Very nice example of a security device, which was not completely thought through ...
Source http://www.syslog.com/~jwilson/pics-i-like/kurios119.jpg, pointed out by Peter G. Neumann in comp.risks.