Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated:
1
00:00:00,160 --> 00:00:05,759
Almost everybody in the industrialized
2
00:00:02,720 --> 00:00:08,000
world now has Wi-Fi as part of their
3
00:00:05,759 --> 00:00:12,800
home, their office, what have you. The
4
00:00:08,000 --> 00:00:17,279
combination of radio technology and
5
00:00:12,800 --> 00:00:19,680
cyber security and AI all come together
6
00:00:17,279 --> 00:00:21,760
to create something that we never
7
00:00:19,680 --> 00:00:23,600
thought we would be able to do. This is
8
00:00:21,760 --> 00:00:25,840
the same thing, sending out the Wi-Fi
9
00:00:23,600 --> 00:00:28,240
signal and then getting the signal and
10
00:00:25,840 --> 00:00:32,000
having enough intelligence built into
11
00:00:28,240 --> 00:00:35,840
your system to be able to determine what
12
00:00:32,000 --> 00:00:38,239
is going on in that room.
13
00:00:35,840 --> 00:00:40,239
Hey everyone, Yaniv Hoffman back with
14
00:00:38,239 --> 00:00:44,160
another video and back with the one and
15
00:00:40,239 --> 00:00:46,559
only Master Aer Occupy the web. Welcome.
16
00:00:44,160 --> 00:00:49,760
>> Thanks Yaniv. It's good to be back.
17
00:00:46,559 --> 00:00:52,320
Thank you for the honor of hosting me
18
00:00:49,760 --> 00:00:55,120
again. I really appreciate that.
19
00:00:52,320 --> 00:00:58,079
>> Yes. Yes. Already got complaints and
20
00:00:55,120 --> 00:01:02,079
questions. Where is OTW? So happy you
21
00:00:58,079 --> 00:01:05,119
are with me. And today we have a a cool
22
00:01:02,079 --> 00:01:09,040
I believe a very cool subject. And what
23
00:01:05,119 --> 00:01:11,760
if I told you that your Wi-Fi can see
24
00:01:09,040 --> 00:01:14,159
you even through walls. So a new
25
00:01:11,760 --> 00:01:17,520
technique lets attackers track your
26
00:01:14,159 --> 00:01:20,560
every move inside your home without ever
27
00:01:17,520 --> 00:01:24,320
stepping inside. And to break it down,
28
00:01:20,560 --> 00:01:28,000
I'm turning it to OTW, who is going to
29
00:01:24,320 --> 00:01:29,360
show you exactly how this works. Well, I
30
00:01:28,000 --> 00:01:32,720
don't know if I'm going to show them
31
00:01:29,360 --> 00:01:37,439
exactly, but I I will describe
32
00:01:32,720 --> 00:01:40,079
exactly how it works, right? So, there's
33
00:01:37,439 --> 00:01:43,040
almost everybody in the industrialized
34
00:01:40,079 --> 00:01:45,600
world now has Wi-Fi as part of their
35
00:01:43,040 --> 00:01:47,200
home, their office, what have you. And
36
00:01:45,600 --> 00:01:52,240
we've just kind of taken that for
37
00:01:47,200 --> 00:01:56,320
granted. We've now entered the radio
38
00:01:52,240 --> 00:02:00,000
signal signals intelligence era. We are
39
00:01:56,320 --> 00:02:04,000
entering the signals intelligence era of
40
00:02:00,000 --> 00:02:06,560
cyber security. And this new technology
41
00:02:04,000 --> 00:02:07,920
is an indication. It's a it's a
42
00:02:06,560 --> 00:02:12,560
manifestation.
43
00:02:07,920 --> 00:02:14,239
of the combination of radio
44
00:02:12,560 --> 00:02:19,200
technology
45
00:02:14,239 --> 00:02:22,319
and cyber security and AI all come
46
00:02:19,200 --> 00:02:24,879
together to create something that we
47
00:02:22,319 --> 00:02:28,800
never thought we would be able to do.
48
00:02:24,879 --> 00:02:31,760
And what it is is it's the ability to
49
00:02:28,800 --> 00:02:34,000
send a Wi-Fi signal. Now Wi-Fi is simply
50
00:02:31,760 --> 00:02:36,640
a radio signal. That's all it is. You
51
00:02:34,000 --> 00:02:39,360
know, like so many things around us,
52
00:02:36,640 --> 00:02:42,000
whether it be your cell phone or your
53
00:02:39,360 --> 00:02:43,040
microwave oven or even the light that's
54
00:02:42,000 --> 00:02:46,400
around you. These are all
55
00:02:43,040 --> 00:02:49,040
electromagnetic magnetic waves. Wi-Fi is
56
00:02:46,400 --> 00:02:51,920
no different. It just is a way of using
57
00:02:49,040 --> 00:02:54,720
radio signals to transfer digital
58
00:02:51,920 --> 00:02:58,800
information. Okay? That's all it really
59
00:02:54,720 --> 00:03:01,760
is. Now we know that when there are
60
00:02:58,800 --> 00:03:06,159
radio signals or for that matter sound
61
00:03:01,760 --> 00:03:09,280
or light when it hits something right
62
00:03:06,159 --> 00:03:12,800
the the electromagnetic wave is
63
00:03:09,280 --> 00:03:14,080
scattered or refracted or absorbed.
64
00:03:12,800 --> 00:03:17,200
Those are the three things that can
65
00:03:14,080 --> 00:03:19,599
happen. Well, if it's absorbed, then you
66
00:03:17,200 --> 00:03:21,680
know, we don't really know what happened
67
00:03:19,599 --> 00:03:26,159
to it. But if it's refracted or
68
00:03:21,680 --> 00:03:28,560
reflected, we can it comes back to us.
69
00:03:26,159 --> 00:03:31,360
All right? It's like it's like eyesight.
70
00:03:28,560 --> 00:03:35,599
You know, eyesight is simply the light
71
00:03:31,360 --> 00:03:37,920
going from a it's reflecting off a
72
00:03:35,599 --> 00:03:39,680
surface and coming back to your eye.
73
00:03:37,920 --> 00:03:42,400
This is the same thing sending out the
74
00:03:39,680 --> 00:03:45,360
Wi-Fi signal and then getting the signal
75
00:03:42,400 --> 00:03:47,840
and having enough intelligence
76
00:03:45,360 --> 00:03:49,599
built into your system to be able to
77
00:03:47,840 --> 00:03:52,560
determine
78
00:03:49,599 --> 00:03:56,239
what is going on in that room. All
79
00:03:52,560 --> 00:03:59,599
right, you can by simply seeing the
80
00:03:56,239 --> 00:04:02,560
refraction and the bouncing of the radio
81
00:03:59,599 --> 00:04:04,400
waves. Now, it's been something that's
82
00:04:02,560 --> 00:04:06,879
been around, the idea has been around
83
00:04:04,400 --> 00:04:11,200
for at least 10 years, maybe longer,
84
00:04:06,879 --> 00:04:15,280
right? But right now, with the advent of
85
00:04:11,200 --> 00:04:19,199
AI in cyber security and the advent of
86
00:04:15,280 --> 00:04:20,720
AI in what I call signals intelligence,
87
00:04:19,199 --> 00:04:23,840
right,
88
00:04:20,720 --> 00:04:28,720
we can now build one of these devices
89
00:04:23,840 --> 00:04:30,320
that can see through walls, right, for
90
00:04:28,720 --> 00:04:33,440
relatively small amount. We're not
91
00:04:30,320 --> 00:04:36,960
talking about military budgets. We're
92
00:04:33,440 --> 00:04:40,080
talking about a home hobbyist budget.
93
00:04:36,960 --> 00:04:43,120
The the biggest expense in doing this is
94
00:04:40,080 --> 00:04:47,280
you have to have video card. You have to
95
00:04:43,120 --> 00:04:50,800
have a video, right? The software is to
96
00:04:47,280 --> 00:04:54,080
run on CUDA. So, so here's the system,
97
00:04:50,800 --> 00:04:58,080
right? The system simply is reading the
98
00:04:54,080 --> 00:05:01,199
the bouncing and refracting radio waves
99
00:04:58,080 --> 00:05:05,600
and then with that information is able
100
00:05:01,199 --> 00:05:08,080
to determine what is okay and what is a
101
00:05:05,600 --> 00:05:10,800
wall, what's a piece of furniture,
102
00:05:08,080 --> 00:05:13,840
what's animate, what's not animate and
103
00:05:10,800 --> 00:05:18,639
then with that information can actually
104
00:05:13,840 --> 00:05:21,440
display the outlines of the body as it's
105
00:05:18,639 --> 00:05:23,199
moving in real time. the this the
106
00:05:21,440 --> 00:05:26,000
scientists who developed this, the
107
00:05:23,199 --> 00:05:30,240
researchers who developed it tried to
108
00:05:26,000 --> 00:05:33,360
pass it off as a privacy.
109
00:05:30,240 --> 00:05:37,520
It's a privacy issue. It's like no, this
110
00:05:33,360 --> 00:05:40,400
is an anti- privacy issue.
111
00:05:37,520 --> 00:05:43,039
It's a it's a spy device, right? That's
112
00:05:40,400 --> 00:05:44,960
what it is. It's not it's not a privacy
113
00:05:43,039 --> 00:05:48,160
thing. It's a spy device. It's
114
00:05:44,960 --> 00:05:51,120
anti-privacy. And so
115
00:05:48,160 --> 00:05:54,800
the the important point here is that it
116
00:05:51,120 --> 00:05:59,520
will be used by law enforcement. It will
117
00:05:54,800 --> 00:06:03,039
be used by military intelligence. It
118
00:05:59,520 --> 00:06:05,440
will be used by bad guys. Right? That's
119
00:06:03,039 --> 00:06:07,600
the truth with no matter what technology
120
00:06:05,440 --> 00:06:10,639
you're talking about. And so it's
121
00:06:07,600 --> 00:06:13,120
important I think to one to understand
122
00:06:10,639 --> 00:06:15,759
what what's going on here, right? What
123
00:06:13,120 --> 00:06:19,840
is actually happening? what's possible,
124
00:06:15,759 --> 00:06:22,160
right? And possibly how you can protect
125
00:06:19,840 --> 00:06:22,560
yourself from this type of spy,
126
00:06:22,160 --> 00:06:25,840
>> right?
127
00:06:22,560 --> 00:06:28,880
>> And so at at Hackers Rise, we're we're
128
00:06:25,840 --> 00:06:32,400
working on building one of these devices
129
00:06:28,880 --> 00:06:36,319
and we will hopefully demonstrate it
130
00:06:32,400 --> 00:06:38,560
soon uh and have a course on it as well.
131
00:06:36,319 --> 00:06:41,759
But yeah, it's it's basically what this
132
00:06:38,560 --> 00:06:44,240
is. We we need something to send and
133
00:06:41,759 --> 00:06:46,000
receive radio waves. That's what we
134
00:06:44,240 --> 00:06:50,000
need, right? And that's what these
135
00:06:46,000 --> 00:06:52,560
lowcost SDRs are. Okay? The cheapest
136
00:06:50,000 --> 00:06:55,919
ones can't send a signal, but they can
137
00:06:52,560 --> 00:06:59,120
receive a signal. And so, in some cases,
138
00:06:55,919 --> 00:07:01,759
if you're using the Wi-Fi that's already
139
00:06:59,120 --> 00:07:03,520
in the room, then that's adequate,
140
00:07:01,759 --> 00:07:05,599
right? Because the Wi-Fi is sending out
141
00:07:03,520 --> 00:07:08,560
the radio signal. You're just receiving
142
00:07:05,599 --> 00:07:12,160
the radio signal. But it's also possible
143
00:07:08,560 --> 00:07:15,599
to send the Wi-Fi out, you know, not
144
00:07:12,160 --> 00:07:17,599
using it for any purpose other than
145
00:07:15,599 --> 00:07:21,039
trying to see what's inside the room to
146
00:07:17,599 --> 00:07:24,240
send a powerful signal through the wall.
147
00:07:21,039 --> 00:07:28,400
Okay? It strikes the objects in the room
148
00:07:24,240 --> 00:07:32,560
and then reflects back to an AI that can
149
00:07:28,400 --> 00:07:36,000
read that data and reconstruct figures
150
00:07:32,560 --> 00:07:40,800
in real time. Right? So that's what is
151
00:07:36,000 --> 00:07:42,479
necessary to do it and you need a Nvidia
152
00:07:40,800 --> 00:07:45,599
card
153
00:07:42,479 --> 00:07:48,479
and you need a piece of software, right?
154
00:07:45,599 --> 00:07:50,639
It's called Dense Pose. I will uh I'll
155
00:07:48,479 --> 00:07:53,680
put it up on the screen for you. Okay,
156
00:07:50,639 --> 00:07:58,319
this is Dense Pose, right? It was a it's
157
00:07:53,680 --> 00:08:01,680
it's basically a an AI system, right?
158
00:07:58,319 --> 00:08:03,840
that takes signals and converts them
159
00:08:01,680 --> 00:08:07,840
into
160
00:08:03,840 --> 00:08:12,000
body forms. All right? And and so this
161
00:08:07,840 --> 00:08:14,639
is a it's all open source. And so this
162
00:08:12,000 --> 00:08:16,800
is the software end of it. The hardware
163
00:08:14,639 --> 00:08:18,720
end is there's two elements. You got to
164
00:08:16,800 --> 00:08:20,800
have a computer obviously. Then you have
165
00:08:18,720 --> 00:08:22,639
to have an SDR, right, to be able to
166
00:08:20,800 --> 00:08:26,560
send and receive the signals.
167
00:08:22,639 --> 00:08:29,919
>> And then you need um this software,
168
00:08:26,560 --> 00:08:34,159
right? And once you have that, then it's
169
00:08:29,919 --> 00:08:36,479
possible to build a device that can see
170
00:08:34,159 --> 00:08:39,200
through walls. Now, there's some
171
00:08:36,479 --> 00:08:42,399
limitations of a device like this. And
172
00:08:39,200 --> 00:08:45,040
one of the limitations is that Wi-Fi as
173
00:08:42,399 --> 00:08:49,120
it's specified throughout the
174
00:08:45,040 --> 00:08:52,480
industrialized world is limited to
175
00:08:49,120 --> 00:08:53,680
between a half a watt to one watt.
176
00:08:52,480 --> 00:08:56,320
Right?
177
00:08:53,680 --> 00:08:58,640
And so that's why we have ranges,
178
00:08:56,320 --> 00:09:02,800
limited ranges of Wi-Fi that are only
179
00:08:58,640 --> 00:09:06,000
like a 100 meters, right? So Wi-Fi in
180
00:09:02,800 --> 00:09:09,600
the US is limited to a half a watt by
181
00:09:06,000 --> 00:09:12,800
the FCC. But that doesn't mean that
182
00:09:09,600 --> 00:09:16,320
somebody couldn't build a Wii device
183
00:09:12,800 --> 00:09:19,279
that even put out more power, had a
184
00:09:16,320 --> 00:09:22,320
directional antenna. So, it's putting
185
00:09:19,279 --> 00:09:26,000
out the Wi-Fi at a higher power in one
186
00:09:22,320 --> 00:09:28,560
direction. Its ability to see it through
187
00:09:26,000 --> 00:09:31,519
walls will be enhanced,
188
00:09:28,560 --> 00:09:34,320
right? It can see further than the 100
189
00:09:31,519 --> 00:09:36,720
meters. There's a lot of things that we
190
00:09:34,320 --> 00:09:40,560
need to consider in this, right? And
191
00:09:36,720 --> 00:09:43,839
that this can be used for malicious and
192
00:09:40,560 --> 00:09:47,839
nefarious purposes. And it certainly,
193
00:09:43,839 --> 00:09:49,920
you know, it has all of the makings of a
194
00:09:47,839 --> 00:09:51,839
2025 spy device.
195
00:09:49,920 --> 00:09:53,839
>> Spy device.
196
00:09:51,839 --> 00:09:55,519
>> It It definitely looks like a spy device
197
00:09:53,839 --> 00:09:58,399
to me.
198
00:09:55,519 --> 00:10:00,959
Uh, but I should tell you that there's a
199
00:09:58,399 --> 00:10:03,839
commercial company out there that makes
200
00:10:00,959 --> 00:10:06,560
home security systems based upon this.
201
00:10:03,839 --> 00:10:08,880
And so what they've done is that they've
202
00:10:06,560 --> 00:10:12,880
built a home security system based on
203
00:10:08,880 --> 00:10:16,480
this. And then they can determine if
204
00:10:12,880 --> 00:10:19,279
there is a motion within the room that
205
00:10:16,480 --> 00:10:22,560
shouldn't be there, right? It takes like
206
00:10:19,279 --> 00:10:25,839
a fingerprint of all of the people and
207
00:10:22,560 --> 00:10:28,079
devices in the room. And so if a new
208
00:10:25,839 --> 00:10:31,920
person comes in, it can tell that
209
00:10:28,079 --> 00:10:34,560
there's a new person in the room. If the
210
00:10:31,920 --> 00:10:36,720
a dog comes into the room, it knows it's
211
00:10:34,560 --> 00:10:39,200
a dog.
212
00:10:36,720 --> 00:10:42,800
If a picture falls off the wall, it's
213
00:10:39,200 --> 00:10:45,279
not an emergency. It it's can to be that
214
00:10:42,800 --> 00:10:47,680
intelligent, right? And so this is the
215
00:10:45,279 --> 00:10:50,079
first commercial application I've seen
216
00:10:47,680 --> 00:10:52,079
of it is security system. So the
217
00:10:50,079 --> 00:10:53,920
original researchers were saying, well,
218
00:10:52,079 --> 00:10:55,839
this is going to be a privacy device.
219
00:10:53,920 --> 00:10:58,000
You know, I can't buy that at all. It's
220
00:10:55,839 --> 00:11:01,680
not a privacy device. It's an it's an
221
00:10:58,000 --> 00:11:05,600
anti-privacy device. But there are some
222
00:11:01,680 --> 00:11:08,000
commercial applications that aren't spy
223
00:11:05,600 --> 00:11:10,399
devices like home security systems,
224
00:11:08,000 --> 00:11:14,880
right? That'd be one application.
225
00:11:10,399 --> 00:11:18,480
Another application would be using it to
226
00:11:14,880 --> 00:11:21,120
monitor old people, right? So using
227
00:11:18,480 --> 00:11:24,079
Wi-Fi, you could create a picture of
228
00:11:21,120 --> 00:11:27,120
their face, okay? and their breathing
229
00:11:24,079 --> 00:11:29,519
and then say okay this is this person's
230
00:11:27,120 --> 00:11:32,160
doing okay because the breathing is you
231
00:11:29,519 --> 00:11:35,519
know is deep and it's at a certain rate
232
00:11:32,160 --> 00:11:37,760
per minute and if it varies from that
233
00:11:35,519 --> 00:11:39,839
then we have an emergency and we need to
234
00:11:37,760 --> 00:11:43,040
take care of this. So these are ways
235
00:11:39,839 --> 00:11:44,560
that it can be used um in commercial
236
00:11:43,040 --> 00:11:47,680
applications.
237
00:11:44,560 --> 00:11:52,320
Um and of course you know we're talking
238
00:11:47,680 --> 00:11:55,279
about wifi here. All right. So Wi-Fi is
239
00:11:52,320 --> 00:11:57,360
that is that everywhere but it could be
240
00:11:55,279 --> 00:11:59,760
used other not just Wi-Fi. This
241
00:11:57,360 --> 00:12:02,640
technology is not limited by Wi-Fi.
242
00:11:59,760 --> 00:12:06,000
Right. Wi-Fi is just the most convenient
243
00:12:02,640 --> 00:12:08,399
and it's in every home. Well I should
244
00:12:06,000 --> 00:12:10,959
put it. It's in every industrialized
245
00:12:08,399 --> 00:12:13,760
nearly every industrialized um
246
00:12:10,959 --> 00:12:15,920
>> hall industrialized country's homes. So
247
00:12:13,760 --> 00:12:18,320
it can be used for that purpose. You
248
00:12:15,920 --> 00:12:20,959
know the the attacker doesn't have to
249
00:12:18,320 --> 00:12:23,600
bring in their own signal. The signal is
250
00:12:20,959 --> 00:12:25,920
being generated inside your home and all
251
00:12:23,600 --> 00:12:29,120
they're doing is reading the signal.
252
00:12:25,920 --> 00:12:32,160
Yeah. And that gives them access to
253
00:12:29,120 --> 00:12:33,200
everything that's going on inside of
254
00:12:32,160 --> 00:12:35,040
that room.
255
00:12:33,200 --> 00:12:38,240
>> Yeah. Now, it could be much more
256
00:12:35,040 --> 00:12:41,279
nefarious and use different signals, a
257
00:12:38,240 --> 00:12:43,360
higher um frequency signal. A higher
258
00:12:41,279 --> 00:12:46,240
frequency is going to get you much
259
00:12:43,360 --> 00:12:48,480
greater resolution. So, the the images
260
00:12:46,240 --> 00:12:51,360
that you'll see that have been generated
261
00:12:48,480 --> 00:12:52,800
with this technology, they're nice human
262
00:12:51,360 --> 00:12:55,040
figures. You can tell that they're
263
00:12:52,800 --> 00:12:58,480
human, but you can't really tell facial
264
00:12:55,040 --> 00:13:01,760
features and what have you. with with
265
00:12:58,480 --> 00:13:04,959
higher frequency signals, you would get
266
00:13:01,760 --> 00:13:08,160
really good resolution. So that once
267
00:13:04,959 --> 00:13:11,360
again, this could be used as a spy
268
00:13:08,160 --> 00:13:13,680
weapon that can see through walls.
269
00:13:11,360 --> 00:13:16,480
Maybe, you know, law enforcement uses it
270
00:13:13,680 --> 00:13:19,760
to be able to see who's inside the house
271
00:13:16,480 --> 00:13:21,360
before they break in or what. Yeah,
272
00:13:19,760 --> 00:13:22,720
>> it's kind of like it's kind of like an
273
00:13:21,360 --> 00:13:25,839
X-ray.
274
00:13:22,720 --> 00:13:29,440
>> Okay. But it's much more it has much
275
00:13:25,839 --> 00:13:33,040
more um a resolution than an X-ray does
276
00:13:29,440 --> 00:13:34,880
and it's it's it's more like an MRI
277
00:13:33,040 --> 00:13:37,360
might be the best way to think of it.
278
00:13:34,880 --> 00:13:40,240
It's more like an MRI
279
00:13:37,360 --> 00:13:44,079
of a room. They're taking an MRI of a
280
00:13:40,240 --> 00:13:47,600
room and and and basically seeing how
281
00:13:44,079 --> 00:13:49,440
the radio are refracted or reflect.
282
00:13:47,600 --> 00:13:51,680
That's what an MRI does too, by the way.
283
00:13:49,440 --> 00:13:53,600
But it's the same electromagnetic
284
00:13:51,680 --> 00:13:55,440
technology
285
00:13:53,600 --> 00:13:57,440
um but much more powerful, much more
286
00:13:55,440 --> 00:13:58,959
sensitive. What we're talking about is
287
00:13:57,440 --> 00:14:01,600
offtheshelf
288
00:13:58,959 --> 00:14:03,519
parts, a regular computer, an Nvidia
289
00:14:01,600 --> 00:14:04,399
graphics card, and some open source
290
00:14:03,519 --> 00:14:06,160
software.
291
00:14:04,399 --> 00:14:07,199
>> You have yourself you have yourself a
292
00:14:06,160 --> 00:14:10,560
spy device.
293
00:14:07,199 --> 00:14:14,560
>> Yeah. So, so OTW, if I'm thinking it, I
294
00:14:10,560 --> 00:14:17,120
work. So, we know that um WiFi signals
295
00:14:14,560 --> 00:14:20,160
don't stop at the walls. They penetrate
296
00:14:17,120 --> 00:14:23,440
they reflect bounce of objects including
297
00:14:20,160 --> 00:14:26,959
human. So say when a human is moves in a
298
00:14:23,440 --> 00:14:30,800
room their body disrupt the Wi-Fi signal
299
00:14:26,959 --> 00:14:34,160
and in a predictable way let's say and
300
00:14:30,800 --> 00:14:38,320
with the right tools like you say an SDR
301
00:14:34,160 --> 00:14:42,160
of course a computer Nvidia um uh card
302
00:14:38,320 --> 00:14:47,120
you can capture those distortions and
303
00:14:42,160 --> 00:14:49,839
reconstruct I don't know 2D 3D
304
00:14:47,120 --> 00:14:51,279
representation of the 3D 3D
305
00:14:49,839 --> 00:14:54,079
>> yes 3D
306
00:14:51,279 --> 00:14:56,160
Yep. This this is 3D software and it
307
00:14:54,079 --> 00:15:01,199
does require the Nvidia card because the
308
00:14:56,160 --> 00:15:03,360
Nvidia card has built into it CUDA and
309
00:15:01,199 --> 00:15:05,760
for those for let's maybe back up a
310
00:15:03,360 --> 00:15:09,040
little bit. People know Nvidia, right? I
311
00:15:05,760 --> 00:15:11,680
think now of the AI company, right? They
312
00:15:09,040 --> 00:15:13,600
make the CPUs, the GPUs that are used
313
00:15:11,680 --> 00:15:16,160
for AI, but they've been they've been
314
00:15:13,600 --> 00:15:17,680
around for a long time for oh, let's see
315
00:15:16,160 --> 00:15:19,680
22
316
00:15:17,680 --> 00:15:22,720
years, I believe. 22 years they've been
317
00:15:19,680 --> 00:15:26,079
around and during those 22 years they
318
00:15:22,720 --> 00:15:29,680
basically have been making GPUs,
319
00:15:26,079 --> 00:15:32,000
graphics processing units, right, that
320
00:15:29,680 --> 00:15:34,000
are a little bit different than CPUs.
321
00:15:32,000 --> 00:15:36,639
They're they're basically they're
322
00:15:34,000 --> 00:15:39,199
simpler devices that basically do
323
00:15:36,639 --> 00:15:41,600
calculations and they move polygons very
324
00:15:39,199 --> 00:15:43,279
very rapidly, right? And they've made a
325
00:15:41,600 --> 00:15:45,199
business out of that for years and years
326
00:15:43,279 --> 00:15:47,199
and years. They've done very well for
327
00:15:45,199 --> 00:15:48,800
themselves. But the reason they've done
328
00:15:47,199 --> 00:15:50,880
so well for themselves is because they
329
00:15:48,800 --> 00:15:54,079
developed essentially an operating
330
00:15:50,880 --> 00:15:59,519
system called CUDA, right? And a lot of
331
00:15:54,079 --> 00:16:01,920
the AI the AI applications run on CUDA.
332
00:15:59,519 --> 00:16:03,920
This is an example here. Okay, this one
333
00:16:01,920 --> 00:16:08,800
we're talking about there's another one
334
00:16:03,920 --> 00:16:12,399
that dens developed on Nvidia because of
335
00:16:08,800 --> 00:16:16,240
CUDA, right? And this is why this is why
336
00:16:12,399 --> 00:16:18,240
Nvidia is the leader in in making I
337
00:16:16,240 --> 00:16:20,800
guess they're almost a they're four
338
00:16:18,240 --> 00:16:24,079
trillion dollar company. They're bigger
339
00:16:20,800 --> 00:16:25,839
than a lot of countries and and the
340
00:16:24,079 --> 00:16:29,279
reason is because they're make they made
341
00:16:25,839 --> 00:16:32,959
these these GPUs with CUDA and this
342
00:16:29,279 --> 00:16:34,560
application requires that right this is
343
00:16:32,959 --> 00:16:36,880
why they're doing so well. Of course,
344
00:16:34,560 --> 00:16:40,320
the higherend applications
345
00:16:36,880 --> 00:16:42,480
um require entire server farms full of
346
00:16:40,320 --> 00:16:45,440
GPUs
347
00:16:42,480 --> 00:16:48,959
and enough power to power an entire
348
00:16:45,440 --> 00:16:51,680
city. That's why we're starting to see
349
00:16:48,959 --> 00:16:53,440
um power plant uh nuclear power plants
350
00:16:51,680 --> 00:16:55,519
come back online in the United States,
351
00:16:53,440 --> 00:16:56,959
the ones that have been retired. And
352
00:16:55,519 --> 00:16:59,360
we're going to see this other places too
353
00:16:56,959 --> 00:17:01,199
because one of the things that's that I
354
00:16:59,360 --> 00:17:05,439
don't know that the general public is
355
00:17:01,199 --> 00:17:10,319
thinking about but the AI revolution is
356
00:17:05,439 --> 00:17:15,520
going to suck up a huge amount of energy
357
00:17:10,319 --> 00:17:17,839
a huge amount of energy and and so
358
00:17:15,520 --> 00:17:20,400
we have to see what does how impact
359
00:17:17,839 --> 00:17:23,760
that's going to have on on nations and
360
00:17:20,400 --> 00:17:28,400
energy security. I mean it might be that
361
00:17:23,760 --> 00:17:32,080
the AI uses you know all the energy
362
00:17:28,400 --> 00:17:34,320
and leaves and leaves us with none.
363
00:17:32,080 --> 00:17:36,320
Microsoft a few months back bought
364
00:17:34,320 --> 00:17:39,039
themselves a nuclear power plant. That's
365
00:17:36,320 --> 00:17:42,000
how much energy is being used. They
366
00:17:39,039 --> 00:17:45,840
bought themselves a nuclear power plant.
367
00:17:42,000 --> 00:17:49,039
But I'm not one to denigrate AI. I've
368
00:17:45,840 --> 00:17:52,000
been waiting for AI all my life.
369
00:17:49,039 --> 00:17:53,919
Literally all my life. like when's AI
370
00:17:52,000 --> 00:17:56,720
gonna come? When's AI gonna come? And
371
00:17:53,919 --> 00:18:00,640
it's here. And I think that we all need
372
00:17:56,720 --> 00:18:03,520
to embrace that it's here. Um, and I
373
00:18:00,640 --> 00:18:06,080
think as far as cyber security jobs,
374
00:18:03,520 --> 00:18:10,960
which is a question I get all the time,
375
00:18:06,080 --> 00:18:14,240
the answer is learn to integrate AI into
376
00:18:10,960 --> 00:18:17,360
your work. Okay? Learn to integrate AI
377
00:18:14,240 --> 00:18:18,960
into what you do every day. And if you
378
00:18:17,360 --> 00:18:20,880
do that, you you're not going to be out
379
00:18:18,960 --> 00:18:22,559
of work. You're gonna have a job. You're
380
00:18:20,880 --> 00:18:24,720
gonna have lots of jobs. You're gonna
381
00:18:22,559 --> 00:18:26,799
have high paying jobs.
382
00:18:24,720 --> 00:18:30,080
>> The person the person who doesn't do
383
00:18:26,799 --> 00:18:32,000
that is may be unemployed, right? They
384
00:18:30,080 --> 00:18:34,400
may be unemployed if they can't
385
00:18:32,000 --> 00:18:36,799
integrate AI into everything that they
386
00:18:34,400 --> 00:18:39,520
do. Here's just excellent. I just love
387
00:18:36,799 --> 00:18:41,919
this this device, this technology,
388
00:18:39,520 --> 00:18:45,200
because it it combines two of my
389
00:18:41,919 --> 00:18:46,720
favorite subjects, which is radio
390
00:18:45,200 --> 00:18:50,080
hacking
391
00:18:46,720 --> 00:18:52,720
with AI. And so what could get better
392
00:18:50,080 --> 00:18:54,799
than that, right? AI and radio hacking.
393
00:18:52,720 --> 00:18:56,640
So, so let's, you know, look for this
394
00:18:54,799 --> 00:18:59,039
from us. I I wrote a little article on
395
00:18:56,640 --> 00:19:01,280
hackers rise a week ago or so and hard
396
00:18:59,039 --> 00:19:05,360
to explain what's involved and we'll be
397
00:19:01,280 --> 00:19:07,679
pursuing this in the very near future.
398
00:19:05,360 --> 00:19:09,919
>> So, so OTW, I have a question from
399
00:19:07,679 --> 00:19:12,400
defense point of view because now as you
400
00:19:09,919 --> 00:19:16,240
said, this is a spy device, right?
401
00:19:12,400 --> 00:19:18,880
Everyone can uh do it. So what are the
402
00:19:16,240 --> 00:19:22,880
counter measures that people or
403
00:19:18,880 --> 00:19:26,400
organization can do to block to block
404
00:19:22,880 --> 00:19:29,280
such attempts is jamming is is one of
405
00:19:26,400 --> 00:19:29,679
the tactics or it will not help in this
406
00:19:29,280 --> 00:19:32,000
uh
407
00:19:29,679 --> 00:19:34,720
>> well let's let's talk about simple the
408
00:19:32,000 --> 00:19:37,440
simple measures first
409
00:19:34,720 --> 00:19:42,880
you know the the the if you were trying
410
00:19:37,440 --> 00:19:44,640
to have your own Wi-Fi signal not used
411
00:19:42,880 --> 00:19:47,440
could turn it down you could turn down
412
00:19:44,640 --> 00:19:49,120
the power on your Wi-Fi. That's not
413
00:19:47,440 --> 00:19:51,360
convenient, though. Nobody likes that
414
00:19:49,120 --> 00:19:53,120
because then I can't reach it in in
415
00:19:51,360 --> 00:19:54,480
different parts of the office or the
416
00:19:53,120 --> 00:19:58,480
home or the school or wherever you're
417
00:19:54,480 --> 00:20:01,360
at. But that's an obvious possible uh
418
00:19:58,480 --> 00:20:06,320
solution. Of course, you could also use
419
00:20:01,360 --> 00:20:09,919
um Ethernet, just skip the Wi-Fi, right?
420
00:20:06,320 --> 00:20:14,240
and and so far
421
00:20:09,919 --> 00:20:16,960
this technology has only been refined.
422
00:20:14,240 --> 00:20:19,679
It's not it's possible with any radio
423
00:20:16,960 --> 00:20:23,120
signal, but you could also use Bluetooth
424
00:20:19,679 --> 00:20:26,320
instead of Wi-Fi. I mean, Bluetooth is
425
00:20:23,120 --> 00:20:28,159
quite as fast, but it'll it'll do,
426
00:20:26,320 --> 00:20:31,039
right? So, like for instance, you could
427
00:20:28,159 --> 00:20:32,720
the way you tether your phone by
428
00:20:31,039 --> 00:20:35,120
Bluetooth, right? You can do that. You
429
00:20:32,720 --> 00:20:36,000
can send those signals and data that
430
00:20:35,120 --> 00:20:39,120
way.
431
00:20:36,000 --> 00:20:42,559
And then you could also try to block the
432
00:20:39,120 --> 00:20:45,679
signal, right? And that would be to put
433
00:20:42,559 --> 00:20:48,080
some dense objects between the outer
434
00:20:45,679 --> 00:20:51,039
wall and you, whatever that happened to
435
00:20:48,080 --> 00:20:53,039
be. I mean, if it's a if it's a 10-in
436
00:20:51,039 --> 00:20:54,960
concrete wall, there's probably not
437
00:20:53,039 --> 00:20:58,320
going to be any signals emanating
438
00:20:54,960 --> 00:21:00,000
through it, right? But we can't all do
439
00:20:58,320 --> 00:21:03,280
those things, right? For a lot of
440
00:21:00,000 --> 00:21:05,679
people, just those are not um practical
441
00:21:03,280 --> 00:21:07,360
ways. I mean you could always put in you
442
00:21:05,679 --> 00:21:10,240
could always you know enclose your
443
00:21:07,360 --> 00:21:14,559
entire house in lead
444
00:21:10,240 --> 00:21:17,280
you know that's as you know a lot of the
445
00:21:14,559 --> 00:21:22,480
highly confidential facilities in the
446
00:21:17,280 --> 00:21:25,760
military and is they have lead line
447
00:21:22,480 --> 00:21:27,679
walls all the way around right bec
448
00:21:25,760 --> 00:21:31,039
because why do they do that doesn't
449
00:21:27,679 --> 00:21:33,039
allow any signals to emanate out through
450
00:21:31,039 --> 00:21:35,600
that you can't get a cell phone signal
451
00:21:33,039 --> 00:21:39,600
out you can't get Wi-Fi out. Once again,
452
00:21:35,600 --> 00:21:43,039
you know, if you were in a in a a state
453
00:21:39,600 --> 00:21:44,559
sponsored type of of circumstance,
454
00:21:43,039 --> 00:21:46,880
that's what you would do. You would go
455
00:21:44,559 --> 00:21:49,520
ahead and build yourself a facility
456
00:21:46,880 --> 00:21:53,280
where there was very dense material with
457
00:21:49,520 --> 00:21:55,760
lead being the densest, right? Is build
458
00:21:53,280 --> 00:21:58,799
with leadline walls so that the signal
459
00:21:55,760 --> 00:22:00,640
can't leave. But, you know, that's for
460
00:21:58,799 --> 00:22:03,039
state sponsored. That's not for you and
461
00:22:00,640 --> 00:22:04,400
I. you know, the best the best thing
462
00:22:03,039 --> 00:22:05,760
that we might be able to do is turn our
463
00:22:04,400 --> 00:22:08,320
signal down
464
00:22:05,760 --> 00:22:10,880
>> or put large objects there.
465
00:22:08,320 --> 00:22:14,640
>> Um, the other thing you mentioned is is
466
00:22:10,880 --> 00:22:16,880
basically jamming. And jamming is a
467
00:22:14,640 --> 00:22:19,919
possibility. It's not easy. It's
468
00:22:16,880 --> 00:22:22,960
something that we do in our advanced SDR
469
00:22:19,919 --> 00:22:26,559
class is we we work at jamming different
470
00:22:22,960 --> 00:22:30,880
signals. And one of the problems with
471
00:22:26,559 --> 00:22:36,240
jamming wifi and in Bluetooth is that
472
00:22:30,880 --> 00:22:39,440
they use a um a spectrum skipping
473
00:22:36,240 --> 00:22:42,159
technology. So they go and they skip
474
00:22:39,440 --> 00:22:45,039
through various frequencies. They send a
475
00:22:42,159 --> 00:22:46,640
message on one frequency. That's the
476
00:22:45,039 --> 00:22:48,400
beginning of the message. And then the
477
00:22:46,640 --> 00:22:50,559
second part of the message goes into a
478
00:22:48,400 --> 00:22:52,320
second frequency. And then the third
479
00:22:50,559 --> 00:22:56,960
part of the message goes to a third
480
00:22:52,320 --> 00:22:59,520
frequency. So you have to know what the
481
00:22:56,960 --> 00:23:02,640
algorithm is that's determining what
482
00:22:59,520 --> 00:23:04,480
frequency the message is on. Okay? And
483
00:23:02,640 --> 00:23:10,080
that's what's called spread spectrum
484
00:23:04,480 --> 00:23:13,200
technology. And that is a good strategy.
485
00:23:10,080 --> 00:23:14,720
But if I can figure out the algorithm,
486
00:23:13,200 --> 00:23:17,679
okay, if I can figure out the algorithm
487
00:23:14,720 --> 00:23:20,640
you're using, then I can break that type
488
00:23:17,679 --> 00:23:23,120
of encryption. the the pro the the issue
489
00:23:20,640 --> 00:23:25,760
with say Bluetooth low energy is it's
490
00:23:23,120 --> 00:23:28,720
pretty easy to break it right and we can
491
00:23:25,760 --> 00:23:32,159
break it Wi-Fi is a little bit more
492
00:23:28,720 --> 00:23:37,120
difficult because there is an element of
493
00:23:32,159 --> 00:23:39,280
randomness okay in the algorithm and so
494
00:23:37,120 --> 00:23:41,360
predicting that randomness becomes very
495
00:23:39,280 --> 00:23:45,280
difficult by definition predicting
496
00:23:41,360 --> 00:23:47,520
randomness is difficult
497
00:23:45,280 --> 00:23:50,159
you you can't predict randomness
498
00:23:47,520 --> 00:23:52,559
>> so okay W you you mentioned that you are
499
00:23:50,159 --> 00:23:54,240
working on such a device while you were
500
00:23:52,559 --> 00:23:56,400
talking
501
00:23:54,240 --> 00:24:00,159
presented here on the screen the the
502
00:23:56,400 --> 00:24:04,240
article you wrote in a rise and we'll
503
00:24:00,159 --> 00:24:08,720
put it now again plus we did multiple
504
00:24:04,240 --> 00:24:11,360
videos on SDR eching which are now on
505
00:24:08,720 --> 00:24:13,919
the screen as well but are you going to
506
00:24:11,360 --> 00:24:15,600
build a course around it?
507
00:24:13,919 --> 00:24:19,840
>> Yes, we're going to build a course
508
00:24:15,600 --> 00:24:22,559
around this. Um, we have a Wi-Fi hacking
509
00:24:19,840 --> 00:24:23,919
course coming up uh in a couple weeks
510
00:24:22,559 --> 00:24:25,679
probably by the time this video is
511
00:24:23,919 --> 00:24:28,080
showing and we're going to include
512
00:24:25,679 --> 00:24:30,159
elements of this in that course. We
513
00:24:28,080 --> 00:24:32,320
won't actually build the device, but we
514
00:24:30,159 --> 00:24:35,200
will teach how it works and how to build
515
00:24:32,320 --> 00:24:36,880
it. Not actually because there's too we
516
00:24:35,200 --> 00:24:38,720
have too many areas to cover in the
517
00:24:36,880 --> 00:24:40,400
Wi-Fi hacking course. And we're also
518
00:24:38,720 --> 00:24:42,880
going to be covering the nearest
519
00:24:40,400 --> 00:24:46,480
neighbor attack. Um, that's the attack
520
00:24:42,880 --> 00:24:50,559
that the Russians used to attack inside
521
00:24:46,480 --> 00:24:53,600
of the United States where they went and
522
00:24:50,559 --> 00:24:57,440
compromised a system in Washington DC
523
00:24:53,600 --> 00:25:00,720
and then use the systems Wi-Fi to attack
524
00:24:57,440 --> 00:25:02,320
the neighbor, right? They attacked the
525
00:25:00,720 --> 00:25:04,799
neighbor that way to get some
526
00:25:02,320 --> 00:25:07,600
information uh from the US government.
527
00:25:04,799 --> 00:25:11,120
So we'll be working on that as well as
528
00:25:07,600 --> 00:25:14,000
you know WPA3 and WPA2
529
00:25:11,120 --> 00:25:16,000
and all the different types of we attack
530
00:25:14,000 --> 00:25:17,679
the old old web. So we got a lot of
531
00:25:16,000 --> 00:25:20,799
material we're trying to cover in terms
532
00:25:17,679 --> 00:25:24,640
of you know evil twin attacks and rogue
533
00:25:20,799 --> 00:25:27,840
access attacks. So rogue APS. So we're
534
00:25:24,640 --> 00:25:29,840
going to introduce this that class and
535
00:25:27,840 --> 00:25:31,919
show people a bit about it, but then we
536
00:25:29,840 --> 00:25:34,960
will build a separate class that's just
537
00:25:31,919 --> 00:25:39,360
on this subject as part of our SDR
538
00:25:34,960 --> 00:25:41,840
signal intelligence um uh program where
539
00:25:39,360 --> 00:25:45,600
no we are
540
00:25:41,840 --> 00:25:48,880
next year we also have two courses on
541
00:25:45,600 --> 00:25:51,200
mobile hacking with SDR. So, next year
542
00:25:48,880 --> 00:25:52,960
is going to be a big year in new devices
543
00:25:51,200 --> 00:25:56,799
that we'll be putting through. And you
544
00:25:52,960 --> 00:25:58,720
and I did a video on the uh on how the
545
00:25:56,799 --> 00:26:00,320
Mexican cartels built their own private
546
00:25:58,720 --> 00:26:02,640
cell system. Well, we'll be doing that
547
00:26:00,320 --> 00:26:05,679
next year as well. So, we'll be building
548
00:26:02,640 --> 00:26:08,799
showing you or we'll building in class a
549
00:26:05,679 --> 00:26:11,440
private cell system, right? So, look for
550
00:26:08,799 --> 00:26:13,120
that. That's probably about mid
551
00:26:11,440 --> 00:26:15,279
>> 2026.
552
00:26:13,120 --> 00:26:18,559
um somewhere around there early late
553
00:26:15,279 --> 00:26:20,480
spring summer of 2026 we'll squeeze it
554
00:26:18,559 --> 00:26:22,480
in there. So yeah, we got we got a lot
555
00:26:20,480 --> 00:26:24,400
of stuff going on in that field in at
556
00:26:22,480 --> 00:26:26,400
hackers. This is one of them. This is
557
00:26:24,400 --> 00:26:28,400
one of those things that's that's
558
00:26:26,400 --> 00:26:30,640
definitely a signals intelligence
559
00:26:28,400 --> 00:26:32,480
application and I'm pretty excited about
560
00:26:30,640 --> 00:26:35,760
it. I think it's it has a lot of
561
00:26:32,480 --> 00:26:37,919
applications, some good and some bad,
562
00:26:35,760 --> 00:26:40,080
but but you will know how they work and
563
00:26:37,919 --> 00:26:42,880
you will know how to build one.
564
00:26:40,080 --> 00:26:45,600
>> I agree. And this is cool. And I see the
565
00:26:42,880 --> 00:26:48,400
how the community is growing around SDR.
566
00:26:45,600 --> 00:26:51,200
I see much much more people are really
567
00:26:48,400 --> 00:26:53,600
interested in uh that asking a lot of
568
00:26:51,200 --> 00:26:57,919
question. So it's great opportunity for
569
00:26:53,600 --> 00:27:01,120
everyone. Derise are you know spending
570
00:26:57,919 --> 00:27:04,480
their courses and knowledge to to
571
00:27:01,120 --> 00:27:08,640
everyone. It shows out the technology uh
572
00:27:04,480 --> 00:27:12,799
moved forward so much and you know it
573
00:27:08,640 --> 00:27:14,559
raised also many questions like privacy
574
00:27:12,799 --> 00:27:19,679
like
575
00:27:14,559 --> 00:27:23,520
um privacy spy spy you know spyware or
576
00:27:19,679 --> 00:27:25,440
surveillance I will say and um
577
00:27:23,520 --> 00:27:27,360
definitely very insightful
578
00:27:25,440 --> 00:27:30,400
>> you know this came out a couple of years
579
00:27:27,360 --> 00:27:32,559
ago you know and so it's it's been out
580
00:27:30,400 --> 00:27:34,880
there But I don't think people have
581
00:27:32,559 --> 00:27:38,640
really like clicked on it like, "Oh,
582
00:27:34,880 --> 00:27:42,080
this could change so many things. This
583
00:27:38,640 --> 00:27:47,279
is this is like a gamechanging
584
00:27:42,080 --> 00:27:48,799
technology for spies, right? For whoever
585
00:27:47,279 --> 00:27:50,960
whoever's going to use it, it's going to
586
00:27:48,799 --> 00:27:54,000
be gamechanging." So, and I'd be
587
00:27:50,960 --> 00:27:57,200
interested to see how how what distance
588
00:27:54,000 --> 00:28:00,799
we could extend it to with more high
589
00:27:57,200 --> 00:28:03,600
powered higher frequency signals. So,
590
00:28:00,799 --> 00:28:06,880
that most of the SDRs have a limit of
591
00:28:03,600 --> 00:28:08,559
about six gigahertz, right around there.
592
00:28:06,880 --> 00:28:11,279
So, that's about as much as we'd be able
593
00:28:08,559 --> 00:28:15,200
to press it up and and see what we can
594
00:28:11,279 --> 00:28:18,000
do uh at that level versus 2.5 GHz.
595
00:28:15,200 --> 00:28:21,120
>> With that said, OTW, thank you so much.
596
00:28:18,000 --> 00:28:23,840
very insightful, very eyeopening,
597
00:28:21,120 --> 00:28:26,960
definitely much to learn here. And if
598
00:28:23,840 --> 00:28:28,960
you love such content, please leave your
599
00:28:26,960 --> 00:28:32,320
comment in the descriptions. There are
600
00:28:28,960 --> 00:28:36,880
many more videos OTW and I are planning.
601
00:28:32,320 --> 00:28:39,360
So stay tuned, stay uh keep asking me uh
602
00:28:36,880 --> 00:28:42,799
where when is the next video, when OTW
603
00:28:39,360 --> 00:28:44,880
is coming to to the show and OTW as
604
00:28:42,799 --> 00:28:46,880
always, thank you so much.
605
00:28:44,880 --> 00:28:49,840
>> Thank you for having me, Yian. I really
606
00:28:46,880 --> 00:28:49,840
enjoy being on new43158
Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.