the leading store of anti-theft jammers, detectors, magnets, jammers and fabric.

The key for anti-theft tags invue for goods without IR protection you will find here:
https://bombaster.org/product/invue/ 

As of today (February 2024 – please note the date correction, as it is currently 2024, not 2025 as stated in the original message), the situation with our research into InVue products is as follows. InVue specializes in the production of highly secure locks, access control systems for cabinets, and, most importantly for us, security systems for merchandise displayed in open retail environments. A key element of their technology is the use of dual-layer signal encryption, transmitted via an infrared (IR) port from a special key to the actuator device (lock, blocker, etc.).

To fully understand the context of our current efforts, it is necessary to examine in detail the operating principle of the InVue key. Based on information from open sources, as well as the results of our own research, we have determined that the key has an automatic deactivation function every 12 hours. After this time, a store employee must take the key and reactivate it on a special device – an activation platform. This platform is usually located either in the checkout area or in a back room of the store. After the reactivation procedure, the key regains a 12-hour active period.

However, there are important nuances here. The key activation process uses a code that represents a secondary layer of encryption in the system. This code establishes a connection between the activation unit (the platform itself) and the key itself. And, critically, this code is unique to each store. In other words, a key activated in one store will not function in another, because each store uses its own activation base with a unique code. This code, in turn, is embedded in the system during the manufacturing process at the factory.

In addition to secondary encryption, there is also a primary encryption code. It is responsible for protecting the information transmitted directly from the key to the actuator – the lock or security system located in the sales area. At this time, our team has been able to successfully crack this part of the system – the one that is responsible for transmitting data from the key to the merchandise (to the lock, blocker, etc.).

But, unfortunately, cracking the primary encryption layer does not give full control over the system. The secondary encryption, implemented in the key activation devices, remains a “black box” for us. Research in this direction is actively underway.

Theoretically, we could create a device that would brute-force the possible secondary encryption keys. However, in practice, this would require the user to spend an extremely long time – about eight hours – directly next to the merchandise of interest in the sales area. Obviously, such an approach is absolutely impractical and unacceptable.

All this complexity is due to the tight binding of the devices installed in the sales area to a specific activation base located in that store. As a result, using a key activated in another store to interact with a lock or security system (for example, to open a display case) is absolutely impossible. Neither opening, nor closing, nor performing any other actions will be possible, because the internal secondary code embedded in the key will not match the system code in that particular store.

Summarizing the above, I want to emphasize the key point. Our research is ongoing, and we do not rule out that in the future we will be able to crack the encryption algorithms used in the InVue key activation bases. If this happens, the entire InVue security system will become completely vulnerable. However, as of today, this has not happened, and we cannot give any definite forecasts regarding the timing of achieving this goal.

I sincerely hope for your understanding of the current situation, and, most importantly, for your support and interest in our company’s other products. These products are also of significant interest, have practical value, and, importantly, the funding of all our research projects depends directly on their sales.

It is important to emphasize that our company has never resorted to collecting funds for development from outside sources. All of our inventions created over the years have been funded solely by the proceeds from the sale of previously developed products. Thus, the success of some of our developments directly contributes to the emergence and development of others.

In this regard, I urge you to pay close attention to studying the results we have already achieved and to familiarize yourself with the products that are already available. Your support, expressed in your interest in our finished solutions, will allow us to not stop our current research and ultimately achieve a result that will be of interest to all of us. Because, in our opinion, no one else in the world is engaged in solving this problem as comprehensively and purposefully as we are. I recommend that you definitely familiarize yourself with the “About Us” section on our website to get a more complete picture of our company and its activities.
https://bombaster.org/about-us
 

I recommend that you study my site in more detail, I have a lot of interesting and unique devices for a shoplift:
https://bombaster.org

as well as we have created a very interesting video in which there is a lot of useful information about anti-theft technologies:
https://youtu.be/KLedl7LiG8A