HotelRooms

Latest

  • Ibis hotels to have robots paint art while they track your sleep: no, that's not creepy at all (video)

    by 
    Jon Fingas
    Jon Fingas
    09.28.2012

    First they invaded our factories, and now it's our hotel rooms. Is nowhere safe from the robots? In truth, Ibis' upcoming Sleep Art project is very slick, even if it smacks of robot voyeurism. Ibis hotels in Berlin, London and Paris will let 40 successful applicants sleep on beds that each have 80 sensors translating movements, sound and temperature into truly unique acrylic paintings by robotic arms connected through WiFi. You don't have to worry that the machines are literally watching you sleep -- there's no cameras or other visual records of the night's tossing and turning, apart from the abstract lines on the canvas. All the same, if you succeed in landing a stay in one of the Sleep Art hotel rooms between October 13th and November 23rd, you're a brave person. We all know how this ends.

  • Hacker finds flaw in hotel locks, can ruin your vacation with $50 DIY gadget

    by 
    Terrence O'Brien
    Terrence O'Brien
    07.24.2012

    Admittedly, the headline is designed to get your dander up. You're in no immediate danger of a technologically-gifted thief plugging a couple of wires into your hotel door and making off with your sack of souvenirs from the Mall of America. But that's not to say it's impossible. Cody Brocious, who was recently brought on by Mozilla to work on Boot to Gecko, is giving a presentation at the annual Black Hat conference in Vegas where he demonstrates a method for cracking open keycard locks with a homemade $50 device. The hack only works on locks made by Onity at the moment, and real life testing with a reporter from Forbes only succeeded in opening one of three hotel doors. Still, with between four and five million Onity locks installed across the country (according to the company), that is a lot of vulnerable rooms. The attack is possible thanks to a DC jack on the underside of the lock that's used to reprogram the doors. This provides direct access to the lock's memory, which is also home to the numeric key required to release the latch -- a key that is protected by what Brocious described as "weak encryption." Ultimately the source code and design for the Arduino-based unlocker will be published online alongside a research paper explaining how these locks work and why they're inherently insecure. The hope is that manufacturers will take notice and improve the security of their wares before the world's ne'er-do-wells perfect Brocious' technique.