Loiding: Difference between revisions

From Lockwiki
Jump to navigationJump to search
mNo edit summary
Line 2: Line 2:


'''Loiding''' is a [[bypass]] technique that uses a flat object, such as a credit card, to retract spring-biased [[latch]]es. The flat object, referred to as a shim or loid, is slid between the latch and [[strike]] plate and used to retract the latch. Modern spring-latch doors use a deadlatch or dead locking plunger to prevent loiding.
'''Loiding''' is a [[bypass]] technique that uses a flat object, such as a credit card, to retract spring-biased [[latch]]es. The flat object, referred to as a shim or loid, is slid between the latch and [[strike]] plate and used to retract the latch. Modern spring-latch doors use a deadlatch or dead locking plunger to prevent loiding.
The term loiding comes from celluloid, sheets of which were cut down to size and used for entry. It became known amongst many London criminals as a loid.


Loiding is generally a [[Surreptitious Entry|surreptitious]] attack but certain tools and techniques may leave behind [[Forensics|forensic]] evidence.
Loiding is generally a [[Surreptitious Entry|surreptitious]] attack but certain tools and techniques may leave behind [[Forensics|forensic]] evidence.
Line 16: Line 18:


{{Stub}}
{{Stub}}
The term 'loiding' comes from Celluloid, sheets of which were cut down to size and used for entry. It became known amongst many London criminals as loid. Also used were the terms loided and loiding....  Fantastic plastic!

Revision as of 18:52, 21 November 2011

Loiding

Loiding is a bypass technique that uses a flat object, such as a credit card, to retract spring-biased latches. The flat object, referred to as a shim or loid, is slid between the latch and strike plate and used to retract the latch. Modern spring-latch doors use a deadlatch or dead locking plunger to prevent loiding.

The term loiding comes from celluloid, sheets of which were cut down to size and used for entry. It became known amongst many London criminals as a loid.

Loiding is generally a surreptitious attack but certain tools and techniques may leave behind forensic evidence.

See also


Stub lock.png
This article is a stub. You can help Lockwiki by expanding it.