{"id":49,"date":"2008-01-13T14:38:37","date_gmt":"2008-01-13T22:38:37","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/13\/bike-locks\/"},"modified":"2008-01-13T14:38:37","modified_gmt":"2008-01-13T22:38:37","slug":"bike-locks","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/13\/bike-locks\/","title":{"rendered":"Bike locks"},"content":{"rendered":"<p>With many people living off campus, biking is a popular method for getting to class in a timely manner.\u00a0 Bikes can be quite expensive, however, and riders are usually forced to put them in a public location (for sake of convenience\/necessity).\u00a0 As such, there are some security measures that can be taken to deter thieves from stealing these expensive publicly-displayed commodities.\u00a0 The most common (and only?) tool used to this end is a bike lock.\u00a0 For those of you who don&#8217;t know, bike locks are basically some loop of metal that has a lock to break the continuity.\u00a0 The two types I&#8217;m familar with are the U-shaped locks (with a bar across the top of the U containing a lock) and, more commonly, the snake of heavy cable that has a lock in the middle somewhere.\u00a0 With bikes as prevalent as they are, keeping them from getting stolen is a high priority.<br \/>\n<!--more--><strong>Assets and Security Goals<\/strong><\/p>\n<p>The bikes themselves are obviously the main assets here.\u00a0 Not only do they represent a possibly sizeable investment, but they&#8217;re also a means of transportation for the user, and losing it can cause great inconvenience.<\/p>\n<p><strong>Adversaries and Threats<\/strong><\/p>\n<p>Adversaries are after one thing: the bike.\u00a0 These could be fellow (if misguided) students that want the previously mentioned convenience of a bike, or they could simply be petty thieves seeking to sell the bike, complete or piecewise, to other unscrupulous individuals or stores.<\/p>\n<p><strong>Potential weaknesses<\/strong><\/p>\n<p>There&#8217;s a constant tradeoff between the attributes of weight, durability, and cost.\u00a0 If you lower the weight, then either you decrease durability or increase cost.\u00a0 As such, many bike locks exist that can simply be cut with tools that are easy to come by.\u00a0 Worse, many people (bystanders) are apathetic and consider either that clearly the owner lost the key for their lock or it&#8217;s not their problem, if they see someone cutting through a bike lock.<\/p>\n<p><strong>Potential defenses<\/strong><\/p>\n<p>Cable locks are notorious for being easy to cut.\u00a0 One can&#8217;t really make them thicker, because the cable is pretty long and the weight would increase very quickly.\u00a0 However, a U-style lock, which has a smaller circumference, can stand to be made of thicker metal.\u00a0 Additionally, these sometimes have serial numbers that enable the owner to order another key from the manufacturer in case they lose theirs.\u00a0 One has to hope that the manufacturer performs adequate identity checking, lest a determined thief manages to acquire a key from the manufacturer for your lock.\u00a0 Other ideas include something like an alarm that responds to an inductive current in the frame of the bike (i.e. bike is touch sensitive) or having multiple bike locks to slow down an adversary.<\/p>\n<p><strong>Risks<\/strong><\/p>\n<p>Obviously, one could simply say that the bike is at risk here, and it is.\u00a0 But that&#8217;s not all that&#8217;s at stake.\u00a0 Not only will you have lost the bike (a sizeable investment in itself), but you&#8217;ll have lost the expensive lock and possibly some &#8220;accessories&#8221; that you may have purchased for your bike, like a helmet (state law, yes?).\u00a0 Plus there are aftereffects &#8212; a victim might have to report their bike stolen, be forced to alter their schedule, or, ultimately, be forced to purchase all new equipment.\u00a0 Bikes are everywhere, and not everyone invests in adequate security leaving bikes (or front wheels..) just begging to be stolen.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Keeping anything in a public place is always risky.\u00a0 One just has to hope that no one is gutsy enough to tempt fate by stealing something from a public place, but there are people who do it given the correct tools and adequate determination.\u00a0 It may not be a big deal to lose a bike when you got the bike on a yard sale or as a hand-me-down, but there are also expensive carbon fiber bikes that individuals pay a good sum for.\u00a0 Ultimately, as was described in class, &#8220;secure&#8221; is really not a boolean variable here, but a relative term.\u00a0 There is nothing that you can do to make it absolutely secure &#8212; only something to make the theft time-consuming enough to deter most thieves.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With many people living off campus, biking is a popular method for getting to class in a timely manner.\u00a0 Bikes can be quite expensive, however, and riders are usually forced to put them in a public location (for sake of &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/13\/bike-locks\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":35,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,13,5],"tags":[35,36],"class_list":["post-49","post","type-post","status-publish","format-standard","hentry","category-availability","category-physicalsecurity","category-security-reviews","tag-bike","tag-transportation"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/49","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=49"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/49\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=49"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=49"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=49"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}