Stopped at Old Portland vintage hardware, left with four new antique locks! 😍

From top to bottom:
- warded or lever lock (not sure which yet)
- lever lock (needs TLC to unstick shackle)
- 3-digit combo lock (with indirect mechanism)
- disc-tumbler lock (likely 4-5 discs)

#AlicePics #Locksport #Vintage #Antique #Locks

@alice do you ever run into these vintage locks being all gunked up and that being a problem with opening them? Do the need cleaning/oiling/whatever before you can practice on them?

@dave yes, in fact, many are inoperable, some are operableβ€”but barely, and some are in remarkable shape.

I often work oil through them to make them work better. Sometimes use degreaser, an ultrasonic cleaner, WD-40, wire brushes, etc.

@alice @dave Being honest now (I realise you take immense pride in your locksport!), have you ever encountered a padlock that completely defeated you? If so, which brand was it? I mean, as an expert in lockpicking, what would you confidently recommend to a friend?

Also, what would you recommend to secure a bicycle? I've been told by a police officer that nearly everything can be brute forced with industrial bolt croppers - indeed, thieves prefer this method to tinkering with fiddly mechanisms.

@ApostateEnglishman in the wild, no oneΒΉ is going to pick your lock.

I'd recommend something like the Kryptonite New York Fahgettaboudit Mini. No one is going to pick it (but it's possible), and almost no one is going to cut it (but it's possible).

There are only a few locks that have utterly defeated me, and they come in two varieties: rusted to the point that they're nonfunctional, or high-security disc-detainer locks (like the Abloy Protec 2). Most other things I can open (eventually).

ΒΉ if your day to day is like a spy thriller, maybe it's different, but for most people it's not.

@dave

@alice @dave Yes Alice, spot-on point from you there. In cybersecurity (you know this already - I'm addressing the wider readership) it's called a Threat Model. Who are you reasonably expecting to be targeted by? 'Cos that's the only threat to be acutely concerned about. As Ed Snowden said, if your enemy is the NSA, a working assumption should be that they always have root access to everything. Plan accordingly.

If it's Dave from the pub who's determined but also stupid? Basic OpSec'll do it. πŸ€·πŸ»β€β™‚οΈ