Now, I told you about the DefCon chip. How many have cars? Okay. Do you have a Key Fob that you never take out of your pocket when you get in your car? Yeah? Come on, other people had cars. I've got one car that has, and one that doesn't. It's just RFID. Your car detects how close you are and says you're allowed to pull on the handle, which automatically unlocks it. How can I get around that? How does it know you're close to the car? Return signal strengths. Proximity sensor. Proximity sensor, return signal strengths, so on and so forth. How does it know that you're close to the car? What it knows is that something that is communicating with, it is close to the car. So, your professor pulls into the mall. I'm there with my buddy. My buddy's going to stand next to his car, and I've got an RFID repeater. I'm going to do it over Wi-Fi. I'm going to do it over the phone network, text, whatever, I don't care. My buddy is going to follow your professor. The car is going to talk to the key in his pocket with my buddy and I'm in the middle. How does your car know? It's your key it's communicating with. Now, we could do things based on the amount of time but, most of these devices don't have a lot of power in them. All right. A lot of them, like your toll things, there is no power in them. A lot of these things is just RFID. There's no battery in there. So, they are little genius products that move really fast with a lot of this cryptography and stuff. So now, I can open his car. I could price start it too if I wanted to but that allows me to go through his trunk and everything. I don't even have to break into it. The communication between your key fob and your car. That a good point. Is thinking it's over the air. Yes. All right. I'm just making it over the Internet, but nobody trust the Internet that's why we do security on it, right? Because once we do security, we don't care the medium, or in this case, there's nothing that requires me. It doesn't give me a code that I then punch in on my car or anything like that. Weighs around that, well, you could have both of them have a GPS on them but makes it expensive, then they can say, where are you located? You can do that. Electronically, Erasable, Programmable, Read-Only memories. Usually, they have a bit that says, once it's programmed, don't allow anyone to read it out, don't allow anyone to reprogram it so on and so forth. So, a short amount of time, and I don't remember what that amount of time is, a short amount of time in a microwave will cause certain bits to reset. Well, yeah, so you reset that bit, but you reset like half of the other bits. So now, what I need is a bunch of chips. What I can do through proper analysis, because bits getting reset is essentially random, I can put 100 of them in there, let's say, 50 of them that bit reset I can read them out, and what I will find is what the program code is, because some of those will flip, some of them won't but it won't always be the same bit in the actual program field. So, this is an attack you can do to basically unlock that and read out this protected code that you thought you kept people from reading. Now, your USB encryption device. Do I need to know your key? A lot of companies would do Dongles for software in a corporate world. Do I need to break the security of that device or do I just need to steal the one off your computer and plug it into my computer? Yeah? If I have a device that I can personalize to do encryption but all I have to do is have the device in my possession. If I don't have to unlock it with a password, I don't need to break the security, I just need to get a copy of it. I just need to grab your device.