In 1907, a Finnish mechanic named Emil Henriksson was repairing a cash register in Helsinki when he noticed something. The machine's internal counting discs — small rotating cylinders that clicked through positions as numbers were tallied — were doing something interesting. Each disc could sit at a precise rotational angle, stable and independent of the others. If you controlled those angles, you controlled the machine.

Most people would have fixed the register and gone home. Henriksson saw a lock. Not a metaphor — an actual, physical lock built on the same principle. Two years later, he had one. And over a century later, the best version of his idea is still the mechanical security benchmark for critical infrastructure, telecommunications networks, maritime shipping, and the most obsessive corner of the locksport community.

The reason it's survived a century of being attacked, analyzed, copied, and improved is simple: it works on fundamentally different physics from every other common lock. No springs means no bump attack. No shear line means traditional picking tools don't apply. No exposed driver pins means a whole category of vulnerabilities simply doesn't exist. This guide covers all of it — the history, the mechanics, the security features, the picking theory, and the tools. And at the end, we'll tell you which ones to actually buy.