Security Blog

Our Recent Posts



iPhone X Face ID - secure or not?

The iPhone X Face ID is hacked: Multiple sources have successfully gained access to the iPhone X using an artificial face. If you have not read our previous blog about biometric data, we encourage you to do so at: In order for us to begin to understand what is happening to the mighty iPhone's Face ID, we need to study how the iPhone collects and verifies biometric data. By a quick glance at Apple's official description of the technology: We learned that the iPhone emits infrared (30,000 of them) on your face, captures the infrared reflected from your face using

Learned something new: Assa Abloy CLIQ-Go

Attended an introductory seminar about ASSA ABLOY's CLIQ-Go solution: Introduction: CLIQ-Go is a electronic locking solution aimed for small deployment with flexible key and lock management directly managed by users. Applications: 1) Your home has about 5 - 20 places that need to be secured by a lock cylinder. Places could be your front and back door, work desk drawer, lockers, letterbox, etc. 2) You have contractors who frequently visit your home without your supervision. Contractors could be maintenance workers, domestic helpers, gardeners, deliveries, etc. 3) You need to be able to fine-tune which keys are able to access which

Video Surveillance can be overrated

We have been noticing a general impression about the perceived effectiveness of video surveillance. That impression is that if my site is under 24-hours surveillance, my site is safe. In reality, the whole crime can be recorded on good quality video, but the video footage will not help you deter the criminals nor will it help you identifying them. It is quite simple if you think about it. If I wear a mask, break in, steal valuables, and escape; all done within 15 minutes. As always, a concerted effort of security shall be employed in order for your site to be resilience when under attack. Here are some common precautions: 1) The video camera must be installed at a protected place that is dif

Dedicated Data Line vs Regular Phone Line

Alarm sounded, police notified, and criminals gone. Simple. Here is something you may not know: your alarm system does _not_ connect to the police. Your alarm system subscribes and connects to a Central Alarm Monitoring Station (CAMS). The CAMS then relay your information for police response. There are two wired ways to connect to CAMS: dedicated data line (DDL) and regular phone line. DDL is a must have for security function because: 1) Unlike phone line being a best effort service, DDL is a guaranteed service. 2) Unlike phone line being a non-monitored service, DDL is a monitored one. If a line is at fault or cut, CAMS would be notified immediately. With so many alarm systems and CAMS serv

    © Guardian Forest Security Limited
    Your Personal Security Consultant
    Est. 2017 Hong Kong