All language subtitles for [English (auto-generated)] They’re Watching You Through Wi-Fi… And You Have No Idea [DownSub.com]

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian Download
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 00:00:00,160 --> 00:00:05,759 Almost everybody in the industrialized 2 00:00:02,720 --> 00:00:08,000 world now has Wi-Fi as part of their 3 00:00:05,759 --> 00:00:12,800 home, their office, what have you. The 4 00:00:08,000 --> 00:00:17,279 combination of radio technology and 5 00:00:12,800 --> 00:00:19,680 cyber security and AI all come together 6 00:00:17,279 --> 00:00:21,760 to create something that we never 7 00:00:19,680 --> 00:00:23,600 thought we would be able to do. This is 8 00:00:21,760 --> 00:00:25,840 the same thing, sending out the Wi-Fi 9 00:00:23,600 --> 00:00:28,240 signal and then getting the signal and 10 00:00:25,840 --> 00:00:32,000 having enough intelligence built into 11 00:00:28,240 --> 00:00:35,840 your system to be able to determine what 12 00:00:32,000 --> 00:00:38,239 is going on in that room. 13 00:00:35,840 --> 00:00:40,239 Hey everyone, Yaniv Hoffman back with 14 00:00:38,239 --> 00:00:44,160 another video and back with the one and 15 00:00:40,239 --> 00:00:46,559 only Master Aer Occupy the web. Welcome. 16 00:00:44,160 --> 00:00:49,760 >> Thanks Yaniv. It's good to be back. 17 00:00:46,559 --> 00:00:52,320 Thank you for the honor of hosting me 18 00:00:49,760 --> 00:00:55,120 again. I really appreciate that. 19 00:00:52,320 --> 00:00:58,079 >> Yes. Yes. Already got complaints and 20 00:00:55,120 --> 00:01:02,079 questions. Where is OTW? So happy you 21 00:00:58,079 --> 00:01:05,119 are with me. And today we have a a cool 22 00:01:02,079 --> 00:01:09,040 I believe a very cool subject. And what 23 00:01:05,119 --> 00:01:11,760 if I told you that your Wi-Fi can see 24 00:01:09,040 --> 00:01:14,159 you even through walls. So a new 25 00:01:11,760 --> 00:01:17,520 technique lets attackers track your 26 00:01:14,159 --> 00:01:20,560 every move inside your home without ever 27 00:01:17,520 --> 00:01:24,320 stepping inside. And to break it down, 28 00:01:20,560 --> 00:01:28,000 I'm turning it to OTW, who is going to 29 00:01:24,320 --> 00:01:29,360 show you exactly how this works. Well, I 30 00:01:28,000 --> 00:01:32,720 don't know if I'm going to show them 31 00:01:29,360 --> 00:01:37,439 exactly, but I I will describe 32 00:01:32,720 --> 00:01:40,079 exactly how it works, right? So, there's 33 00:01:37,439 --> 00:01:43,040 almost everybody in the industrialized 34 00:01:40,079 --> 00:01:45,600 world now has Wi-Fi as part of their 35 00:01:43,040 --> 00:01:47,200 home, their office, what have you. And 36 00:01:45,600 --> 00:01:52,240 we've just kind of taken that for 37 00:01:47,200 --> 00:01:56,320 granted. We've now entered the radio 38 00:01:52,240 --> 00:02:00,000 signal signals intelligence era. We are 39 00:01:56,320 --> 00:02:04,000 entering the signals intelligence era of 40 00:02:00,000 --> 00:02:06,560 cyber security. And this new technology 41 00:02:04,000 --> 00:02:07,920 is an indication. It's a it's a 42 00:02:06,560 --> 00:02:12,560 manifestation. 43 00:02:07,920 --> 00:02:14,239 of the combination of radio 44 00:02:12,560 --> 00:02:19,200 technology 45 00:02:14,239 --> 00:02:22,319 and cyber security and AI all come 46 00:02:19,200 --> 00:02:24,879 together to create something that we 47 00:02:22,319 --> 00:02:28,800 never thought we would be able to do. 48 00:02:24,879 --> 00:02:31,760 And what it is is it's the ability to 49 00:02:28,800 --> 00:02:34,000 send a Wi-Fi signal. Now Wi-Fi is simply 50 00:02:31,760 --> 00:02:36,640 a radio signal. That's all it is. You 51 00:02:34,000 --> 00:02:39,360 know, like so many things around us, 52 00:02:36,640 --> 00:02:42,000 whether it be your cell phone or your 53 00:02:39,360 --> 00:02:43,040 microwave oven or even the light that's 54 00:02:42,000 --> 00:02:46,400 around you. These are all 55 00:02:43,040 --> 00:02:49,040 electromagnetic magnetic waves. Wi-Fi is 56 00:02:46,400 --> 00:02:51,920 no different. It just is a way of using 57 00:02:49,040 --> 00:02:54,720 radio signals to transfer digital 58 00:02:51,920 --> 00:02:58,800 information. Okay? That's all it really 59 00:02:54,720 --> 00:03:01,760 is. Now we know that when there are 60 00:02:58,800 --> 00:03:06,159 radio signals or for that matter sound 61 00:03:01,760 --> 00:03:09,280 or light when it hits something right 62 00:03:06,159 --> 00:03:12,800 the the electromagnetic wave is 63 00:03:09,280 --> 00:03:14,080 scattered or refracted or absorbed. 64 00:03:12,800 --> 00:03:17,200 Those are the three things that can 65 00:03:14,080 --> 00:03:19,599 happen. Well, if it's absorbed, then you 66 00:03:17,200 --> 00:03:21,680 know, we don't really know what happened 67 00:03:19,599 --> 00:03:26,159 to it. But if it's refracted or 68 00:03:21,680 --> 00:03:28,560 reflected, we can it comes back to us. 69 00:03:26,159 --> 00:03:31,360 All right? It's like it's like eyesight. 70 00:03:28,560 --> 00:03:35,599 You know, eyesight is simply the light 71 00:03:31,360 --> 00:03:37,920 going from a it's reflecting off a 72 00:03:35,599 --> 00:03:39,680 surface and coming back to your eye. 73 00:03:37,920 --> 00:03:42,400 This is the same thing sending out the 74 00:03:39,680 --> 00:03:45,360 Wi-Fi signal and then getting the signal 75 00:03:42,400 --> 00:03:47,840 and having enough intelligence 76 00:03:45,360 --> 00:03:49,599 built into your system to be able to 77 00:03:47,840 --> 00:03:52,560 determine 78 00:03:49,599 --> 00:03:56,239 what is going on in that room. All 79 00:03:52,560 --> 00:03:59,599 right, you can by simply seeing the 80 00:03:56,239 --> 00:04:02,560 refraction and the bouncing of the radio 81 00:03:59,599 --> 00:04:04,400 waves. Now, it's been something that's 82 00:04:02,560 --> 00:04:06,879 been around, the idea has been around 83 00:04:04,400 --> 00:04:11,200 for at least 10 years, maybe longer, 84 00:04:06,879 --> 00:04:15,280 right? But right now, with the advent of 85 00:04:11,200 --> 00:04:19,199 AI in cyber security and the advent of 86 00:04:15,280 --> 00:04:20,720 AI in what I call signals intelligence, 87 00:04:19,199 --> 00:04:23,840 right, 88 00:04:20,720 --> 00:04:28,720 we can now build one of these devices 89 00:04:23,840 --> 00:04:30,320 that can see through walls, right, for 90 00:04:28,720 --> 00:04:33,440 relatively small amount. We're not 91 00:04:30,320 --> 00:04:36,960 talking about military budgets. We're 92 00:04:33,440 --> 00:04:40,080 talking about a home hobbyist budget. 93 00:04:36,960 --> 00:04:43,120 The the biggest expense in doing this is 94 00:04:40,080 --> 00:04:47,280 you have to have video card. You have to 95 00:04:43,120 --> 00:04:50,800 have a video, right? The software is to 96 00:04:47,280 --> 00:04:54,080 run on CUDA. So, so here's the system, 97 00:04:50,800 --> 00:04:58,080 right? The system simply is reading the 98 00:04:54,080 --> 00:05:01,199 the bouncing and refracting radio waves 99 00:04:58,080 --> 00:05:05,600 and then with that information is able 100 00:05:01,199 --> 00:05:08,080 to determine what is okay and what is a 101 00:05:05,600 --> 00:05:10,800 wall, what's a piece of furniture, 102 00:05:08,080 --> 00:05:13,840 what's animate, what's not animate and 103 00:05:10,800 --> 00:05:18,639 then with that information can actually 104 00:05:13,840 --> 00:05:21,440 display the outlines of the body as it's 105 00:05:18,639 --> 00:05:23,199 moving in real time. the this the 106 00:05:21,440 --> 00:05:26,000 scientists who developed this, the 107 00:05:23,199 --> 00:05:30,240 researchers who developed it tried to 108 00:05:26,000 --> 00:05:33,360 pass it off as a privacy. 109 00:05:30,240 --> 00:05:37,520 It's a privacy issue. It's like no, this 110 00:05:33,360 --> 00:05:40,400 is an anti- privacy issue. 111 00:05:37,520 --> 00:05:43,039 It's a it's a spy device, right? That's 112 00:05:40,400 --> 00:05:44,960 what it is. It's not it's not a privacy 113 00:05:43,039 --> 00:05:48,160 thing. It's a spy device. It's 114 00:05:44,960 --> 00:05:51,120 anti-privacy. And so 115 00:05:48,160 --> 00:05:54,800 the the important point here is that it 116 00:05:51,120 --> 00:05:59,520 will be used by law enforcement. It will 117 00:05:54,800 --> 00:06:03,039 be used by military intelligence. It 118 00:05:59,520 --> 00:06:05,440 will be used by bad guys. Right? That's 119 00:06:03,039 --> 00:06:07,600 the truth with no matter what technology 120 00:06:05,440 --> 00:06:10,639 you're talking about. And so it's 121 00:06:07,600 --> 00:06:13,120 important I think to one to understand 122 00:06:10,639 --> 00:06:15,759 what what's going on here, right? What 123 00:06:13,120 --> 00:06:19,840 is actually happening? what's possible, 124 00:06:15,759 --> 00:06:22,160 right? And possibly how you can protect 125 00:06:19,840 --> 00:06:22,560 yourself from this type of spy, 126 00:06:22,160 --> 00:06:25,840 >> right? 127 00:06:22,560 --> 00:06:28,880 >> And so at at Hackers Rise, we're we're 128 00:06:25,840 --> 00:06:32,400 working on building one of these devices 129 00:06:28,880 --> 00:06:36,319 and we will hopefully demonstrate it 130 00:06:32,400 --> 00:06:38,560 soon uh and have a course on it as well. 131 00:06:36,319 --> 00:06:41,759 But yeah, it's it's basically what this 132 00:06:38,560 --> 00:06:44,240 is. We we need something to send and 133 00:06:41,759 --> 00:06:46,000 receive radio waves. That's what we 134 00:06:44,240 --> 00:06:50,000 need, right? And that's what these 135 00:06:46,000 --> 00:06:52,560 lowcost SDRs are. Okay? The cheapest 136 00:06:50,000 --> 00:06:55,919 ones can't send a signal, but they can 137 00:06:52,560 --> 00:06:59,120 receive a signal. And so, in some cases, 138 00:06:55,919 --> 00:07:01,759 if you're using the Wi-Fi that's already 139 00:06:59,120 --> 00:07:03,520 in the room, then that's adequate, 140 00:07:01,759 --> 00:07:05,599 right? Because the Wi-Fi is sending out 141 00:07:03,520 --> 00:07:08,560 the radio signal. You're just receiving 142 00:07:05,599 --> 00:07:12,160 the radio signal. But it's also possible 143 00:07:08,560 --> 00:07:15,599 to send the Wi-Fi out, you know, not 144 00:07:12,160 --> 00:07:17,599 using it for any purpose other than 145 00:07:15,599 --> 00:07:21,039 trying to see what's inside the room to 146 00:07:17,599 --> 00:07:24,240 send a powerful signal through the wall. 147 00:07:21,039 --> 00:07:28,400 Okay? It strikes the objects in the room 148 00:07:24,240 --> 00:07:32,560 and then reflects back to an AI that can 149 00:07:28,400 --> 00:07:36,000 read that data and reconstruct figures 150 00:07:32,560 --> 00:07:40,800 in real time. Right? So that's what is 151 00:07:36,000 --> 00:07:42,479 necessary to do it and you need a Nvidia 152 00:07:40,800 --> 00:07:45,599 card 153 00:07:42,479 --> 00:07:48,479 and you need a piece of software, right? 154 00:07:45,599 --> 00:07:50,639 It's called Dense Pose. I will uh I'll 155 00:07:48,479 --> 00:07:53,680 put it up on the screen for you. Okay, 156 00:07:50,639 --> 00:07:58,319 this is Dense Pose, right? It was a it's 157 00:07:53,680 --> 00:08:01,680 it's basically a an AI system, right? 158 00:07:58,319 --> 00:08:03,840 that takes signals and converts them 159 00:08:01,680 --> 00:08:07,840 into 160 00:08:03,840 --> 00:08:12,000 body forms. All right? And and so this 161 00:08:07,840 --> 00:08:14,639 is a it's all open source. And so this 162 00:08:12,000 --> 00:08:16,800 is the software end of it. The hardware 163 00:08:14,639 --> 00:08:18,720 end is there's two elements. You got to 164 00:08:16,800 --> 00:08:20,800 have a computer obviously. Then you have 165 00:08:18,720 --> 00:08:22,639 to have an SDR, right, to be able to 166 00:08:20,800 --> 00:08:26,560 send and receive the signals. 167 00:08:22,639 --> 00:08:29,919 >> And then you need um this software, 168 00:08:26,560 --> 00:08:34,159 right? And once you have that, then it's 169 00:08:29,919 --> 00:08:36,479 possible to build a device that can see 170 00:08:34,159 --> 00:08:39,200 through walls. Now, there's some 171 00:08:36,479 --> 00:08:42,399 limitations of a device like this. And 172 00:08:39,200 --> 00:08:45,040 one of the limitations is that Wi-Fi as 173 00:08:42,399 --> 00:08:49,120 it's specified throughout the 174 00:08:45,040 --> 00:08:52,480 industrialized world is limited to 175 00:08:49,120 --> 00:08:53,680 between a half a watt to one watt. 176 00:08:52,480 --> 00:08:56,320 Right? 177 00:08:53,680 --> 00:08:58,640 And so that's why we have ranges, 178 00:08:56,320 --> 00:09:02,800 limited ranges of Wi-Fi that are only 179 00:08:58,640 --> 00:09:06,000 like a 100 meters, right? So Wi-Fi in 180 00:09:02,800 --> 00:09:09,600 the US is limited to a half a watt by 181 00:09:06,000 --> 00:09:12,800 the FCC. But that doesn't mean that 182 00:09:09,600 --> 00:09:16,320 somebody couldn't build a Wii device 183 00:09:12,800 --> 00:09:19,279 that even put out more power, had a 184 00:09:16,320 --> 00:09:22,320 directional antenna. So, it's putting 185 00:09:19,279 --> 00:09:26,000 out the Wi-Fi at a higher power in one 186 00:09:22,320 --> 00:09:28,560 direction. Its ability to see it through 187 00:09:26,000 --> 00:09:31,519 walls will be enhanced, 188 00:09:28,560 --> 00:09:34,320 right? It can see further than the 100 189 00:09:31,519 --> 00:09:36,720 meters. There's a lot of things that we 190 00:09:34,320 --> 00:09:40,560 need to consider in this, right? And 191 00:09:36,720 --> 00:09:43,839 that this can be used for malicious and 192 00:09:40,560 --> 00:09:47,839 nefarious purposes. And it certainly, 193 00:09:43,839 --> 00:09:49,920 you know, it has all of the makings of a 194 00:09:47,839 --> 00:09:51,839 2025 spy device. 195 00:09:49,920 --> 00:09:53,839 >> Spy device. 196 00:09:51,839 --> 00:09:55,519 >> It It definitely looks like a spy device 197 00:09:53,839 --> 00:09:58,399 to me. 198 00:09:55,519 --> 00:10:00,959 Uh, but I should tell you that there's a 199 00:09:58,399 --> 00:10:03,839 commercial company out there that makes 200 00:10:00,959 --> 00:10:06,560 home security systems based upon this. 201 00:10:03,839 --> 00:10:08,880 And so what they've done is that they've 202 00:10:06,560 --> 00:10:12,880 built a home security system based on 203 00:10:08,880 --> 00:10:16,480 this. And then they can determine if 204 00:10:12,880 --> 00:10:19,279 there is a motion within the room that 205 00:10:16,480 --> 00:10:22,560 shouldn't be there, right? It takes like 206 00:10:19,279 --> 00:10:25,839 a fingerprint of all of the people and 207 00:10:22,560 --> 00:10:28,079 devices in the room. And so if a new 208 00:10:25,839 --> 00:10:31,920 person comes in, it can tell that 209 00:10:28,079 --> 00:10:34,560 there's a new person in the room. If the 210 00:10:31,920 --> 00:10:36,720 a dog comes into the room, it knows it's 211 00:10:34,560 --> 00:10:39,200 a dog. 212 00:10:36,720 --> 00:10:42,800 If a picture falls off the wall, it's 213 00:10:39,200 --> 00:10:45,279 not an emergency. It it's can to be that 214 00:10:42,800 --> 00:10:47,680 intelligent, right? And so this is the 215 00:10:45,279 --> 00:10:50,079 first commercial application I've seen 216 00:10:47,680 --> 00:10:52,079 of it is security system. So the 217 00:10:50,079 --> 00:10:53,920 original researchers were saying, well, 218 00:10:52,079 --> 00:10:55,839 this is going to be a privacy device. 219 00:10:53,920 --> 00:10:58,000 You know, I can't buy that at all. It's 220 00:10:55,839 --> 00:11:01,680 not a privacy device. It's an it's an 221 00:10:58,000 --> 00:11:05,600 anti-privacy device. But there are some 222 00:11:01,680 --> 00:11:08,000 commercial applications that aren't spy 223 00:11:05,600 --> 00:11:10,399 devices like home security systems, 224 00:11:08,000 --> 00:11:14,880 right? That'd be one application. 225 00:11:10,399 --> 00:11:18,480 Another application would be using it to 226 00:11:14,880 --> 00:11:21,120 monitor old people, right? So using 227 00:11:18,480 --> 00:11:24,079 Wi-Fi, you could create a picture of 228 00:11:21,120 --> 00:11:27,120 their face, okay? and their breathing 229 00:11:24,079 --> 00:11:29,519 and then say okay this is this person's 230 00:11:27,120 --> 00:11:32,160 doing okay because the breathing is you 231 00:11:29,519 --> 00:11:35,519 know is deep and it's at a certain rate 232 00:11:32,160 --> 00:11:37,760 per minute and if it varies from that 233 00:11:35,519 --> 00:11:39,839 then we have an emergency and we need to 234 00:11:37,760 --> 00:11:43,040 take care of this. So these are ways 235 00:11:39,839 --> 00:11:44,560 that it can be used um in commercial 236 00:11:43,040 --> 00:11:47,680 applications. 237 00:11:44,560 --> 00:11:52,320 Um and of course you know we're talking 238 00:11:47,680 --> 00:11:55,279 about wifi here. All right. So Wi-Fi is 239 00:11:52,320 --> 00:11:57,360 that is that everywhere but it could be 240 00:11:55,279 --> 00:11:59,760 used other not just Wi-Fi. This 241 00:11:57,360 --> 00:12:02,640 technology is not limited by Wi-Fi. 242 00:11:59,760 --> 00:12:06,000 Right. Wi-Fi is just the most convenient 243 00:12:02,640 --> 00:12:08,399 and it's in every home. Well I should 244 00:12:06,000 --> 00:12:10,959 put it. It's in every industrialized 245 00:12:08,399 --> 00:12:13,760 nearly every industrialized um 246 00:12:10,959 --> 00:12:15,920 >> hall industrialized country's homes. So 247 00:12:13,760 --> 00:12:18,320 it can be used for that purpose. You 248 00:12:15,920 --> 00:12:20,959 know the the attacker doesn't have to 249 00:12:18,320 --> 00:12:23,600 bring in their own signal. The signal is 250 00:12:20,959 --> 00:12:25,920 being generated inside your home and all 251 00:12:23,600 --> 00:12:29,120 they're doing is reading the signal. 252 00:12:25,920 --> 00:12:32,160 Yeah. And that gives them access to 253 00:12:29,120 --> 00:12:33,200 everything that's going on inside of 254 00:12:32,160 --> 00:12:35,040 that room. 255 00:12:33,200 --> 00:12:38,240 >> Yeah. Now, it could be much more 256 00:12:35,040 --> 00:12:41,279 nefarious and use different signals, a 257 00:12:38,240 --> 00:12:43,360 higher um frequency signal. A higher 258 00:12:41,279 --> 00:12:46,240 frequency is going to get you much 259 00:12:43,360 --> 00:12:48,480 greater resolution. So, the the images 260 00:12:46,240 --> 00:12:51,360 that you'll see that have been generated 261 00:12:48,480 --> 00:12:52,800 with this technology, they're nice human 262 00:12:51,360 --> 00:12:55,040 figures. You can tell that they're 263 00:12:52,800 --> 00:12:58,480 human, but you can't really tell facial 264 00:12:55,040 --> 00:13:01,760 features and what have you. with with 265 00:12:58,480 --> 00:13:04,959 higher frequency signals, you would get 266 00:13:01,760 --> 00:13:08,160 really good resolution. So that once 267 00:13:04,959 --> 00:13:11,360 again, this could be used as a spy 268 00:13:08,160 --> 00:13:13,680 weapon that can see through walls. 269 00:13:11,360 --> 00:13:16,480 Maybe, you know, law enforcement uses it 270 00:13:13,680 --> 00:13:19,760 to be able to see who's inside the house 271 00:13:16,480 --> 00:13:21,360 before they break in or what. Yeah, 272 00:13:19,760 --> 00:13:22,720 >> it's kind of like it's kind of like an 273 00:13:21,360 --> 00:13:25,839 X-ray. 274 00:13:22,720 --> 00:13:29,440 >> Okay. But it's much more it has much 275 00:13:25,839 --> 00:13:33,040 more um a resolution than an X-ray does 276 00:13:29,440 --> 00:13:34,880 and it's it's it's more like an MRI 277 00:13:33,040 --> 00:13:37,360 might be the best way to think of it. 278 00:13:34,880 --> 00:13:40,240 It's more like an MRI 279 00:13:37,360 --> 00:13:44,079 of a room. They're taking an MRI of a 280 00:13:40,240 --> 00:13:47,600 room and and and basically seeing how 281 00:13:44,079 --> 00:13:49,440 the radio are refracted or reflect. 282 00:13:47,600 --> 00:13:51,680 That's what an MRI does too, by the way. 283 00:13:49,440 --> 00:13:53,600 But it's the same electromagnetic 284 00:13:51,680 --> 00:13:55,440 technology 285 00:13:53,600 --> 00:13:57,440 um but much more powerful, much more 286 00:13:55,440 --> 00:13:58,959 sensitive. What we're talking about is 287 00:13:57,440 --> 00:14:01,600 offtheshelf 288 00:13:58,959 --> 00:14:03,519 parts, a regular computer, an Nvidia 289 00:14:01,600 --> 00:14:04,399 graphics card, and some open source 290 00:14:03,519 --> 00:14:06,160 software. 291 00:14:04,399 --> 00:14:07,199 >> You have yourself you have yourself a 292 00:14:06,160 --> 00:14:10,560 spy device. 293 00:14:07,199 --> 00:14:14,560 >> Yeah. So, so OTW, if I'm thinking it, I 294 00:14:10,560 --> 00:14:17,120 work. So, we know that um WiFi signals 295 00:14:14,560 --> 00:14:20,160 don't stop at the walls. They penetrate 296 00:14:17,120 --> 00:14:23,440 they reflect bounce of objects including 297 00:14:20,160 --> 00:14:26,959 human. So say when a human is moves in a 298 00:14:23,440 --> 00:14:30,800 room their body disrupt the Wi-Fi signal 299 00:14:26,959 --> 00:14:34,160 and in a predictable way let's say and 300 00:14:30,800 --> 00:14:38,320 with the right tools like you say an SDR 301 00:14:34,160 --> 00:14:42,160 of course a computer Nvidia um uh card 302 00:14:38,320 --> 00:14:47,120 you can capture those distortions and 303 00:14:42,160 --> 00:14:49,839 reconstruct I don't know 2D 3D 304 00:14:47,120 --> 00:14:51,279 representation of the 3D 3D 305 00:14:49,839 --> 00:14:54,079 >> yes 3D 306 00:14:51,279 --> 00:14:56,160 Yep. This this is 3D software and it 307 00:14:54,079 --> 00:15:01,199 does require the Nvidia card because the 308 00:14:56,160 --> 00:15:03,360 Nvidia card has built into it CUDA and 309 00:15:01,199 --> 00:15:05,760 for those for let's maybe back up a 310 00:15:03,360 --> 00:15:09,040 little bit. People know Nvidia, right? I 311 00:15:05,760 --> 00:15:11,680 think now of the AI company, right? They 312 00:15:09,040 --> 00:15:13,600 make the CPUs, the GPUs that are used 313 00:15:11,680 --> 00:15:16,160 for AI, but they've been they've been 314 00:15:13,600 --> 00:15:17,680 around for a long time for oh, let's see 315 00:15:16,160 --> 00:15:19,680 22 316 00:15:17,680 --> 00:15:22,720 years, I believe. 22 years they've been 317 00:15:19,680 --> 00:15:26,079 around and during those 22 years they 318 00:15:22,720 --> 00:15:29,680 basically have been making GPUs, 319 00:15:26,079 --> 00:15:32,000 graphics processing units, right, that 320 00:15:29,680 --> 00:15:34,000 are a little bit different than CPUs. 321 00:15:32,000 --> 00:15:36,639 They're they're basically they're 322 00:15:34,000 --> 00:15:39,199 simpler devices that basically do 323 00:15:36,639 --> 00:15:41,600 calculations and they move polygons very 324 00:15:39,199 --> 00:15:43,279 very rapidly, right? And they've made a 325 00:15:41,600 --> 00:15:45,199 business out of that for years and years 326 00:15:43,279 --> 00:15:47,199 and years. They've done very well for 327 00:15:45,199 --> 00:15:48,800 themselves. But the reason they've done 328 00:15:47,199 --> 00:15:50,880 so well for themselves is because they 329 00:15:48,800 --> 00:15:54,079 developed essentially an operating 330 00:15:50,880 --> 00:15:59,519 system called CUDA, right? And a lot of 331 00:15:54,079 --> 00:16:01,920 the AI the AI applications run on CUDA. 332 00:15:59,519 --> 00:16:03,920 This is an example here. Okay, this one 333 00:16:01,920 --> 00:16:08,800 we're talking about there's another one 334 00:16:03,920 --> 00:16:12,399 that dens developed on Nvidia because of 335 00:16:08,800 --> 00:16:16,240 CUDA, right? And this is why this is why 336 00:16:12,399 --> 00:16:18,240 Nvidia is the leader in in making I 337 00:16:16,240 --> 00:16:20,800 guess they're almost a they're four 338 00:16:18,240 --> 00:16:24,079 trillion dollar company. They're bigger 339 00:16:20,800 --> 00:16:25,839 than a lot of countries and and the 340 00:16:24,079 --> 00:16:29,279 reason is because they're make they made 341 00:16:25,839 --> 00:16:32,959 these these GPUs with CUDA and this 342 00:16:29,279 --> 00:16:34,560 application requires that right this is 343 00:16:32,959 --> 00:16:36,880 why they're doing so well. Of course, 344 00:16:34,560 --> 00:16:40,320 the higherend applications 345 00:16:36,880 --> 00:16:42,480 um require entire server farms full of 346 00:16:40,320 --> 00:16:45,440 GPUs 347 00:16:42,480 --> 00:16:48,959 and enough power to power an entire 348 00:16:45,440 --> 00:16:51,680 city. That's why we're starting to see 349 00:16:48,959 --> 00:16:53,440 um power plant uh nuclear power plants 350 00:16:51,680 --> 00:16:55,519 come back online in the United States, 351 00:16:53,440 --> 00:16:56,959 the ones that have been retired. And 352 00:16:55,519 --> 00:16:59,360 we're going to see this other places too 353 00:16:56,959 --> 00:17:01,199 because one of the things that's that I 354 00:16:59,360 --> 00:17:05,439 don't know that the general public is 355 00:17:01,199 --> 00:17:10,319 thinking about but the AI revolution is 356 00:17:05,439 --> 00:17:15,520 going to suck up a huge amount of energy 357 00:17:10,319 --> 00:17:17,839 a huge amount of energy and and so 358 00:17:15,520 --> 00:17:20,400 we have to see what does how impact 359 00:17:17,839 --> 00:17:23,760 that's going to have on on nations and 360 00:17:20,400 --> 00:17:28,400 energy security. I mean it might be that 361 00:17:23,760 --> 00:17:32,080 the AI uses you know all the energy 362 00:17:28,400 --> 00:17:34,320 and leaves and leaves us with none. 363 00:17:32,080 --> 00:17:36,320 Microsoft a few months back bought 364 00:17:34,320 --> 00:17:39,039 themselves a nuclear power plant. That's 365 00:17:36,320 --> 00:17:42,000 how much energy is being used. They 366 00:17:39,039 --> 00:17:45,840 bought themselves a nuclear power plant. 367 00:17:42,000 --> 00:17:49,039 But I'm not one to denigrate AI. I've 368 00:17:45,840 --> 00:17:52,000 been waiting for AI all my life. 369 00:17:49,039 --> 00:17:53,919 Literally all my life. like when's AI 370 00:17:52,000 --> 00:17:56,720 gonna come? When's AI gonna come? And 371 00:17:53,919 --> 00:18:00,640 it's here. And I think that we all need 372 00:17:56,720 --> 00:18:03,520 to embrace that it's here. Um, and I 373 00:18:00,640 --> 00:18:06,080 think as far as cyber security jobs, 374 00:18:03,520 --> 00:18:10,960 which is a question I get all the time, 375 00:18:06,080 --> 00:18:14,240 the answer is learn to integrate AI into 376 00:18:10,960 --> 00:18:17,360 your work. Okay? Learn to integrate AI 377 00:18:14,240 --> 00:18:18,960 into what you do every day. And if you 378 00:18:17,360 --> 00:18:20,880 do that, you you're not going to be out 379 00:18:18,960 --> 00:18:22,559 of work. You're gonna have a job. You're 380 00:18:20,880 --> 00:18:24,720 gonna have lots of jobs. You're gonna 381 00:18:22,559 --> 00:18:26,799 have high paying jobs. 382 00:18:24,720 --> 00:18:30,080 >> The person the person who doesn't do 383 00:18:26,799 --> 00:18:32,000 that is may be unemployed, right? They 384 00:18:30,080 --> 00:18:34,400 may be unemployed if they can't 385 00:18:32,000 --> 00:18:36,799 integrate AI into everything that they 386 00:18:34,400 --> 00:18:39,520 do. Here's just excellent. I just love 387 00:18:36,799 --> 00:18:41,919 this this device, this technology, 388 00:18:39,520 --> 00:18:45,200 because it it combines two of my 389 00:18:41,919 --> 00:18:46,720 favorite subjects, which is radio 390 00:18:45,200 --> 00:18:50,080 hacking 391 00:18:46,720 --> 00:18:52,720 with AI. And so what could get better 392 00:18:50,080 --> 00:18:54,799 than that, right? AI and radio hacking. 393 00:18:52,720 --> 00:18:56,640 So, so let's, you know, look for this 394 00:18:54,799 --> 00:18:59,039 from us. I I wrote a little article on 395 00:18:56,640 --> 00:19:01,280 hackers rise a week ago or so and hard 396 00:18:59,039 --> 00:19:05,360 to explain what's involved and we'll be 397 00:19:01,280 --> 00:19:07,679 pursuing this in the very near future. 398 00:19:05,360 --> 00:19:09,919 >> So, so OTW, I have a question from 399 00:19:07,679 --> 00:19:12,400 defense point of view because now as you 400 00:19:09,919 --> 00:19:16,240 said, this is a spy device, right? 401 00:19:12,400 --> 00:19:18,880 Everyone can uh do it. So what are the 402 00:19:16,240 --> 00:19:22,880 counter measures that people or 403 00:19:18,880 --> 00:19:26,400 organization can do to block to block 404 00:19:22,880 --> 00:19:29,280 such attempts is jamming is is one of 405 00:19:26,400 --> 00:19:29,679 the tactics or it will not help in this 406 00:19:29,280 --> 00:19:32,000 uh 407 00:19:29,679 --> 00:19:34,720 >> well let's let's talk about simple the 408 00:19:32,000 --> 00:19:37,440 simple measures first 409 00:19:34,720 --> 00:19:42,880 you know the the the if you were trying 410 00:19:37,440 --> 00:19:44,640 to have your own Wi-Fi signal not used 411 00:19:42,880 --> 00:19:47,440 could turn it down you could turn down 412 00:19:44,640 --> 00:19:49,120 the power on your Wi-Fi. That's not 413 00:19:47,440 --> 00:19:51,360 convenient, though. Nobody likes that 414 00:19:49,120 --> 00:19:53,120 because then I can't reach it in in 415 00:19:51,360 --> 00:19:54,480 different parts of the office or the 416 00:19:53,120 --> 00:19:58,480 home or the school or wherever you're 417 00:19:54,480 --> 00:20:01,360 at. But that's an obvious possible uh 418 00:19:58,480 --> 00:20:06,320 solution. Of course, you could also use 419 00:20:01,360 --> 00:20:09,919 um Ethernet, just skip the Wi-Fi, right? 420 00:20:06,320 --> 00:20:14,240 and and so far 421 00:20:09,919 --> 00:20:16,960 this technology has only been refined. 422 00:20:14,240 --> 00:20:19,679 It's not it's possible with any radio 423 00:20:16,960 --> 00:20:23,120 signal, but you could also use Bluetooth 424 00:20:19,679 --> 00:20:26,320 instead of Wi-Fi. I mean, Bluetooth is 425 00:20:23,120 --> 00:20:28,159 quite as fast, but it'll it'll do, 426 00:20:26,320 --> 00:20:31,039 right? So, like for instance, you could 427 00:20:28,159 --> 00:20:32,720 the way you tether your phone by 428 00:20:31,039 --> 00:20:35,120 Bluetooth, right? You can do that. You 429 00:20:32,720 --> 00:20:36,000 can send those signals and data that 430 00:20:35,120 --> 00:20:39,120 way. 431 00:20:36,000 --> 00:20:42,559 And then you could also try to block the 432 00:20:39,120 --> 00:20:45,679 signal, right? And that would be to put 433 00:20:42,559 --> 00:20:48,080 some dense objects between the outer 434 00:20:45,679 --> 00:20:51,039 wall and you, whatever that happened to 435 00:20:48,080 --> 00:20:53,039 be. I mean, if it's a if it's a 10-in 436 00:20:51,039 --> 00:20:54,960 concrete wall, there's probably not 437 00:20:53,039 --> 00:20:58,320 going to be any signals emanating 438 00:20:54,960 --> 00:21:00,000 through it, right? But we can't all do 439 00:20:58,320 --> 00:21:03,280 those things, right? For a lot of 440 00:21:00,000 --> 00:21:05,679 people, just those are not um practical 441 00:21:03,280 --> 00:21:07,360 ways. I mean you could always put in you 442 00:21:05,679 --> 00:21:10,240 could always you know enclose your 443 00:21:07,360 --> 00:21:14,559 entire house in lead 444 00:21:10,240 --> 00:21:17,280 you know that's as you know a lot of the 445 00:21:14,559 --> 00:21:22,480 highly confidential facilities in the 446 00:21:17,280 --> 00:21:25,760 military and is they have lead line 447 00:21:22,480 --> 00:21:27,679 walls all the way around right bec 448 00:21:25,760 --> 00:21:31,039 because why do they do that doesn't 449 00:21:27,679 --> 00:21:33,039 allow any signals to emanate out through 450 00:21:31,039 --> 00:21:35,600 that you can't get a cell phone signal 451 00:21:33,039 --> 00:21:39,600 out you can't get Wi-Fi out. Once again, 452 00:21:35,600 --> 00:21:43,039 you know, if you were in a in a a state 453 00:21:39,600 --> 00:21:44,559 sponsored type of of circumstance, 454 00:21:43,039 --> 00:21:46,880 that's what you would do. You would go 455 00:21:44,559 --> 00:21:49,520 ahead and build yourself a facility 456 00:21:46,880 --> 00:21:53,280 where there was very dense material with 457 00:21:49,520 --> 00:21:55,760 lead being the densest, right? Is build 458 00:21:53,280 --> 00:21:58,799 with leadline walls so that the signal 459 00:21:55,760 --> 00:22:00,640 can't leave. But, you know, that's for 460 00:21:58,799 --> 00:22:03,039 state sponsored. That's not for you and 461 00:22:00,640 --> 00:22:04,400 I. you know, the best the best thing 462 00:22:03,039 --> 00:22:05,760 that we might be able to do is turn our 463 00:22:04,400 --> 00:22:08,320 signal down 464 00:22:05,760 --> 00:22:10,880 >> or put large objects there. 465 00:22:08,320 --> 00:22:14,640 >> Um, the other thing you mentioned is is 466 00:22:10,880 --> 00:22:16,880 basically jamming. And jamming is a 467 00:22:14,640 --> 00:22:19,919 possibility. It's not easy. It's 468 00:22:16,880 --> 00:22:22,960 something that we do in our advanced SDR 469 00:22:19,919 --> 00:22:26,559 class is we we work at jamming different 470 00:22:22,960 --> 00:22:30,880 signals. And one of the problems with 471 00:22:26,559 --> 00:22:36,240 jamming wifi and in Bluetooth is that 472 00:22:30,880 --> 00:22:39,440 they use a um a spectrum skipping 473 00:22:36,240 --> 00:22:42,159 technology. So they go and they skip 474 00:22:39,440 --> 00:22:45,039 through various frequencies. They send a 475 00:22:42,159 --> 00:22:46,640 message on one frequency. That's the 476 00:22:45,039 --> 00:22:48,400 beginning of the message. And then the 477 00:22:46,640 --> 00:22:50,559 second part of the message goes into a 478 00:22:48,400 --> 00:22:52,320 second frequency. And then the third 479 00:22:50,559 --> 00:22:56,960 part of the message goes to a third 480 00:22:52,320 --> 00:22:59,520 frequency. So you have to know what the 481 00:22:56,960 --> 00:23:02,640 algorithm is that's determining what 482 00:22:59,520 --> 00:23:04,480 frequency the message is on. Okay? And 483 00:23:02,640 --> 00:23:10,080 that's what's called spread spectrum 484 00:23:04,480 --> 00:23:13,200 technology. And that is a good strategy. 485 00:23:10,080 --> 00:23:14,720 But if I can figure out the algorithm, 486 00:23:13,200 --> 00:23:17,679 okay, if I can figure out the algorithm 487 00:23:14,720 --> 00:23:20,640 you're using, then I can break that type 488 00:23:17,679 --> 00:23:23,120 of encryption. the the pro the the issue 489 00:23:20,640 --> 00:23:25,760 with say Bluetooth low energy is it's 490 00:23:23,120 --> 00:23:28,720 pretty easy to break it right and we can 491 00:23:25,760 --> 00:23:32,159 break it Wi-Fi is a little bit more 492 00:23:28,720 --> 00:23:37,120 difficult because there is an element of 493 00:23:32,159 --> 00:23:39,280 randomness okay in the algorithm and so 494 00:23:37,120 --> 00:23:41,360 predicting that randomness becomes very 495 00:23:39,280 --> 00:23:45,280 difficult by definition predicting 496 00:23:41,360 --> 00:23:47,520 randomness is difficult 497 00:23:45,280 --> 00:23:50,159 you you can't predict randomness 498 00:23:47,520 --> 00:23:52,559 >> so okay W you you mentioned that you are 499 00:23:50,159 --> 00:23:54,240 working on such a device while you were 500 00:23:52,559 --> 00:23:56,400 talking 501 00:23:54,240 --> 00:24:00,159 presented here on the screen the the 502 00:23:56,400 --> 00:24:04,240 article you wrote in a rise and we'll 503 00:24:00,159 --> 00:24:08,720 put it now again plus we did multiple 504 00:24:04,240 --> 00:24:11,360 videos on SDR eching which are now on 505 00:24:08,720 --> 00:24:13,919 the screen as well but are you going to 506 00:24:11,360 --> 00:24:15,600 build a course around it? 507 00:24:13,919 --> 00:24:19,840 >> Yes, we're going to build a course 508 00:24:15,600 --> 00:24:22,559 around this. Um, we have a Wi-Fi hacking 509 00:24:19,840 --> 00:24:23,919 course coming up uh in a couple weeks 510 00:24:22,559 --> 00:24:25,679 probably by the time this video is 511 00:24:23,919 --> 00:24:28,080 showing and we're going to include 512 00:24:25,679 --> 00:24:30,159 elements of this in that course. We 513 00:24:28,080 --> 00:24:32,320 won't actually build the device, but we 514 00:24:30,159 --> 00:24:35,200 will teach how it works and how to build 515 00:24:32,320 --> 00:24:36,880 it. Not actually because there's too we 516 00:24:35,200 --> 00:24:38,720 have too many areas to cover in the 517 00:24:36,880 --> 00:24:40,400 Wi-Fi hacking course. And we're also 518 00:24:38,720 --> 00:24:42,880 going to be covering the nearest 519 00:24:40,400 --> 00:24:46,480 neighbor attack. Um, that's the attack 520 00:24:42,880 --> 00:24:50,559 that the Russians used to attack inside 521 00:24:46,480 --> 00:24:53,600 of the United States where they went and 522 00:24:50,559 --> 00:24:57,440 compromised a system in Washington DC 523 00:24:53,600 --> 00:25:00,720 and then use the systems Wi-Fi to attack 524 00:24:57,440 --> 00:25:02,320 the neighbor, right? They attacked the 525 00:25:00,720 --> 00:25:04,799 neighbor that way to get some 526 00:25:02,320 --> 00:25:07,600 information uh from the US government. 527 00:25:04,799 --> 00:25:11,120 So we'll be working on that as well as 528 00:25:07,600 --> 00:25:14,000 you know WPA3 and WPA2 529 00:25:11,120 --> 00:25:16,000 and all the different types of we attack 530 00:25:14,000 --> 00:25:17,679 the old old web. So we got a lot of 531 00:25:16,000 --> 00:25:20,799 material we're trying to cover in terms 532 00:25:17,679 --> 00:25:24,640 of you know evil twin attacks and rogue 533 00:25:20,799 --> 00:25:27,840 access attacks. So rogue APS. So we're 534 00:25:24,640 --> 00:25:29,840 going to introduce this that class and 535 00:25:27,840 --> 00:25:31,919 show people a bit about it, but then we 536 00:25:29,840 --> 00:25:34,960 will build a separate class that's just 537 00:25:31,919 --> 00:25:39,360 on this subject as part of our SDR 538 00:25:34,960 --> 00:25:41,840 signal intelligence um uh program where 539 00:25:39,360 --> 00:25:45,600 no we are 540 00:25:41,840 --> 00:25:48,880 next year we also have two courses on 541 00:25:45,600 --> 00:25:51,200 mobile hacking with SDR. So, next year 542 00:25:48,880 --> 00:25:52,960 is going to be a big year in new devices 543 00:25:51,200 --> 00:25:56,799 that we'll be putting through. And you 544 00:25:52,960 --> 00:25:58,720 and I did a video on the uh on how the 545 00:25:56,799 --> 00:26:00,320 Mexican cartels built their own private 546 00:25:58,720 --> 00:26:02,640 cell system. Well, we'll be doing that 547 00:26:00,320 --> 00:26:05,679 next year as well. So, we'll be building 548 00:26:02,640 --> 00:26:08,799 showing you or we'll building in class a 549 00:26:05,679 --> 00:26:11,440 private cell system, right? So, look for 550 00:26:08,799 --> 00:26:13,120 that. That's probably about mid 551 00:26:11,440 --> 00:26:15,279 >> 2026. 552 00:26:13,120 --> 00:26:18,559 um somewhere around there early late 553 00:26:15,279 --> 00:26:20,480 spring summer of 2026 we'll squeeze it 554 00:26:18,559 --> 00:26:22,480 in there. So yeah, we got we got a lot 555 00:26:20,480 --> 00:26:24,400 of stuff going on in that field in at 556 00:26:22,480 --> 00:26:26,400 hackers. This is one of them. This is 557 00:26:24,400 --> 00:26:28,400 one of those things that's that's 558 00:26:26,400 --> 00:26:30,640 definitely a signals intelligence 559 00:26:28,400 --> 00:26:32,480 application and I'm pretty excited about 560 00:26:30,640 --> 00:26:35,760 it. I think it's it has a lot of 561 00:26:32,480 --> 00:26:37,919 applications, some good and some bad, 562 00:26:35,760 --> 00:26:40,080 but but you will know how they work and 563 00:26:37,919 --> 00:26:42,880 you will know how to build one. 564 00:26:40,080 --> 00:26:45,600 >> I agree. And this is cool. And I see the 565 00:26:42,880 --> 00:26:48,400 how the community is growing around SDR. 566 00:26:45,600 --> 00:26:51,200 I see much much more people are really 567 00:26:48,400 --> 00:26:53,600 interested in uh that asking a lot of 568 00:26:51,200 --> 00:26:57,919 question. So it's great opportunity for 569 00:26:53,600 --> 00:27:01,120 everyone. Derise are you know spending 570 00:26:57,919 --> 00:27:04,480 their courses and knowledge to to 571 00:27:01,120 --> 00:27:08,640 everyone. It shows out the technology uh 572 00:27:04,480 --> 00:27:12,799 moved forward so much and you know it 573 00:27:08,640 --> 00:27:14,559 raised also many questions like privacy 574 00:27:12,799 --> 00:27:19,679 like 575 00:27:14,559 --> 00:27:23,520 um privacy spy spy you know spyware or 576 00:27:19,679 --> 00:27:25,440 surveillance I will say and um 577 00:27:23,520 --> 00:27:27,360 definitely very insightful 578 00:27:25,440 --> 00:27:30,400 >> you know this came out a couple of years 579 00:27:27,360 --> 00:27:32,559 ago you know and so it's it's been out 580 00:27:30,400 --> 00:27:34,880 there But I don't think people have 581 00:27:32,559 --> 00:27:38,640 really like clicked on it like, "Oh, 582 00:27:34,880 --> 00:27:42,080 this could change so many things. This 583 00:27:38,640 --> 00:27:47,279 is this is like a gamechanging 584 00:27:42,080 --> 00:27:48,799 technology for spies, right? For whoever 585 00:27:47,279 --> 00:27:50,960 whoever's going to use it, it's going to 586 00:27:48,799 --> 00:27:54,000 be gamechanging." So, and I'd be 587 00:27:50,960 --> 00:27:57,200 interested to see how how what distance 588 00:27:54,000 --> 00:28:00,799 we could extend it to with more high 589 00:27:57,200 --> 00:28:03,600 powered higher frequency signals. So, 590 00:28:00,799 --> 00:28:06,880 that most of the SDRs have a limit of 591 00:28:03,600 --> 00:28:08,559 about six gigahertz, right around there. 592 00:28:06,880 --> 00:28:11,279 So, that's about as much as we'd be able 593 00:28:08,559 --> 00:28:15,200 to press it up and and see what we can 594 00:28:11,279 --> 00:28:18,000 do uh at that level versus 2.5 GHz. 595 00:28:15,200 --> 00:28:21,120 >> With that said, OTW, thank you so much. 596 00:28:18,000 --> 00:28:23,840 very insightful, very eyeopening, 597 00:28:21,120 --> 00:28:26,960 definitely much to learn here. And if 598 00:28:23,840 --> 00:28:28,960 you love such content, please leave your 599 00:28:26,960 --> 00:28:32,320 comment in the descriptions. There are 600 00:28:28,960 --> 00:28:36,880 many more videos OTW and I are planning. 601 00:28:32,320 --> 00:28:39,360 So stay tuned, stay uh keep asking me uh 602 00:28:36,880 --> 00:28:42,799 where when is the next video, when OTW 603 00:28:39,360 --> 00:28:44,880 is coming to to the show and OTW as 604 00:28:42,799 --> 00:28:46,880 always, thank you so much. 605 00:28:44,880 --> 00:28:49,840 >> Thank you for having me, Yian. I really 606 00:28:46,880 --> 00:28:49,840 enjoy being on new43158

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.