QUOTE (Prime Mover @ Aug 21 2008, 08:31 AM)

Ok first I've read and reread all the relevant sections in BBB and Unwired now. Passkeys seem to be designed to keep people out of the system. But really don't seem to succeed at that. Passkey's do not hamper a hacking attempted number wise. A hacker can still get in and merely needs to edit access logs after ever action. The more powerful the system the longer between access log checks, now that seems the opposite of what it should be. Lastly the systems spider if standing around staring at the logs maybe see both passkey and non passkey actions being performed. So all a passkey seems to accomplish is forcing a hacker to edit the logs after actions or for more powerful systems every couple of actions. Am I missing something here?
I think your missing the topology aspect of security. Passkeys would only be good if they kept people OUT of the wireless network areas. From reading Unwired it sounds like the passkey locks sit outside of the secured area and are wired together with fiberoptic cable in the walls. Those same walls have RF blocking paint or something so that a hacker can't access the nodes, which include the security node. To bypass the passkey you need to physically hack it or have some sort of fake key that the system recognizes to open the door.
Of course once you are in you can then hack the security node to remove traces that the door opened at that time or do other edits to the logs. The IC scanning the lock is to see if they can detect the fake key used or to recognize the fact the lock was tampered with.