860] he could read this number. [05:15.080 --> 05:18.220] This error was reported back to Abus. [05:18.380 --> 05:20.260] Abus immediately reacted to this, [05:20.580 --> 05:22.640] and from that moment on, [05:22.640 --> 05:23.080] he put together locks [05:24.180 --> 05:27.120] that had a number in one of the locks, [05:27.120 --> 05:28.840] but did not have a number in the other. [05:28.840 --> 05:32.020] They sent a padlock to Jakó, [05:32.020 --> 05:33.260] without a key, [05:33.260 --> 05:34.360] so that he could say, [05:34.360 --> 05:36.440] here it is, open it if you can, [05:36.440 --> 05:38.080] and if you can open it, [05:40.060 --> 05:42.420] then the locksmith thought about the whole method of opening it, [05:42.420 --> 05:44.620] and he came up with a tool, [05:44.760 --> 05:46.360] a manufacturing tool, [05:46.360 --> 05:48.080] and a method of opening it, [05:48.080 --> 05:50.120] by which he opened the padlock, [05:50.120 --> 05:51.240] sent it back to Abus, [05:51.240 --> 05:52.900] and got the key. [05:53.280 --> 05:55.800] In short, this is the story. [05:55.800 --> 05:57.080] The NDA magazine [05:57.080 --> 06:00.960] also writes down the whole story [06:00.960 --> 06:02.740] and the whole method, [06:02.740 --> 06:05.600] but I would like to show you this method now, [06:05.600 --> 06:08.840] which is marked by his name, [06:08.840 --> 06:12.040] and to this day, [06:12.040 --> 06:13.780] his tools are considered [06:13.780 --> 06:15.460] the best in the profession, [06:15.460 --> 06:16.680] and to this day, [06:16.680 --> 06:18.120] we use his method somewhere. [06:20.460 --> 06:23.360] There is a significant difference [06:23.360 --> 06:23.620] between the two tools shown on the screen. [06:23.620 --> 06:24.780] The tool on the left is [06:24.780 --> 06:28.260] of the German VENT company, [06:28.260 --> 06:31.140] it costs around 400 euros today, [06:31.140 --> 06:32.060] and on the right, [06:32.060 --> 06:33.760] we see the tool of Jakó, [06:33.760 --> 06:36.760] the price difference is 8 times between the two tools. [06:37.340 --> 06:38.400] Jakó's tool [06:38.840 --> 06:40.100] consists of three parts, [06:40.620 --> 06:41.400] a hole, [06:41.620 --> 06:42.740] a manipulator part, [06:42.740 --> 06:43.960] and a rotating part, [06:44.680 --> 06:46.000] a manipulator part, [06:46.000 --> 06:47.220] and a mountain. [06:47.660 --> 06:50.920] To show you the speciality of this tool, [06:50.920 --> 06:53.120] it is scaled in two ways. [06:56.120 --> 06:58.580] The circle ring is scaled [06:58.580 --> 06:59.220] at 18 degrees, [06:59.220 --> 07:01.340] and I think [07:01.340 --> 07:01.380] it is scaled [07:01.380 --> 07:01.900] at millimeters [07:01.900 --> 07:04.640] in the long direction. [07:07.300 --> 07:08.820] The tool of the mountain [07:08.840 --> 07:12.120] is the most special of all, [07:12.120 --> 07:13.140] because it is less than [07:13.140 --> 07:15.700] half a millimeter thick. [07:17.260 --> 07:17.780] We will soon understand [07:17.780 --> 07:19.100] the importance of this. [07:19.960 --> 07:22.020] And this is the most sensitive part. [07:22.240 --> 07:24.040] So if someone has a tool like this, [07:24.040 --> 07:25.180] they won't give it away [07:25.180 --> 07:26.240] without any hesitation, [07:26.240 --> 07:28.060] because it will soon be rolled [07:28.060 --> 07:29.620] from one to the other. [07:29.620 --> 07:31.560] And we have to find out [07:31.560 --> 07:32.880] how we can use this very thin [07:33.860 --> 07:34.820] metal mountain [07:34.820 --> 07:36.120] to move between the parts [07:38.840 --> 07:39.180] and manipulate [07:39.180 --> 07:41.760] so that the tool stays in one place [07:41.760 --> 07:43.560] and doesn't get damaged. [07:43.560 --> 07:45.160] On the other hand, [07:45.160 --> 07:46.120] we have to reach all the plates [07:46.120 --> 07:47.960] and turn all the parts [07:47.960 --> 07:51.200] into the right angle. [07:52.680 --> 07:54.120] Jakó not only made the tool, [07:54.700 --> 07:57.340] but he also made a code table for it. [07:57.340 --> 07:58.300] While he [07:58.300 --> 08:00.400] manipulates the lock [08:01.360 --> 08:03.720] and turns the parts in, [08:03.720 --> 08:04.820] he can mark his observations [08:04.820 --> 08:06.800] to this table. [08:08.420 --> 08:10.240] And practically, [08:10.240 --> 08:12.080] on the conclusion principle, [08:12.080 --> 08:15.980] if the code of his own tool [08:15.980 --> 08:17.520] goes all the way to the base, [08:17.520 --> 08:19.180] if he doesn't find [08:19.500 --> 08:21.520] a false or correct cut [08:21.520 --> 08:21.840] in the given code, [08:21.840 --> 08:22.740] then he practically [08:22.740 --> 08:24.840] didn't write that number. [08:24.840 --> 08:26.960] And so on the conclusion principle, [08:26.960 --> 08:28.760] from plate to plate, [08:28.760 --> 08:31.520] until the lock is finally opened. [08:32.540 --> 08:35.180] Opening also means decoding. [08:35.220 --> 08:36.560] When the lock is opened, [08:36.560 --> 08:38.720] we can decode the key's code, [08:38.720 --> 08:39.820] which is also on the key's [08:40.540 --> 08:41.800] security card, [08:42.200 --> 08:44.840] so it can be read from there as well. [08:45.160 --> 08:46.380] Let's go a little deeper [08:46.380 --> 08:47.600] into the construction of the lock [08:47.600 --> 08:50.860] to understand what I'm talking about. [08:50.860 --> 08:53.560] Here we see an Abus Plus [08:53.560 --> 08:55.780] closed lock. [08:56.440 --> 08:58.240] In the closed body itself, [08:58.240 --> 08:59.700] sorry, it jumped further, [08:59.700 --> 09:00.820] in the closed body itself [09:01.280 --> 09:03.260] we can see an inner cylinder. [09:03.260 --> 09:05.740] In the inner cylinder we can see the parts. [09:05.740 --> 09:07.560] These parts are in different positions. [09:08.920 --> 09:09.480] And between the parts [09:10.260 --> 09:11.920] a very thin, [09:11.920 --> 09:13.200] long-lasting plate [09:13.520 --> 09:16.100] causes those black marks [09:16.100 --> 09:17.680] between the parts. [09:18.560 --> 09:19.940] If in the closed body [09:19.940 --> 09:21.180] this cylinder, [09:21.180 --> 09:22.740] which holds the parts, [09:23.320 --> 09:24.840] turns, [09:24.840 --> 09:26.900] then the two slotted ends [09:26.900 --> 09:29.120] allow the two balls [09:29.500 --> 09:30.780] which allow the key [09:30.780 --> 09:32.900] to be pulled out by this. [09:32.900 --> 09:35.620] So we close the key [09:35.740 --> 09:37.840] so that if the two balls [09:37.840 --> 09:38.260] can come in [09:38.260 --> 09:40.740] during the rotation of the inner cylinder, [09:41.800 --> 09:42.900] so it can move towards the closed body, [09:43.860 --> 09:45.680] then the key can be pulled out. [09:45.680 --> 09:48.100] And if the inner cylinder [09:48.100 --> 09:50.900] is in a closed state, [09:50.900 --> 09:52.760] then it pushes out the two slotted balls [09:52.760 --> 09:54.320] and the slotted ball [09:54.320 --> 09:55.460] closes the key. [09:55.460 --> 09:56.100] From here on, [09:56.100 --> 09:58.380] we can see that these are [09:58.380 --> 09:59.820] the most massive, [09:59.820 --> 10:01.260] the best-closing locks [10:01.260 --> 10:02.080] because they cannot be manipulated [10:02.080 --> 10:03.400] by any other [10:03.400 --> 10:05.640] direct manipulation [10:06.760 --> 10:08.200] solution. [10:09.200 --> 10:10.100] In any case, [10:10.100 --> 10:11.180] we have to go through the lock. [10:11.820 --> 10:12.920] In any case, [10:12.920 --> 10:13.780] the small plates [10:13.780 --> 10:17.740] have to be read out in some way, [10:17.740 --> 10:19.500] manipulated, decoded. [10:19.660 --> 10:21.360] In the picture on the left, [10:21.360 --> 10:23.340] we see that in the inner cylinder [10:23.340 --> 10:26.280] there is a longitudinal cutout [10:26.280 --> 10:28.620] where we see the parts. [10:28.620 --> 10:30.260] This cutout is not made [10:31.260 --> 10:33.680] for the pleasure of the doctor, [10:33.680 --> 10:35.320] but in this cutout [10:35.320 --> 10:36.400] there is exactly the same [10:36.400 --> 10:37.620] long and wide [10:37.620 --> 10:40.120] trained cylinder. [10:42.000 --> 10:42.820] This cylinder [10:42.820 --> 10:43.300] is pushed out [10:43.300 --> 10:43.880] by these plates [10:44.840 --> 10:47.260] in the false cutout [10:47.260 --> 10:49.460] or in the closed state [10:49.460 --> 10:51.720] from this cylinder. [10:52.000 --> 10:53.500] And this cylinder, [10:53.500 --> 10:54.140] as it is pushed out [10:54.140 --> 10:54.660] from the cylinder [10:54.660 --> 10:55.860] and does not push [11:01.480 --> 11:02.980] any brute force [11:02.980 --> 11:03.360] tool [11:03.360 --> 11:05.240] and tries to turn [11:05.240 --> 11:07.380] this inner cylinder, [11:07.380 --> 11:08.640] the cylinder tightens [11:08.640 --> 11:10.100] and from then on [11:11.540 --> 11:12.640] the trained cylinder [11:12.640 --> 11:13.500] does not allow to turn [11:13.500 --> 11:14.280] this cylinder, [11:14.280 --> 11:15.400] so the hit bullets cannot [11:15.400 --> 11:16.380] jump in, [11:16.380 --> 11:17.840] so the blade does not come out, [11:17.840 --> 11:18.840] so from now on [11:18.840 --> 11:20.540] the lock remains closed. [11:21.460 --> 11:22.800] In the next picture [11:32.900 --> 11:34.500] we see [11:34.500 --> 11:34.800] that under the opening [11:34.800 --> 11:36.020] of the inner cylinder [11:38.320 --> 11:39.920] the necessary [11:42.140 --> 11:42.940] cutouts are arranged [11:42.940 --> 11:44.560] and so it can be understood [11:44.560 --> 11:46.820] that this trained hit [11:46.820 --> 11:47.760] this trained bullet [11:47.760 --> 11:49.360] falls into the cylinder [11:49.360 --> 11:50.720] and from then on [11:51.260 --> 11:53.400] the inner cylinder [11:53.400 --> 11:53.420] can be turned [11:53.420 --> 11:56.780] which allows the hit bullets [11:56.780 --> 11:58.420] which allows the blade [11:58.420 --> 11:59.380] and from then on [12:02.180 --> 12:10.360] Before the opening and manipulation of a lock, it is essential to understand its construction. [12:10.360 --> 12:19.480] This is why we disassemble locks, we make rigid locks, and we try to understand the structure in every possible way. [12:20.540 --> 12:29.260] Here we can see an open state lock, where the trained hammer can go into the correct cut of the assembled parts, [12:29.260 --> 12:38.720] and thus it goes into the cylinder, the cylinder becomes reversible, and thus the lock can be opened. [12:38.720 --> 12:44.360] In a short film, I can show you how such a lock is assembled. [12:44.660 --> 12:46.640] We can see the assembly of an Abus Plus lock. [12:49.220 --> 12:59.020] Each part is followed by a long plate, and thus a lock is built up from 7 or 8 or 9 plates. [12:59.880 --> 13:07.060] We can see the opening and closing of the lock in this short film. [13:07.260 --> 13:14.660] And this still only shows the opening and closing of the lock itself. [13:14.660 --> 13:20.420] I would like to go a little deeper, because in order to understand the essence of manipulation, [13:20.420 --> 13:24.880] we have to understand the operation of the plates, the spiritual world of the plates. [13:25.940 --> 13:31.660] In this picture, we see the special key of a Granit Extreme lock, [13:32.440 --> 13:42.900] where there is not only a kind of protection, where various cuts and abrasions indicate the coding of the lock, [13:42.900 --> 13:46.700] but we can also see a special engraving below. [13:46.700 --> 13:56.720] This special engraving manipulates the bottom, or opens the two-part lock plate placed at the bottom. [13:56.780 --> 14:05.520] These two small elements, visible next to the 0th ring, are on the top right. [14:06.280 --> 14:10.060] This is again an advanced version of this lock, [14:10.060 --> 14:14.560] which means that we do not only have to manipulate the plates, [14:14.560 --> 14:17.400] and turn them in the right way, in the right order, [14:17.400 --> 14:22.780] but first we have to open this small two-part lock plate. [14:23.560 --> 14:25.480] Why am I saying this? [14:25.540 --> 14:29.860] Because this will later have a serious role in understanding the opening. [14:30.480 --> 14:35.900] Based on an observation, someone observed that these locks can be opened well [14:35.900 --> 14:40.860] if we first insert a wrench, or any kind of tool, [14:40.860 --> 14:44.040] and turn all the plates to the right. [14:45.280 --> 14:48.900] Of course, this also means a false position of the lock, [14:48.900 --> 14:51.780] but if we turn the plates backwards, [14:51.780 --> 14:53.480] so we manipulate them backwards, [14:53.480 --> 14:56.560] and not from an open position, [14:56.560 --> 14:59.420] we manipulate the plates backwards, [14:59.420 --> 15:03.300] then we get to the final solution much sooner, [15:03.300 --> 15:07.820] than if we do it from the front. [15:08.180 --> 15:09.940] First, this is just an anecdote, [15:09.940 --> 15:12.220] but then we realize that this is really the case, [15:12.220 --> 15:14.720] and both in the German lock, and in the Chinese lock, [15:14.720 --> 15:17.580] this is part of today's method of opening, [15:17.580 --> 15:20.820] that we first turn all the plates in the final position, [15:20.820 --> 15:23.760] and then we start manipulating the plates backwards. [15:27.600 --> 15:30.720] When we look at the plates with different encodings, [15:30.720 --> 15:35.100] here we can see 6 different types of plates, [15:35.100 --> 15:37.180] encoded from 1 to 6, [15:37.180 --> 15:43.740] and in the lower frame we can see the distance rings between the encoded plates. [15:43.740 --> 15:47.160] The distance rings are both of the same shape, [15:47.160 --> 15:50.460] and both are 0.5 mm thick. [15:50.460 --> 15:54.840] This is why the top of the tool has to be a little thinner than 0.5 mm, [15:55.520 --> 15:58.780] so that when I insert a wrench, [15:58.780 --> 16:01.200] I put it in the correct position, [16:01.200 --> 16:04.020] and then I have to be able to get out of the encoded plate, [16:04.320 --> 16:08.820] and I have to be able to get out of the full circle of the distance ring. [16:09.540 --> 16:15.040] There, I have to go to the opening of the other encoded plate, [16:15.040 --> 16:18.460] and this is how I can go from plate to plate, [16:18.460 --> 16:21.880] so that the distance rings give me the freedom [16:21.880 --> 16:25.940] to push my tool further to the opening of the next plate. [16:25.940 --> 16:30.980] So, let's say that there is a 1 encoded and a 6 encoded plate. [16:31.680 --> 16:34.440] There is a 5 x 18 degree difference between the two. [16:34.440 --> 16:37.060] I come out of the 1 encoded plate, [16:37.700 --> 16:39.840] I can rotate the tool in the distance ring, [16:39.840 --> 16:42.560] and I can only go into the 6 encoded plate. [16:42.560 --> 16:46.940] So, it is understandable why the tool has to be so thin, [16:47.480 --> 16:53.000] because the distance ring between the plates is very thin, [16:53.000 --> 16:56.060] and I have to be able to move in such a way [16:56.060 --> 16:59.080] that I don't get into any encoded plate, [16:59.080 --> 17:04.960] and the distance ring doesn't take the encoded plate further from the given position. [17:07.560 --> 17:09.920] And this is where the research started, [17:09.920 --> 17:11.640] we took several pages apart, [17:11.640 --> 17:13.420] what we could only find on the internet, [17:13.420 --> 17:14.740] we hunted the pictures, [17:14.740 --> 17:16.900] we put them together with Photoshop, [17:18.240 --> 17:21.000] and the information came from the factory, [17:21.000 --> 17:24.440] that there is a 18 degree difference between the different plates. [17:24.580 --> 17:26.400] If we look at the plates, [17:26.400 --> 17:29.300] we can see a deeper cutout on each plate, [17:29.300 --> 17:30.500] this is the correct cutout, [17:30.500 --> 17:32.640] this is where the hole has to go, [17:32.640 --> 17:35.600] so that the result of the open state is closed, [17:35.600 --> 17:39.300] and next to it, in both directions, there are false cuts. [17:39.800 --> 17:47.480] These are not much smaller cuts than the real cutout, [17:47.480 --> 17:50.000] and the ring can fit perfectly into it, [17:50.000 --> 17:53.520] and it doesn't allow the plate to be manipulated further. [17:53.720 --> 17:55.260] This is why you have to be skillful, [17:55.260 --> 17:57.420] you have to avoid false cuts, [17:57.420 --> 18:00.120] and you have to find the correct cutout. [18:00.120 --> 18:03.480] This can be done with 6-7 plates, [18:04.240 --> 18:08.880] and you have to put the correct cutouts together. [18:10.860 --> 18:15.140] We had to work on this method, [18:15.140 --> 18:17.360] because lockpicking is a beautiful thing, [18:17.360 --> 18:19.240] but it can be useful, too. [18:19.740 --> 18:23.760] We have to promise the opening of a lock within a visible time. [18:24.100 --> 18:26.460] A visible time, and in the case of a lock like this, [18:26.460 --> 18:28.800] it doesn't matter if it is under 5 minutes, [18:28.800 --> 18:32.740] because this is an acceptable opening time, [18:32.740 --> 18:37.180] and then they won't believe what we are doing. [18:37.180 --> 18:41.040] So the 18 degrees was an important point [18:41.040 --> 18:44.560] in the invention of the method, [18:44.560 --> 18:46.880] because the tool is also scaled up to 18 degrees. [18:49.800 --> 18:54.420] At the German SSDEFAU club in Stuttgart, [18:54.420 --> 18:59.560] where we were working on this project, [19:00.200 --> 19:01.630] we had to find a method, [19:02.320 --> 19:06.280] based on the well-known concepts and facts, [19:06.280 --> 19:08.880] which Jako had already invented. [19:08.880 --> 19:10.280] He was able to open the lock, [19:10.280 --> 19:12.360] but we needed a method, [19:12.360 --> 19:16.000] to open the lock within 5 minutes. [19:17.500 --> 19:18.740] 2. A beginner, [19:18.740 --> 19:21.480] whenever they are able to learn how to open the lock. [19:21.760 --> 19:25.620] 3. A beginner, who is able to open the lock within 5 minutes, [19:25.620 --> 19:28.560] after some practice. [19:32.600 --> 19:34.680] And this is what we came up with. [19:34.820 --> 19:37.120] We collected all the locks, [19:37.120 --> 19:39.580] which were available in our knowledge, [19:39.580 --> 19:41.400] and this type of lock. [19:41.400 --> 19:44.400] We opened all of these locks, [19:44.400 --> 19:46.640] and wrote down our experience. [19:46.680 --> 19:47.580] We wrote down, [19:48.260 --> 19:54.340] where we found any kind of cut, [19:54.340 --> 19:56.520] we didn't know if it was false or true, [19:56.520 --> 19:58.940] but where we felt a kind of resistance, [19:59.820 --> 20:01.480] during the tightening of the lock, [20:01.480 --> 20:03.780] which refers to some kind of cut. [20:07.760 --> 20:10.560] And when we wrote down these cuts, [20:11.540 --> 20:16.540] we realized that the scaling of the lock is not accurate. [20:16.540 --> 20:18.560] The fact that the lock is scaled up by 18 degrees, [20:19.460 --> 20:21.640] is not accurate enough for opening. [20:21.640 --> 20:23.860] So we bought these units, [20:24.400 --> 20:28.600] and we divided these units into 10 more units. [20:28.600 --> 20:32.280] So a 1mm division on the lock, [20:32.280 --> 20:38.720] in theory we divided it into 10 more identical units, [20:38.720 --> 20:43.880] and this is why we can see tenths in the Excel list, [20:43.880 --> 20:45.460] because based on the reading, [20:45.460 --> 20:47.880] we tried to read it as accurately as possible, [20:47.880 --> 20:49.280] based on the reading, [20:49.280 --> 20:53.780] we divided the units, the 1mm units, [20:53.780 --> 20:55.900] into 10 more units. [20:55.900 --> 21:00.740] As we wrote down the false and true cuts, [21:00.740 --> 21:03.920] when the lock opened, [21:03.920 --> 21:07.680] or even when we went all the way to decoding, [21:07.680 --> 21:10.740] we looked at the code of the lock, [21:10.740 --> 21:14.960] and we looked at which reading belongs to the correct code. [21:15.240 --> 21:18.220] And this brought us a very interesting observation. [21:19.480 --> 21:21.340] With the false cuts, [21:21.340 --> 21:25.720] the movement of the tool and the disc was always much narrower, [21:25.720 --> 21:27.320] than with the correct cuts. [21:27.320 --> 21:29.900] So it is noteworthy that with the correct cuts, [21:29.900 --> 21:32.740] the tool moved almost one whole unit, [21:33.860 --> 21:34.580] while with the false cuts, [21:34.580 --> 21:38.240] the movement of the tool and the disc was 1.0, [21:39.580 --> 21:41.740] while with the false cuts, [21:42.460 --> 21:45.200] the movement of the tool and the disc was 0.3-0.6. [21:48.220 --> 21:49.700] From this point on, [21:49.700 --> 21:51.140] it was easy to get ahead, [21:51.140 --> 21:53.080] we just had to verify this theory, [21:53.600 --> 21:54.940] that in the case, [21:54.940 --> 21:56.960] if there is a false cut, [21:56.960 --> 21:58.860] just under the groove, [21:58.860 --> 22:01.500] which is between the cylinder and the lock, [22:01.500 --> 22:04.000] and we moved the tool there, [22:04.000 --> 22:05.500] then we could observe a very narrow, [22:06.120 --> 22:08.640] tensile movement, [22:08.640 --> 22:10.560] while with the correct cuts, [22:10.560 --> 22:12.860] we found a more flexible, [22:12.860 --> 22:15.920] larger cut. [22:16.940 --> 22:20.500] When we got to this observation, [22:21.180 --> 22:25.180] there was another kind of observation, [22:25.180 --> 22:26.580] and that is, [22:26.580 --> 22:30.120] if we already wrote down all the false and correct cuts, [22:30.120 --> 22:32.100] depending on each tool, [22:32.100 --> 22:35.900] and from the 10-12 locks we examined, [22:35.900 --> 22:38.860] all kinds of tool types emerged, [22:38.860 --> 22:40.920] then we could write down [22:40.920 --> 22:48.020] where the sequence of false cuts starts [22:48.020 --> 22:49.640] and how long it lasts. [22:49.640 --> 22:51.180] Here, in the upper right corner, [22:51.180 --> 22:52.440] we see a table, [22:52.440 --> 22:53.520] which tells us, [22:53.520 --> 22:56.440] that with tools coded from 1 to 6, [22:56.440 --> 22:58.360] at which division, [22:59.560 --> 23:03.140] at which tool code, [23:03.140 --> 23:04.620] the false cuts started, [23:05.440 --> 23:07.680] and how long they lasted. [23:08.120 --> 23:11.040] So, when we turn the tools back and forth, [23:11.040 --> 23:14.900] and find the first false cuts, [23:14.900 --> 23:17.240] then we can practically know, [23:17.240 --> 23:21.440] that we are dealing with a 1, 2, 3, or even 6 tool, [23:22.020 --> 23:23.300] and from then on, [23:23.300 --> 23:25.710] we can set that tool to the correct code. [23:25.710 --> 23:28.430] Once again, the tool is coded, [23:28.430 --> 23:31.970] and this is a key part of this manipulation. [23:32.450 --> 23:33.770] And from now on, [23:33.770 --> 23:36.830] we can decode the tools relatively easily, [23:36.830 --> 23:39.630] and we can very easily correct our observation. [23:39.950 --> 23:42.130] Because when we find the first false cut, [23:42.130 --> 23:44.970] then we turn the tool to the correct code, [23:44.970 --> 23:48.470] and there we find the wider reading content, [23:48.470 --> 23:50.950] that we expect on the tool. [23:52.290 --> 23:53.950] The experience of the whole examination, [23:55.170 --> 23:58.090] we were involved in this project around 6-8 times, [23:58.090 --> 24:01.370] at about 12 different closures. [24:01.630 --> 24:04.130] The experience of the examination is, [24:04.130 --> 24:05.950] that the movement is narrower at the false and false cuts, [24:06.750 --> 24:08.270] so the reading is narrower. [24:08.270 --> 24:09.790] Significantly narrower. [24:09.790 --> 24:12.470] For the correct cuts, the movement is wider, [24:12.470 --> 24:13.810] and the reading is wider. [24:14.630 --> 24:17.930] The tools can be decoded individually, [24:17.930 --> 24:21.300] according to the beginning and end content of the false cuts. [24:22.540 --> 24:24.580] And the biggest experience, [24:24.580 --> 24:25.900] and the most interesting of all, [24:25.900 --> 24:29.820] is that the key code can be decoded one-to-one, [24:29.820 --> 24:31.980] so when the lock opens for me, [24:31.980 --> 24:33.400] and the cylinder turns, [24:33.400 --> 24:34.500] at that moment, [24:34.500 --> 24:34.840] I can tell the complete code of this lock, [24:34.840 --> 24:35.860] either on the basis of my table, [24:35.860 --> 24:38.520] or on the basis of my little notes, [24:38.520 --> 24:41.660] or on the back of the tool, [24:41.660 --> 24:45.340] I can tell the complete code of this lock. [24:45.340 --> 24:46.340] This is interesting, [24:46.340 --> 24:47.820] because the key to these locks [24:47.820 --> 24:50.300] is not decoded on the basis of the old key, [24:50.820 --> 24:52.500] but on the basis of the code. [24:53.480 --> 24:56.360] The copying machine is set up in such a way, [24:56.360 --> 24:57.490] that on the basis of the code, [24:58.240 --> 24:58.880] the code is set up, [24:58.880 --> 24:59.840] they go to the lock, [24:59.840 --> 25:01.060] the code is set up again, [25:01.060 --> 25:02.200] to the next value, [25:02.200 --> 25:03.320] and again, [25:03.320 --> 25:04.420] they go to the lock. [25:04.900 --> 25:05.700] So here, [25:05.700 --> 25:06.040] let's say, [25:06.040 --> 25:07.280] you bring in a broken key, [25:07.280 --> 25:08.760] you won't be copied from the broken key [25:09.300 --> 25:12.880] by another broken similar key, [25:12.880 --> 25:16.500] like what happens with proper lock locks. [25:19.500 --> 25:21.620] I have conditions for these observations, [25:21.620 --> 25:25.120] and the condition is to have the tool perfectly set up. [25:25.120 --> 25:27.400] So, you have to have a relatively precise tool, [25:27.400 --> 25:29.020] you have to scale it precisely, [25:29.020 --> 25:30.740] and you have to set it up well. [25:30.740 --> 25:32.120] You need a fine hand, [25:32.120 --> 25:35.760] because we try to feel such fine resistance, [25:35.760 --> 25:37.400] that the average person, [25:37.400 --> 25:38.580] in their average life, [25:38.580 --> 25:40.360] is not forced to feel. [25:40.360 --> 25:42.360] So, you have to adjust to it, [25:42.360 --> 25:44.980] you simply have to calm down, [25:44.980 --> 25:46.680] you have to have a calm environment, [25:46.680 --> 25:49.760] so that you feel the resistance precisely, [25:49.760 --> 25:52.000] and you can read it precisely on the scale. [25:52.360 --> 25:53.720] That is, a lot of practice, [25:53.720 --> 25:55.300] and a disturbingly calm environment, [25:55.540 --> 25:56.900] a lot of attention is needed [25:56.900 --> 25:59.280] to this method of opening. [26:01.000 --> 26:02.800] A lot of practice. [26:02.820 --> 26:04.980] It doesn't hurt if you have the typical lock, [26:05.960 --> 26:07.640] you have to buy it, [26:07.640 --> 26:08.700] you have to pay for it, [26:08.700 --> 26:10.040] you have to get it. [26:10.260 --> 26:13.060] You have to spend a lot of time at each lock. [26:13.060 --> 26:15.600] You can practice on several different types of locks. [26:16.160 --> 26:17.540] Therefore, my advice to anyone [26:17.720 --> 26:21.120] who would like to learn [26:21.120 --> 26:22.160] or want to learn [26:22.160 --> 26:24.580] to practice, practice, practice, [26:24.580 --> 26:27.160] you need the right tools, [26:27.160 --> 26:31.220] you need different types of locks. [26:31.300 --> 26:34.200] My second advice is that you have to practice more, [26:34.200 --> 26:36.280] you have to buy more locks, [26:36.280 --> 26:37.740] you have to get closer to more locks, [26:37.740 --> 26:40.300] you may have to exchange such locks, [26:40.300 --> 26:44.040] and you can get used to Chinese locks. [26:44.840 --> 26:46.380] The Chinese have noticed [26:46.380 --> 26:50.960] that the Abus has a very professional lock, [26:50.960 --> 26:52.400] which can be sold at a good price, [26:52.820 --> 26:54.740] but if we take it apart, [26:54.740 --> 26:57.300] it is made of such simple components, [26:57.880 --> 26:58.480] which can be easily produced [26:58.480 --> 26:59.520] with Chinese materials, [26:59.520 --> 27:00.920] Chinese technology, [27:00.920 --> 27:02.520] discs, discs, [27:02.520 --> 27:08.460] and they sold the market [27:08.460 --> 27:12.200] about 700-1500 forints [27:12.200 --> 27:15.740] of Chinese-type locks. [27:15.740 --> 27:18.580] With their simplification, of course. [27:19.780 --> 27:23.580] When the Chinese made their own locks, [27:25.020 --> 27:28.060] the Chinese lockpicking tools [27:28.060 --> 27:28.360] immediately sold the market. [27:28.360 --> 27:29.580] Here in the upper left corner [27:29.580 --> 27:31.240] we see Chinese versions [27:31.240 --> 27:33.820] of these tools. [27:34.580 --> 27:36.100] The two things are not compatible. [27:36.100 --> 27:38.120] Chinese tools cannot open German locks, [27:41.500 --> 27:46.580] because of the robustness of the Chinese lock, [27:49.380 --> 27:52.180] the zippers here are much thicker, [27:52.180 --> 27:53.800] the keys are not cut in 6 different layers, [27:53.800 --> 27:56.120] but in 4 different layers, [27:57.540 --> 27:58.840] the key rings are much simpler [27:58.840 --> 28:01.020] and there are no false cuts. [28:02.040 --> 28:03.440] Hoorah, we would say, [28:03.440 --> 28:05.480] but ok, much easier to open. [28:06.200 --> 28:10.300] In the Chinese lock, they use plastic as well. [28:10.300 --> 28:14.880] That is, the cylinder, the shaft, in which the parts are inserted, is made of plastic. [28:15.340 --> 28:20.280] From then on, if we tighten the lock plate with a screwdriver, [28:20.280 --> 28:28.700] and the wrong setting continues to tighten this little locking clip to the lock plate, [28:29.240 --> 28:32.020] at that moment the feedback is lost. [28:32.020 --> 28:35.100] Because when the metal tightens to the plastic, [28:35.100 --> 28:39.420] even though I try to find the correct reading, [28:39.420 --> 28:43.380] the plastic gives a very tight, inaccurate feedback, [28:43.820 --> 28:47.140] and from then on it makes the opening incredibly difficult. [28:47.760 --> 28:50.320] If we meet a better kind of Chinese lock, [28:50.320 --> 28:54.100] and let's say Spiater, the shaft in which the parts are, [28:54.100 --> 28:56.120] the feedback is exactly the same, [28:56.120 --> 28:58.060] the material tightens to the material, [28:58.060 --> 29:00.120] the feedbacks are inaccurate, [29:00.120 --> 29:03.100] in the same closed, two-to-one opening, [29:03.100 --> 29:05.180] the readings are not the same, [29:05.180 --> 29:08.300] the Chinese lock is not scaled up accordingly. [29:08.300 --> 29:10.080] We are scaling something up, [29:10.080 --> 29:12.720] from which we do not get accurate feedback. [29:12.920 --> 29:15.260] And then we made the following observation. [29:15.440 --> 29:19.580] If someone is aware of the method of opening, [29:19.580 --> 29:24.360] he has a German lock and a Chinese lock, [29:24.360 --> 29:26.380] and practices the opening of the Chinese lock, [29:26.380 --> 29:31.360] which is so tight, difficult, and time-consuming, [29:32.360 --> 29:35.380] then the opening of the German lock starts from there, [29:35.380 --> 29:37.780] and is reduced to 2-3 minutes. [29:37.880 --> 29:39.900] Because from the Chinese lock, [29:39.900 --> 29:41.530] one gathers so much experience, [29:42.200 --> 29:45.080] that it becomes incredibly easy [29:45.080 --> 29:49.760] to open a precise, perfectly manufactured, [29:49.760 --> 29:52.720] beautifully decoded German lock. [29:56.460 --> 29:58.380] The manufacturers do not hesitate, [29:58.380 --> 30:00.000] and I would like to show a short film [30:00.000 --> 30:03.460] about the reaction of the manufacturers, [30:03.460 --> 30:06.360] because they are also moving forward. [30:07.080 --> 30:11.380] Among the tools, we have seen two types of tools before, [30:11.380 --> 30:13.380] one that rotated the cylinder up, [30:13.380 --> 30:16.200] the other one that rotated the cylinder down. [30:16.200 --> 30:18.520] Both tools are easy to manufacture, [30:18.520 --> 30:21.580] but as I said, the manufacturers have also developed further, [30:21.960 --> 30:24.360] and when they realized that there are already tools, [30:24.360 --> 30:27.640] that rotate the cylinder down, [30:27.640 --> 30:30.440] here we rotate it with the black cylinder, [30:30.440 --> 30:33.500] and manipulate the other cylinder, [30:33.500 --> 30:36.100] then they reacted quickly to this, [30:36.100 --> 30:40.020] and started to place the rotating cylinder in the lock. [30:40.280 --> 30:42.400] So, not long after, [30:42.820 --> 30:43.900] a type of lock came out, [30:43.900 --> 30:47.800] where the rotating cylinder is up, [30:47.800 --> 30:49.840] and the cylinder has to be manipulated down. [30:49.900 --> 30:53.280] Again, we are talking about 7 and 8-cylinder locks, [30:53.280 --> 30:55.580] and not long after, [30:56.840 --> 30:58.320] a type of lock came out, [30:58.320 --> 31:00.080] where the rotating cylinder is up, [31:00.080 --> 31:05.920] and the cylinder has to be manipulated down, [31:05.920 --> 31:08.260] and the cylinder has to be manipulated up. [31:08.260 --> 31:10.140] From now on, it gets harder, [31:10.140 --> 31:13.080] because so far we have used the two-in-one tool, [31:13.080 --> 31:15.000] now we have the three-in-one tool, [31:15.000 --> 31:18.220] which can rotate in the middle, [31:18.220 --> 31:20.680] but with one part of the tool, [31:20.680 --> 31:22.700] we can go under the rotating cylinder, [31:22.700 --> 31:25.200] and we can manipulate the discs there, [31:25.200 --> 31:28.060] and then, with the other part of the tool, [31:28.060 --> 31:29.400] we can go above it, [31:29.400 --> 31:31.860] and we can manipulate the other discs. [31:31.920 --> 31:34.380] It is possible to think in half a millimeter, [31:34.380 --> 31:36.440] in maximum thickness. [31:37.560 --> 31:39.930] So, it is not impossible, [31:40.240 --> 31:42.100] but it requires a lot of practice. [31:43.480 --> 31:45.240] So, it is worth learning, [31:45.240 --> 31:46.820] it is a very nice technique, [31:46.820 --> 31:48.480] the tool is very nice, [31:48.480 --> 31:52.360] and it is a great success when you use it. [31:52.380 --> 31:54.700] I have collected pictures of my own tools, [31:55.280 --> 31:56.600] I have a few, [31:56.600 --> 31:58.640] you can find a lot of them on the internet, [31:58.640 --> 32:00.340] everyone, almost everyone, [32:00.340 --> 32:03.740] has tried to make a similar tool, [32:03.740 --> 32:03.920] even with a baking oven. [32:03.920 --> 32:05.620] It is worth learning from those, [32:05.620 --> 32:07.620] who have the experience of sawing, [32:07.620 --> 32:10.900] hard sawing, and other metalworking, [32:10.900 --> 32:13.740] to be able to build such a tool. [32:14.220 --> 32:15.920] And so that we do not remain completely [32:15.920 --> 32:17.640] without challenges, [32:17.640 --> 32:19.040] because there is a lock, [32:19.040 --> 32:20.940] which no one has ever been able to open. [32:20.940 --> 32:22.480] Everyone claims that it can be opened, [32:22.480 --> 32:24.420] but we have not yet seen a method, [32:24.420 --> 32:27.880] or a demo, or a video, or anything. [32:27.880 --> 32:29.420] This is the ABLOY PROTEC, [32:29.420 --> 32:32.040] which has so many different protections, [32:32.040 --> 32:34.620] so many different locking elements, [32:34.620 --> 32:35.580] and tricks, [32:35.580 --> 32:36.860] and braking, [32:36.860 --> 32:39.140] and all kinds of things, [32:39.140 --> 32:41.640] which makes opening extremely difficult. [32:41.800 --> 32:43.300] In today's mind, I would say, [32:43.300 --> 32:44.540] that it is impossible. [32:44.540 --> 32:46.320] Maybe in a few years, [32:46.320 --> 32:47.040] we will be able to count [32:47.040 --> 32:49.860] that someone came from some country, [32:49.860 --> 32:51.240] with a miracle tool, [32:51.240 --> 32:54.020] which can be produced for 30 euros, [32:54.020 --> 32:55.200] I just said something, [32:55.200 --> 32:57.860] and we will count this as an open method. [33:00.000 --> 33:01.160] Until then, [33:01.160 --> 33:02.700] thank you for your attention, [33:02.700 --> 33:04.000] and I will close the door for you.