Can you steal $10,000 from a locked iPhone?

Procesado: 00:26:14 1.270.615

Hacer Pregunta

Análisis

RESUMEN

El video muestra cómo es posible robar dinero de un iPhone bloqueado utilizando una vulnerabilidad en los sistemas de pago sin contacto. El creador, junto con expertos en ciberseguridad, demuestran un hack que permite realizar transacciones sin desbloquear el teléfono. Se prueba exitosamente con pequeñas cantidades y luego con $10,000.

IDEAS PRINCIPALES

  • Se explica un "ataque del hombre en el medio" que intercepta y modifica los datos de las transacciones NFC.
  • El hack explota el modo Express Transit de Apple y una combinación específica de iPhone y tarjeta Visa.
  • Se detallan tres "mentiras" que permiten aludir las medidas de seguridad: burlar el bloqueo de pantalla, engañar al teléfono para que acepte una transacción de alto valor como de bajo valor y engañar al lector acerca de la verificación del cliente.
  • El video analiza las defensas de Visa y Apple, la vulnerabilidad conocida desde 2021 y la respuesta de las empresas frente al problema.
  • El video plantea preguntas sobre la responsabilidad de corregir la falla y la validez de la postura de Visa, que se basa en la devolución del dinero robado, en lugar de solucionar el problema técnico.

INSIGHTS

  • La vulnerabilidad se basa en la falta de cifrado de la comunicación NFC y en el diseño del sistema de pagos de Visa.
  • MasterCard tiene medidas de seguridad adicionales que impiden este tipo de ataque, a diferencia de Visa.
  • El video destaca la importancia de la ciberseguridad y las implicaciones de las vulnerabilidades en los sistemas financieros.
  • Se enfatiza la necesidad de que las empresas mejoren la seguridad para proteger a los usuarios de posibles fraudes.

Sabiduría

RESUMEN

MKBHD y Veritasium intentan robar $10,000 de un iPhone bloqueado usando un hack de 2021, revelando vulnerabilidades en el sistema de pago.

IDEAS

  • El video demuestra cómo sustraer dinero de un iPhone bloqueado usando un hack.
  • El hack, hecho público en 2021, explota vulnerabilidades en los sistemas de pago.
  • Un iPhone con una tarjeta Visa en modo tránsito es vulnerable a este hack.
  • El sistema de pago utiliza tecnología NFC y una serie de dispositivos para el hack.
  • El hack implica "mentir" al teléfono y al lector para autorizar transacciones.
  • El primer paso es engañar al teléfono haciéndole creer que es un lector de tránsito.
  • El segundo paso implica modificar datos para que la transacción se considere de bajo valor.
  • El tercer paso es engañar al lector sobre la verificación del cliente.
  • El video explica cómo un Proxmark se usa para interceptar y modificar datos NFC.
  • Veritasium explica detalles técnicos sobre criptografía simétrica y asimétrica de tarjetas.
  • MasterCard se protege del ataque, pero Visa permite este hack en ciertas circunstancias.
  • Los hackers pueden comprar información personal para realizar ataques de ingeniería social.
  • Incogni ayuda a eliminar la información personal de bases de datos de brokers de datos.
  • Apple no considera que la vulnerabilidad sea un problema grave y atribuye al Visa.
  • Visa cree que el riesgo de este tipo de fraude es bajo y reversible para los clientes.
  • No encriptar los datos hace que sea más fácil para los hackers manipular la información.
  • Samsung, a diferencia de Apple, podría rechazar una transacción de $10,000 en el metro.
  • El video compara el hack a la seguridad aérea, sugiriendo mejoras en la seguridad.
  • El hecho de que los datos no estén encriptados facilita la manipulación.
  • Los datos de transacción en NFC se transmiten sin cifrar.
  • El video explora las limitaciones y responsabilidades en la ciberseguridad.
  • La falta de encriptación facilita la manipulación de los datos de transacción.
  • El hack se basa en una combinación específica de iPhone y tarjeta Visa.
  • En una transacción, el lector no comprueba la firma del teléfono.
  • El modo tránsito de Apple facilita la ejecución del ataque.
  • Se necesitan tres mentiras para superar las defensas.
  • Para el ataque, se usa una técnica de "hombre en el medio".
  • Algunos datos intercambiados por la tarjeta no están encriptados.

INSIGHTS

  • La tecnología y la seguridad deben equilibrarse para proteger a los usuarios.
  • La falta de seguridad en los sistemas financieros expone a los usuarios a riesgos.
  • Las empresas priorizan la conveniencia sobre la seguridad, lo que crea vulnerabilidades.
  • La encriptación de datos es crucial para prevenir la manipulación en las transacciones.
  • Las compañías de tarjetas de crédito deben priorizar la seguridad con encriptación.
  • La combinación de hardware, software y tarjetas específicas crea riesgos únicos y explotables.
  • La seguridad de las finanzas personales requiere una revisión constante y actualizaciones.
  • La industria debe adoptar un enfoque proactivo para mejorar la seguridad de los pagos.
  • La transparencia y la divulgación de vulnerabilidades son esenciales para la seguridad.
  • La responsabilidad de la seguridad se comparte entre empresas y usuarios.

CITAS

  • "Realmente espero que no funcione."
  • "Es como el David Blaine más nerd."
  • "Aprobado."
  • "Credit verified on device, $5."
  • "No me gusta eso en absoluto."
  • "Sin desbloquear mi teléfono es la verdadera parte de magia."
  • "La única limitación es cuánto dinero tiene alguien en su cuenta bancaria."
  • "Nosotros creemos que es efectivo."
  • "Este es un problema con el sistema de Visa."
  • "El hack se hizo público en 2021."
  • "La vulnerabilidad es probablemente dentro de un entorno controlado."
  • "Y te darán tu dinero de vuelta."
  • "Hemos estado nominados para dos premios Webby."
  • "La encriptación haría imposible la manipulación secreta."
  • "Es una característica de diseño introducida por la mezcla de Apple y Visa."
  • "No se puede erradicar totalmente ningún tipo específico de fraude."
  • "Espero que no, pero sospecho que sí."
  • "El estrés antes va a ser real."
  • "Verificando en el dispositivo."
  • "Voy a necesitar que me devuelvas esto."
  • "No estaba verificado ni nada."
  • "Es un ataque de hombre en el medio."
  • "El teléfono no hace preguntas."
  • "Esta es la opinión de Visa."
  • "Estamos con Visa cero responsabilidad."
  • "El consumidor puede disputar la transacción."

HÁBITOS

  • El orador se muestra preocupado por la seguridad de su iPhone en la demostración.
  • MKBHD verifica los cargos fraudulentos en su teléfono inmediatamente.
  • El orador colabora con expertos en ciberseguridad para comprender el hack.
  • El video busca educar y concienciar sobre las vulnerabilidades tecnológicas.
  • El orador muestra curiosidad por cómo funciona la tecnología de pago sin contacto.
  • El orador se interesa en el impacto financiero de las transacciones no autorizadas.
  • El orador analiza los detalles técnicos de los sistemas de seguridad.
  • El orador recurre a símiles para simplificar conceptos complejos y comunicar.
  • El orador utiliza un enfoque analítico, comparando varias opciones.
  • El orador se enfoca en la innovación en la transformación de la seguridad.
  • El orador destaca la importancia de la educación y el conocimiento en seguridad.
  • El orador está interesado en conocer las debilidades tecnológicas existentes.
  • El orador se preocupa por la experiencia vivida en fraudes.
  • El orador usa la experiencia como consumidor para evaluar el impacto.

HECHOS

  • El hack demostró robar $10,000 de un iPhone bloqueado en la demostración.
  • El hack de iPhone fue hecho público por primera vez en el año 2021.
  • Apple no cifra la información de las transacciones por compatibilidad.
  • El modo de tránsito expreso de Apple permite pagos sin desbloquear el teléfono.
  • La encriptación es una práctica común en las transacciones con tarjeta.
  • Visa tiene una política de "cero responsabilidad" para los tarjetahabientes.
  • El fraude en transacciones con tarjetas en persona es bajo: 2%.
  • Las transacciones de tránsito exigen firma asimétrica de Visa.
  • MasterCard requiere encriptación en sus transacciones.
  • El hack funciona en iPhones con tarjetas Visa en modo tránsito.
  • Veritasium demostró el hack en un experimento.
  • El hack aprovecha el modo de tránsito expreso y Visa.
  • Los ataques son más fáciles cuando los datos no están encriptados.
  • El ataque de "hombre en el medio" intercepta los datos.
  • La firma asimétrica refuerza la seguridad en las tarjetas.
  • La encriptación no funciona con todas las aplicaciones.
  • Algunas tarjetas Visa no comprueban la firma digital.
  • El pago por móvil se considera de bajo riesgo.

REFERENCIAS

  • El canal de YouTube de Veritasium.
  • El video presenta a MKBHD.
  • Profesores Ioana Boureanu y Tom Chothia, expertos en ciberseguridad.
  • Se mencionan los Premios Webby y la nominación del canal.
  • El video se refiere a un video anterior sobre criptografía.
  • Se hace mención del London Underground como contexto del hack.
  • Se cita la política de "cero responsabilidad" de Visa.
  • Se explican los detalles de las claves RSA.
  • El video cita la declaración de Apple sobre el fraude.
  • Se hace referencia al sitio web de Incogni.
  • Se menciona a los bancos como actores relevantes.
  • Se cita la experiencia de los oradores.

CONCLUSIÓN EN UNA FRASE

Aunque la seguridad en los pagos móviles evoluciona, las vulnerabilidades persisten y la responsabilidad es compartida.

RECOMENDACIONES

  • Desactiva el modo de tránsito exprés o usa una tarjeta diferente para prevenir el hack.
  • Mantén el software y las aplicaciones de tu teléfono actualizados para minimizar riesgos.
  • Revisa regularmente tus estados de cuenta bancarios para detectar y disputar fraudes.
  • Infórmate sobre las medidas de seguridad de tus tarjetas y dispositivos de pago.
  • Considera usar aplicaciones de privacidad para proteger tu información personal en línea.
  • Contacta a tu banco y a Apple para reportar vulnerabilidades en la seguridad de pago.
  • Monitorea las transacciones no autorizadas para evitar la pérdida de dinero.
  • Activa las notificaciones de transacciones para detectar actividad sospechosa.
  • Reporta fraudes a las autoridades y a las empresas de tarjetas de crédito de inmediato.
  • Suscríbete a servicios que te ayuden a controlar tu información en internet.
  • Asegúrate de que tu iPhone esté actualizado con las últimas actualizaciones de software.
  • Elige contraseñas robustas y activa la autenticación de dos factores.
  • Considera la información que compartes online o en redes sociales.
  • Investiga qué tarjetas de crédito tienen protecciones avanzadas contra el fraude.
  • Sé precavido/a con los correos electrónicos o llamadas sospechosas.

- I'm here with MKBHD,<br>and we're gonna try to steal<br>$10,000 from his locked iPhone.<br>- Really hope it doesn't work.<br>Really hope it doesn't work.<br>- I'm gonna get you to put that phone down<br>on top of this device.<br>- [Marques] Okay.<br>- Just put it down there.<br>- Just put it on like a, all right.<br>- I feel like I'm a bit of a magician,<br>but I'm like-<br>- Yeah.<br>- I haven't changed anything, right?<br>- Okay. Yeah.<br>- It's still locked.<br>- It's locked.<br>- Nothing else.<br>- Yeah.<br>- This is just a regular payment terminal.<br>- Yeah.<br>- Nothing weird about that.<br>- Seen these.<br>- And we'll start with a<br>little, like, maybe 100.<br>No, maybe $5?<br>Let's start with something like-<br>- Yeah, five. Five.<br>- Start with five.<br>- That sounds great.<br>- Yeah. Five bucks.<br>Do you think that we can take,<br>like, will we be able to<br>get this out of your phone?<br>- I hope not, but I<br>kinda feel like you will.<br>Let's see.<br>- So, now I'm gonna<br>charge $5 on this device.<br>Your phone's still locked, right?<br>- Yep.<br>- I haven't done anything.<br>- It's like a David Blaine.<br>- [Henry] It's like the<br>nerdiest David Blaine.<br>- Yeah. (chuckles)<br>- Sweet, so.<br>Just try to tap. We'll go.<br>(phone chimes)<br>- What just happened on my phone?<br>Approved? Whoa, whoa, approved.<br>(coins clinking)<br>So, okay.<br>I heard something happen on my phone<br>while you tapped this on this.<br>- Yes.<br>We got a little receipt for you.<br>- Credit verified on device, $5.<br>So, I'm gonna check my phone.<br>Ah, oh, I have a new $5 charge.<br>And it's time stamped right now.<br>I don't like that at all.<br>So, that's concerning.<br>Oh, so my phone had to be on this thing?<br>- [Henry] Yes.<br>- Did it have to be on this thing?<br>Or like, near it, I guess?<br>- So the way, well, I<br>could explain how it works-<br>- Yeah.<br>- But maybe before that,<br>$5, it's not very much.<br>- Yeah.<br>- Do we want to try upping it a bit?<br>- I...<br>- I'm gonna enter a<br>slightly larger amount.<br>- Careful. Careful with that.<br>Careful, careful.<br>That's a lot of zeros. Careful with that.<br>Oh my God. Okay.<br>- Do you even think it's<br>possible? Firstly, $10,000.<br>- I mean, the credit, the limit<br>on the card is above that.<br>I don't know if Apple<br>Pay will let you do that.<br>- The question is also<br>are you used to spending<br>this amount of money<br>on this card, you know?<br>- Not from my phone.<br>It's like a big screen activity.<br>- Yeah.<br>- Like, $10,000 purchase,<br>I gotta be checking everything.<br>So, yeah, no. This would be unusual.<br>- Let's see it. Let's see if it works.<br>Okay, I'm gonna do it again.<br>- Okay.<br>- We're just,<br>all we gotta do again.<br>Put your phone locked.<br>Phone-<br>- On this device.<br>- Locked on that device.<br>- [Henry] Yes, exactly.<br>And okay, we're gonna<br>start the script again.<br>Okay.<br>(suspenseful music)<br>(phone chimes)<br>- [Marques] Uh-uh.<br>(coins clinking)<br>Uh-uh. No.<br>- No? (laughs)<br>- It's just green. Approved.<br>- Print that out. Print that.<br>(receipt sprinting)<br>That is crazy.<br>- Oh my God. So, so, yeah,<br>I'm gonna need that back.<br>- Yeah. (laughs)<br>- For sure,<br>I'm gonna need that back.<br>But also, did that just?<br>Yeah, wow. It worked.<br>- $10,000.<br>- All right. I believe you.<br>I definitely believe you.<br>How do we get this back?<br>We do like a little Venmo or like PayPal?<br>How do we even?<br>- You know,<br>do we give it back though?<br>- Reverse the transaction.<br>I don't even know. Do I call my company?<br>Yeah, that's crazy.<br>- Yeah, exactly.<br>You can keep this if you wanna-<br>- Yeah.<br>- Get it framed.<br>- Yeah. A receipt of the damage.<br>I never unlock my phone.<br>I never put in a password.<br>I never did what I would normally do<br>to verify a transaction on my phone.<br>- Yes.<br>- It just happened<br>to be on top of that.<br>- So, how did we do it?<br>Well, we teamed up with<br>two cybersecurity experts,<br>Professors Ioana Boureanu and Tom Chothia.<br>And we went to visit them<br>at the University of Surrey,<br>where they ran us through a<br>unique hack that they developed<br>to bypass the phone's lock<br>screen and then to drain funds<br>from inside its mobile wallet.<br>- Without unlocking my phone<br>is the real magic part.<br>That's crazy.<br>- And the craziest thing<br>of all is that this hack<br>was made public back in 2021.<br>So, people have known that it's possible<br>to take money from locked phones<br>in this way for five years.<br>So, what kind of amounts does this?<br>- The only limit is how much someone has<br>in their bank account.<br>(suspenseful music)<br>- Yet the loophole<br>still hasn't been fixed.<br>So, how does it work?<br>Well, whenever you use Tap to<br>Pay, your phone and the reader<br>exchange information<br>about the transaction.<br>But they send this<br>information through the air<br>by a shared magnetic field,<br>so we can intercept the<br>communication and alter it.<br>All we need to do is to<br>insert our own devices<br>in between the phone and the reader.<br>First, we tap Marques's<br>phone against this.<br>It's an NFC device called the Proxmark.<br>To Marques's phone,<br>the proxmark looks like<br>a typical card reader.<br>So, it happily sends over<br>its transaction data.<br>That proxmark then sends that<br>data straight to our laptop,<br>where we run a Python<br>script to modify it.<br>Next, the laptop sends the<br>data to our burner phone,<br>which I tap on the actual card reader.<br>To the reader, my phone<br>looks just like Marques's.<br>So, both Marques's phone<br>and the card reader<br>think they're talking<br>directly to each other,<br>when in fact all their communication<br>goes through our series of devices.<br>This is a classic<br>man-in-the-middle attack.<br>Now, getting in the middle<br>to intercept the data<br>is actually the easy part.<br>The hard part is what you<br>need to do to that data<br>to trick the phone and the reader<br>into authorizing the transaction.<br>See, to actually steal<br>money using this attack,<br>you have to get past three layers<br>of defense on both systems.<br>And to do that, we have<br>to tell three lies.<br>Two to the phone, and one to the reader.<br>So, the first layer of<br>defense is the simplest.<br>The phone is locked.<br>And in an ordinary transaction,<br>you have to unlock your phone to pay.<br>But this is no ordinary transaction.<br>So, you know, if you<br>ever go to the subway,<br>there's a feature that Apple's<br>created where you know,<br>when you walk through,<br>they don't want a bunch<br>of people lining up<br>and having to unlock their face.<br>And you know, maybe they're wearing a coat<br>and glasses and stuff.<br>- Oh. Express Transit Mode.<br>- Apple introduced express<br>transit mode in 2019<br>to let you make transit transactions<br>without having to unlock your phone.<br>The way this works is<br>that the payment terminals<br>on the subway or on the<br>bus broadcast a message<br>that identifies them<br>as a transit terminal.<br>Then, when you tap your phone to pay,<br>it looks for whatever card<br>is in the transit slot<br>of its mobile wallet and it<br>pays without needing to unlock.<br>This is super convenient,<br>but we can also abuse it.<br>- We found out how this worked<br>by going to the London Underground<br>with our laptops and our equipment,<br>and actually scanning the signals<br>and seeing what the gate<br>was saying to the phone.<br>And that's how we discovered<br>this code the gate send<br>which unlocked the phone.<br>- We used the proxmark to<br>broadcast that same code,<br>which fools Marques's phone into thinking<br>that it's a transit reader.<br>So, when we tap Marques's<br>phone against the proxmark,<br>it's now expecting to<br>receive another message<br>with the details about<br>the transit transaction.<br>Here's what that message<br>would typically look like<br>in binary code.<br>Each of these bits carries<br>important information<br>about the transaction.<br>Now, the important part of this<br>message for us is this bit.<br>An authentic transit transaction<br>would have a 1 right here.<br>This tells the phone that<br>the reader may be offline.<br>Like if it's underground on the subway.<br>In which case the phone would need to send<br>an extra layer of authentication.<br>So, when Marques's phone<br>receives the transaction request<br>from what it thinks is a transit reader,<br>it's gonna be expecting<br>that value to be set to 1.<br>But in reality, the<br>device sending the request<br>is our retail reader, and<br>this reader is online,<br>which means that that bit<br>is currently set to zero.<br>Therefore, to trick the phone<br>into accepting the transaction,<br>we intercept the message from the reader,<br>pass it through our computer,<br>and we change that 0 to a 1.<br>So by the time the message<br>gets to Marques's phone,<br>it looks like a transit transaction.<br>As this communicates through our computer,<br>we're convincing the phone<br>that it is in fact talking<br>to a transit terminal.<br>But now there's a second line<br>of defense we need to break.<br>With this first lie,<br>we bypassed the need to unlock the phone.<br>And we can now trick it<br>into making small<br>payments of a few dollars.<br>Kind you'd expect on the subway.<br>But if we suddenly went and<br>asked the phone for $10,000,<br>well, its guard would go way back up.<br>After all, it's pretty<br>unusual for a transit reader<br>to ask for such a large amount of money.<br>So, this activates a<br>second layer of defense.<br>Customer verification.<br>On contactless payments like this,<br>there are two categories of transaction.<br>We got high value and low value.<br>Any transaction that's<br>classified as high value<br>requires additional<br>verification from the customer.<br>For example, in the UK,<br>most banks require a pin<br>or a fingerprint or facial recognition<br>for any transaction over 100 pounds.<br>So, for us to get this<br>$10,000 payment through<br>without customer verification,<br>we need to trick the phone into thinking<br>that $10,000 is in fact<br>a low value transaction.<br>And that's actually surprisingly simple.<br>That's because to determine<br>whether the transaction is high value,<br>Marques's phone doesn't actually look<br>at the numerical value of $10,000.<br>It just looks at another<br>single bit of information<br>in the transaction data.<br>A 1 here means high<br>value and 0 means low.<br>The reason for this is that the boundary<br>between high and low value<br>varies from country to country.<br>And of course,<br>different countries operate<br>in different currencies.<br>So, a simple label allows the flexibility<br>to deal with these variations.<br>And it allows the limits to be changed<br>without the banks needing<br>to issue new cards.<br>So, all we need to do<br>is intercept the message from the reader,<br>flip that bit to a zero,<br>and then the phone will believe<br>that this transaction is low value<br>even though it's for $10,000.<br>Then, when the phone receives our request<br>for a $10,000 transaction,<br>it doesn't ask for customer verification.<br>It just goes ahead and<br>authorizes the transaction.<br>Now, you might be asking,<br>why is this data so easy to tamper with?<br>And we'll get to that in just a minute.<br>But we have one final<br>security check to overcome.<br>See, with these first two lies,<br>we bypassed unlocking the phone<br>and then tricked it into<br>making a high value transaction<br>without asking for verification.<br>So, the phone is fully convinced<br>and it's ready to make the payment.<br>But we still need to convince the reader<br>that the transaction's valid.<br>And this is where our third lie comes in.<br>When Marques's phone replies,<br>it says it's approved<br>the $10,000 transaction.<br>But it also says that it hasn't asked<br>for customer verification.<br>No pin, no fingerprint,<br>no facial recognition.<br>But if the reader sees this,<br>it'll reject the transaction<br>because it knows that the $10,000 payment<br>it originally asked for is high value.<br>It should therefore require<br>customer verification.<br>So, now we need to trick the reader<br>into thinking that the customer<br>has verified the payment.<br>So, we intercept the<br>response from Marques's phone<br>and look for the bit of information<br>that says customer<br>verification hasn't been done.<br>Then we change it to say that<br>the payment has been verified<br>by flipping this 0 to a 1.<br>Now, the reader's happy.<br>It forwards the information onto the bank,<br>and the bank authorizes the payment.<br>After all, it sees a<br>transaction that's been verified<br>by the customer on their device.<br>(upbeat lively music)<br>(notification beeps)<br>Green approved.<br>(coins clinking)<br>- That is crazy.<br>- Verified on device?<br>- Yeah, verified.<br>- You didn't, you didn't verify it.<br>- Right.<br>- So, why isn't all this<br>information encrypted?<br>That would make it impossible<br>to secretly tamper with.<br>Well, the way the phone<br>and reader communicate<br>has to be compatible with<br>thousands of different devices,<br>which would be impossible<br>to update all in one go.<br>So for that reason, the<br>information we've looked at so far<br>is just sent across unencrypted.<br>Even still, phones, readers and banks<br>all have checks in place to make sure<br>an attack like this can't happen.<br>And normally, it can't.<br>Except if you happen to use<br>a specific type of phone<br>and a specific type of card.<br>Because when you combine them<br>in this particular scenario,<br>they create a loophole.<br>So, our hack relied on a specific phone<br>and credit card combination.<br>And we also use a sophisticated method<br>developed by cybersecurity experts.<br>But hackers or scammers online,<br>well, they don't need to be that smart.<br>Often they can just buy<br>information to target you.<br>When I started working at Veritasium,<br>I was on a work trip to go<br>meet Derek for the first time.<br>And I got an email from<br>somebody was saying he was Derek<br>asking for my phone number.<br>That made a ton of sense.<br>I was leaving the airport.<br>So, I just responded by<br>sending my phone number.<br>I immediately was like,<br>"Wait, let me look at that."<br>I checked the email. Not Derek.<br>Of course, for the next few months<br>I was just getting scam<br>call after scam call.<br>That's one way they can get<br>you. I felt like an idiot.<br>But it's not just scam calls like that.<br>I've also had that feeling<br>after news of a major data breach.<br>I've wondered whether<br>me using some website<br>has led to my personal information<br>being exposed somewhere<br>without me even knowing about it.<br>But you can protect your personal info<br>with today's sponsor, Incogni.<br>See, whenever scammers purchase<br>your email, phone number,<br>and even your home<br>address from data brokers,<br>Incogni automates the<br>grueling process of requesting<br>that these data brokers<br>delete your information.<br>Okay, so I've had this since June 2025.<br>And since then, we've had 94<br>different removal requests.<br>And I really like how you<br>can track the progress<br>in this dashboard here.<br>They've estimated that that saved me<br>70 hours and 30 minutes of my own time<br>if I were to reach out<br>to these people myself.<br>And with Incogni's new<br>custom removal feature<br>in their unlimited plans,<br>you can point to any specific site<br>where your information is visible.<br>And then, one of their privacy agents<br>will take care of the rest.<br>So, to take your data<br>off the market today,<br>go to incogni.com/veritasium<br>and then use code Veritasium for 60% off.<br>You can click the link below<br>or you can scan this QR<br>code to claim that 60% off<br>and get your personal data off the market.<br>I wanna thank Incogni<br>for sponsoring this video<br>about taking money from Marques Brownlee.<br>And now, let's get back<br>to that thing.<br>So, which combination of card and phone<br>make this hack possible?<br>Firstly, the phone has to be an iPhone.<br>As we saw earlier, when<br>an iPhone is deciding<br>whether to ask for customer verification,<br>it doesn't look at the numerical<br>value of the transaction.<br>It only looks at the high<br>value or low value label<br>provided by the reader.<br>But other phones don't work that way.<br>For example, when a Samsung<br>phone goes into transit mode,<br>it doesn't rely on this low<br>value label from the reader.<br>It looks at the actual numerical<br>value of the transaction<br>and it only accepts a payment of $0.<br>Then it relies on the transport provider<br>to count up all the times<br>you've used the subway,<br>and then to send you a<br>bill at the end of the day.<br>So, if a Samsung phone<br>saw a transit terminal<br>trying to charge you<br>$10,000 for a single tap,<br>it would immediately reject it.<br>But it's not just Apple's transit mode<br>that makes this hack possible.<br>You've gotta have one<br>specific type of card<br>in the transit slot.<br>- It was truly a design<br>feature that was introduced<br>by the way you mixed Apple and Visa.<br>- And the reason that this<br>works with a Visa card,<br>but wouldn't, with say, a MasterCard<br>comes down to the different<br>processes they use<br>to verify transactions.<br>So, what is it about<br>Visa's verification process<br>that makes this hack possible?<br>In a previous video, we saw<br>that any card transaction<br>relies on a secret cryptographic key<br>shared by the card and the bank.<br>When you tap the card<br>or phone onto a reader,<br>the reader sends across<br>a long string of transaction details.<br>The card then applies its secret<br>key to garble that message<br>into a unique code for the transaction.<br>The card sends this to the reader,<br>which the reader forwards onto the bank,<br>along with the raw transaction details.<br>The bank then applies its own secret key<br>to the raw data as well.<br>And if the output matches<br>the one from the card,<br>the bank authorizes the transaction.<br>This is called symmetric cryptography<br>since the card and the bank<br>use the same secret key.<br>And this step is required<br>in all transactions.<br>No matter whether you<br>have a Visa, a MasterCard,<br>or something else.<br>But there's actually<br>another layer of security<br>which MasterCard uses in<br>all of its transactions.<br>But in this particular case, Visa doesn't.<br>This layer of security is not<br>between the card and the bank,<br>but between the card and the reader.<br>And it's at this step where<br>MasterCard thwarts our attack.<br>The second step relies on<br>asymmetric cryptography.<br>So-called because it<br>uses two different keys.<br>A private key for the card and<br>a public key for the reader.<br>It starts with the reader sending across<br>the transaction details to<br>the card just like before.<br>The card then uses its private<br>key to garble that message<br>into another long string of digits.<br>This is the card's digital<br>signature for the transaction.<br>The card sends this<br>signature back to the reader<br>along with the public key,<br>which the reader then uses<br>to verify that the signature<br>came from that specific card<br>for this specific transaction.<br>To illustrate how this works,<br>let's consider a simple example.<br>The private key and public<br>key both have two components.<br>N is a shared number.<br>In this case, let's say 55.<br>D is the card's private<br>number. Let's say 7.<br>And E is the public number. Let's say 3.<br>Now, when the reader sends<br>across the raw transaction data,<br>it represents it as one long number.<br>But for simplicity, we'll<br>use a much smaller one.<br>Let's say 2.<br>To sign for the transaction,<br>the card or the phone<br>raises the transaction<br>number, in this case 2,<br>to the power of its private<br>number, so we get 128.<br>And then divides this by the<br>shared number, 128 over 55,<br>which leaves a remainder of 18.<br>And this is the card signature, 18,<br>which it sends on to the reader.<br>Now, the reader needs to know<br>whether the transaction is valid.<br>So, it takes the card signature<br>and raises it to the power<br>of the public number.<br>Then, it takes the remainder<br>when you divide by the shared number 55.<br>And you get 2.<br>This matches the original transaction data<br>the reader sent to the card.<br>The reason this works is that<br>the private and public numbers<br>are specifically chosen<br>so that when combined<br>with the shared number,<br>the public key effectively<br>reverses the operation<br>of the private key.<br>And this allows the reader to verify<br>that the card signature is valid<br>without ever having<br>seen its private number.<br>This is based on a type of<br>cryptography called RSA.<br>In reality, the numbers<br>involved are much larger.<br>But that makes it incredibly secure<br>because that makes it virtually impossible<br>to reverse engineer<br>the card's private key.<br>And it also means that<br>even a one digit change<br>in the transaction data will<br>produce a different result<br>when the reader checks<br>the phone's signature,<br>in which case the reader<br>won't approve the transaction.<br>This is a problem because<br>we've modified the data.<br>The reader's expecting a signature<br>for a high value retail transaction.<br>But we intercepted the communication.<br>So the phone signature<br>is actually for low value<br>transit transaction.<br>This wouldn't pass the<br>asymmetric signature check.<br>But while MasterCard always requires<br>this asymmetric verification,<br>which would spot our hack, Visa doesn't.<br>They only require this<br>signature in certain situations.<br>Like, when the reader's offline.<br>For example, when you're<br>underground with no signal,<br>there's no way for the reader<br>to communicate with the bank<br>for that first layer of<br>symmetric cryptography.<br>At least not until it comes back online.<br>So, during our attack,<br>we make sure the reader<br>is online the whole time.<br>That way, it doesn't bother using<br>the asymmetric layer of security,<br>which contains the signature<br>that would unravel our lies.<br>But the funny thing is<br>we've tricked the phone<br>into thinking it's interacting<br>with the transit reader.<br>And transit transactions<br>are one of those times<br>where Visa does require<br>the asymmetric signature,<br>since the reader could be<br>underground on the subway,<br>and therefore offline.<br>So, the phone actually does send across<br>its signature to the reader,<br>but the reader doesn't check it.<br>Because in reality, the reader's online.<br>So, instead it just relies<br>on that first layer of<br>security with the bank,<br>even though if it did<br>check the phone signature,<br>it would've all the evidence<br>it needed to stop the hack.<br>(screen whooshing)<br>So yeah, you go.<br>- Makes sense<br>that it's that sophisticated<br>'cause it shouldn't be that easy,<br>but that still seemed way too easy.<br>- And Marques was not the only victim.<br>I thought it was only fair<br>that I first try it out on myself.<br>(phone beeping)<br>- Approved it.<br>- Woohoohoo!<br>- Yeah, here. You souvenir<br>from the UK from Tom and me.<br>- Oh, what a lovely receipt<br>for this theft. (chuckles)<br>And then I got another victim<br>with a bit of a bigger budget.<br>Our channel has a CFO basically,<br>who lives very nearby.<br>What we're doing is we're setting it<br>to be your transit card.<br>- Okay.<br>- So that means<br>that if you're in, London <br>you have to use the tube-<br>- Yeah.<br>- It'll take money<br>from this card.<br>Something just happened.<br>- Yeah.<br>(everyone laughs)<br>How you feel about that?<br>- Oh my goodness me.<br>Oh my-<br>- [Henry] There you go.<br>- We were just gonna meet for a drink.<br>That's what, you know,<br>that was the agreement.<br>- In the real world, say you<br>had your phone in your pocket.<br>- Yeah.<br>- I would walk by you-<br>- Yeah.<br>- Doing this.<br>And Tom would have this<br>in the shop and pay.<br>- The easiest way for this<br>to actually be a crime<br>would be a stolen iPhone.<br>- [Henry] Sure.<br>- And then someone goes and<br>spends thousands of pounds.<br>- So you know, you<br>could buy a car with us.<br>- Jesus. Yeah, yeah.<br>Theoretically. Geez.<br>- Yeah.<br>- Wow.<br>- I guess from your perspective,<br>you've revealed all this<br>information publicly<br>and you're telling us.<br>We're walking through it in great detail.<br>How do we stop people from using this for-<br>Or can we stop people?<br>Like, whose responsibility<br>is it to stop this?<br>- Oh, whose responsibility is<br>it is an interesting question.<br>- Yeah.<br>- But you can stop it<br>by turning transit mode off.<br>- Or not turn it off,<br>but not have a Visa card<br>in transit mode on an Apple.<br>- Yes.<br>And you do need to be careful<br>because as soon as you<br>have a suitable card<br>in your Apple wallet,<br>Express Transit Mode is<br>turned on by default.<br>This hack was first made<br>public way back in 2021<br>after the professors had informed<br>Apple and Visa privately.<br>And to get to the bottom<br>of why it's still possible,<br>we reached out to Apple,<br>and they didn't agree to an interview.<br>But here's what they said.<br>"This is a concern with the Visa system,<br>but Visa does not believe<br>this kind of fraud<br>is likely to take place in the real world.<br>Visa has made it clear<br>that their cardholders<br>are protected by Visa's<br>zero liability policy."<br>This is exactly the same as their position<br>when the hack was first<br>made public back in 2021.<br>So, it seems like Apple<br>are basically saying,<br>"Well, this is a Visa problem."<br>So, we went and asked<br>Visa what they thought.<br>- I think this specific vulnerability<br>is likely within a controlled setting.<br>Very unlikely from a<br>scaled real world setting.<br>And then, kind of the last point<br>is from a consumer perspective,<br>is that in the cases<br>where this is successful,<br>they have the ability to<br>dispute this transaction<br>and get their refunds returned to them.<br>- I think that's fair.<br>You're saying it's not entirely scalable,<br>and then even if it does happen,<br>we'll give you your money back.<br>Like, that's a great,<br>that's a great stance.<br>I still think though, a lot of people,<br>and I think our audience<br>would really wanna hear<br>that you're actually making<br>the technical changes<br>to stop this from ever happening again.<br>- 'Cause when you think about<br>it from a scale perspective<br>and whether the network level defenses<br>that we have are effective in making sure<br>that this type of<br>vulnerability is isolated,<br>we believe it is effective.<br>Because if it wasn't, you<br>would hear a lot more data<br>about how this is an<br>issue, and it simply isn't.<br>The point that I'm making is<br>that you're never gonna be able<br>to completely eradicate<br>any specific type of fraud<br>'cause it's going to exist, right?<br>- Yes.<br>- What I'm saying<br>is that we have the right<br>detections in place to ensure<br>that this type of fraud is not endemic.<br>- Would it not be even better<br>to just say this type of<br>fraud is not possible.<br>Why not just say it's not probable?<br>Why not just totally get rid of it<br>by implementing an<br>actual technical change?<br>- If you think about for every $100<br>of spend that occurs on card payments.<br>10 cents of that is lost to fraud.<br>So, every $100 it's 10 cents.<br>If you look at in-person transactions,<br>which is what kind of this topic<br>is really much more related to.<br>That number goes down to 2 cents<br>for every $100 of fraud that's being made.<br>- So, I've been thinking about this hack<br>and it reminds me a lot about people<br>who are afraid of flying.<br>Statistically, you're a lot more likely<br>to crash on the drive to the airport<br>than you are in the air.<br>So, I do understand<br>Visa's argument generally.<br>Compared to other kinds of fraud,<br>this is just a drop in the ocean.<br>But airlines don't accept<br>a small number of crashes each year<br>as an inevitable cost of doing business.<br>No. Anytime there's a crash,<br>they analyze it meticulously.<br>And then they do everything in their power<br>to make sure that it's<br>never gonna happen again.<br>Visa says that they'll<br>get you your money back<br>and that's great.<br>But you've still gotta notice the charge,<br>dispute it, and then wait.<br>Imagine waking up to see<br>$10,000 gone from your account.<br>That's money for rent, insurance,<br>car payment, or a medical bill.<br>Even if the refund does come,<br>the stress before is gonna be very real.<br>So for me, the question<br>is whether just saying<br>they're gonna refund it after<br>the fact is good enough.<br>Or when a system touches<br>the lives of so many people,<br>should we expect better?<br>One last thing.<br>We've been nominated for two Webby Awards.<br>One, for our video about the<br>dangers of forever chemicals<br>and that's been nominated<br>for best long form video.<br>The other one is about American football<br>and we did it with Tom Brady,<br>and that's been nominated<br>for Best Creator to Creator Collaboration.<br>The thing is, when I checked last,<br>we were second place in<br>voting for both of them.<br>So if you wanna help us out,<br>you can go to the Webby website<br>and vote for us up till April 16th.<br>So if you do that, thank you very much.<br>That'll help us out a lot.<br>And as always, thank you for watching.<br>Okay, yeah. That's the whole demo.<br>I will now give you your money back.<br>- Yes.<br>- [Henry] Okay, we gotta. I'm here with MKBHD and we're gonna try<br>to steal $10,000 from his locked iPhone.<br>>> Really hope it doesn't work. Really hope<br>it doesn't work.<br>>> I'm gonna get you to put that phone down<br>on top of this device.<br>>> Okay.<br>>> Just Just put it down there.<br>>> Just put it on like a All right.<br>>> I feel like I'm a bit of a magician, but<br>I'm like I haven't changed anything.<br>Right.<br>>> Okay. Yeah.<br>>> It's It's still locked.<br>>> It's locked.<br>>> Nothing else.<br>>> Yeah.<br>>> This just a regular payment terminal.<br>Nothing Nothing weird about that.<br>>> Seen these?<br>>> We'll start with a little like maybe<br>100. No, maybe $5. Let's start something<br>like Yeah. Five. Five. Start with five.<br>Sounds great. Yeah. Five bucks. Do you<br>think that we can take like will we be<br>able to get this out of your phone?<br>>> I hope not, but I kind of feel like you<br>will.<br>Let's see.<br>>> So, now I'm going to charge $5 on this<br>device.<br>>> Your phone's still locked, right?<br>>> Yep.<br>>> I haven't done anything<br>>> like a David Blaine.<br>>> It's like the the nerdiest David Bla.<br>>> Yeah.<br>>> Sweet. So, let's try a tap. It will go.<br>>> What just happened on my phone?<br>Approve. Whoa. Whoa. Approved. So, okay.<br>I heard something happen on my phone<br>while you tap this on this.<br>>> Yes.<br>>> We got a little receipt for you.<br>>> Uh, credit verified on device $5. So,<br>I'm going to check my phone. Uh oh, I<br>have a new $5 charge<br>and it's timestamped right now.<br>I don't like that at all.<br>So, that's concerning. Oh, so my phone<br>had to be on this thing.<br>>> Yes.<br>>> Did it have to be on this thing or like<br>near it, I guess? So, the way Well, I<br>could explain how it works, but maybe<br>before that,<br>>> $5. It's not very much.<br>>> Yeah.<br>>> Do we want to try<br>>> upping it a bit? I I'm going to enter a<br>slightly larger amount.<br>>> Careful. Careful with that. Careful.<br>Careful. That's a lot of zeros. Careful<br>with that. Oh my god. Okay.<br>>> Do Do you even think it's possible?<br>First, firstly, $10,000.<br>>> I mean, the credit the limit on the card<br>is above that. I don't know if Apple Pay<br>will let you do that.<br>>> The question is also, are you used to<br>spending this amount of money on this<br>card? You know,<br>>> not from my phone.<br>>> That's like a big screen activity like<br>10,000 $10,000 purchase. I got to be<br>checking everything. So, uh yeah. No,<br>this would be unusual.<br>>> Let's see it. Let's see if it works.<br>Okay, I'm going to do it again.<br>>> Okay,<br>>> we're just all All we got to do again,<br>put your phone locked<br>>> phone<br>>> on this device. locked<br>on that device.<br>>> Yes, exactly.<br>And Okay, we're going to start the<br>script again.<br>Okay. Mhm.<br>No, just green approved.<br>>> Put that over that.<br>>> That is crazy.<br>>> Oh my god. So, so, uh, yeah, I'm going<br>to need that back.<br>>> Yeah,<br>>> for sure. I'm going to need that back.<br>But also, did that just Yeah. Wow. It<br>worked.<br>>> $10,000.<br>>> All right. I believe you. I definitely<br>believe you. Uh,<br>how do we get this back? We do like a<br>little Venmo or like PayPal.<br>>> Do we give it back?<br>>> Where's the transaction? I don't even<br>know. Do I call my That's crazy.<br>>> Yeah, exactly. You can keep this if you<br>want to.<br>>> Yeah.<br>>> Get it framed.<br>>> Yeah. A receipt of the of the damage. I<br>never unlocked my phone. I never put in<br>the password. I never did what I would<br>normally do to verify a transaction on<br>my phone.<br>>> Yes,<br>>> it just happened to be on top of that.<br>>> So, how did we do it? Well, we teamed up<br>with two cyber security experts,<br>professors Yana Borenu and Tom Chofia,<br>and we went to visit them at the<br>University of Suri, where they ran us<br>through a unique hack that they<br>developed to bypass a phone's lock<br>screen and then to drain funds from<br>inside its mobile wallet without<br>unlocking my phone is is the real magic<br>part. That's crazy. And the craziest<br>thing of all is that this hack was made<br>public back in 2021. So people have<br>known that it's possible to take money<br>from locked phones in this way for 5<br>years.<br>>> So what kind of amounts does this<br>>> The only limit is how much someone has<br>in their bank account.<br>>> Yet the loophole still hasn't been<br>fixed.<br>So how does it work? Well, whenever you<br>use Tap to Pay, your phone and the<br>reader exchange information about the<br>transaction, but they send this<br>information through the air via a shared<br>magnetic field. So, we can intercept the<br>communication and alter it. All we need<br>to do is to insert our own devices in<br>between the phone and the reader. First,<br>we tap Marquez's phone against this.<br>It's an NFC device called the Prox Mark.<br>To Marquez's phone, the Prox Mark looks<br>like a typical card reader, so it<br>happily sends over its transaction data.<br>That Proxm Mark then sends that data<br>straight to our laptop where we run a<br>Python script to modify it. Next, the<br>laptop sends the data to our burner<br>phone, which I tap on the actual card<br>reader. To the reader, "My phone looks<br>just like Marquez's."<br>So, both Marquez's phone and the card<br>reader think they're talking directly to<br>each other, when in fact, all their<br>communication goes through our series of<br>devices. This is a classic<br>man-in-the-middle attack.<br>Now, getting in the middle to intercept<br>the data is actually the easy part. The<br>hard part is what you need to do to that<br>data to trick the phone and the reader<br>into authorizing the transaction. See,<br>to actually steal money using this<br>attack, you have to get past three<br>layers of defense on both systems. And<br>to do that, we have to tell three lies.<br>Two to the phone and one to the reader.<br>So, the first layer of defense is the<br>simplest. The phone is locked. And in an<br>ordinary transaction, you have to unlock<br>your phone to pay. But this is no<br>ordinary transaction.<br>>> So, you know, if you ever go to the<br>subway, there's a feature that Apple's<br>created where, you know, when you walk<br>through, they don't want a bunch of<br>people lining up and, you know, having<br>to unlock their face and, you know,<br>maybe they're wearing a coat and glasses<br>and stuff.<br>>> Express Transit mode.<br>>> Apple introduced express transit mode in<br>2019 to let you make transit<br>transactions without having to unlock<br>your phone.<br>The way this works is that the payment<br>terminals on the subway or on the bus<br>broadcast a message that identifies them<br>as a transit terminal. Then when you tap<br>your phone to pay, it looks for whatever<br>card is in the transit slot of its<br>mobile wallet and it pays without<br>needing to unlock. This is super<br>convenient, but we can also abuse it. We<br>found out how this worked by going to<br>the London Underground with our laptops<br>and our equipment and actually scanning<br>the signals and seeing what the gate was<br>saying to the phone. And that's how we<br>discovered this code the gates send<br>which unlocked the phone. We used the<br>Prox Mark to broadcast that same code<br>which fools Marquez's phone into<br>thinking that it's a transit reader. So,<br>when we tap Marquez's phone against the<br>prox mark, it's now expecting to receive<br>another message with the details about<br>the transit transaction. Here's what<br>that message would typically look like<br>in binary code. Each of these bits<br>carries important information about the<br>transaction. Now, the important part of<br>this message for us is this bit. An<br>authentic transit transaction would have<br>a one right here. This tells the phone<br>that the reader may be offline, like if<br>it's underground on the subway, in which<br>case the phone would need to send an<br>extra layer of authentication. So when<br>Marquez's phone receives the transaction<br>request from what it thinks is a transit<br>reader, it's going to be expecting that<br>value to be set to one. But in reality,<br>the device sending the request is our<br>retail reader. And this reader is<br>online, which means that that bit is<br>currently set to zero. Therefore, to<br>trick the phone into accepting the<br>transaction, we intercept the message<br>from the reader, pass it through our<br>computer, and we change that zero to a<br>one. So, by the time the message gets to<br>Marquez's phone, it looks like a transit<br>transaction.<br>As this communicates through our<br>computer, we're we're convincing the<br>phone that it is in fact talking to a<br>transit terminal. But now, there's a<br>second line of defense we need to break.<br>With this first lie, we bypassed the<br>need to unlock the phone, and we can now<br>trick it into making small payments of a<br>few dollars, the kind you'd expect on<br>the subway. But if we suddenly went and<br>asked the phone for $10,000, well, its<br>guard would go way back up. After all,<br>it's pretty unusual for a transit reader<br>to ask for such a large amount of money.<br>So, this activates a second layer of<br>defense, customer verification. On<br>contactless payments like this, there<br>are two categories of transaction. We<br>got high value and low value. Any<br>transaction that's classified as high<br>value requires additional verification<br>from the customer. For example, in the<br>UK, most banks require a PIN or<br>fingerprint or facial recognition for<br>any transaction over £100. So, for us to<br>get this $10,000 payment through without<br>customer verification, we need to trick<br>the phone into thinking that $10,000 is<br>in fact a low value transaction.<br>And that's actually surprisingly simple.<br>That's because to determine whether the<br>transaction is high value, Marquez's<br>phone doesn't actually look at the<br>numerical value of $10,000. It just<br>looks at another single bit of<br>information in the transaction data. A<br>one here means high value and zero means<br>low. The reason for this is that the<br>boundary between high and low value<br>varies from country to country. And of<br>course, different countries operate in<br>different currencies. So, a simple label<br>allows the flexibility to deal with<br>these variations. and it allows the<br>limits to be changed without the banks<br>needing to issue new cards. So, all we<br>need to do is intercept the message from<br>the reader, flip that bit to a zero, and<br>then the phone will believe that this<br>transaction is low value even though<br>it's for $10,000.<br>Then, when the phone receives our<br>request for a $10,000 transaction, it<br>doesn't ask for customer verification.<br>It just goes ahead and authorizes the<br>transaction.<br>Now, you might be asking, why is this<br>data so easy to tamper with? And we'll<br>get to that in just a minute. But we<br>have one final security check to<br>overcome. See, with these first two<br>lies, we bypassed unlocking the phone<br>and then tricked it into making a high-v<br>value transaction without asking for<br>verification. So, the phone is fully<br>convinced and it's ready to make the<br>payment, but we still need to convince<br>the reader that the transaction is<br>valid. And this is where our third lie<br>comes in. When Marquez's phone replies,<br>it says it's approved the $10,000<br>transaction, but it also says that it<br>hasn't asked for customer verification.<br>No PIN, no fingerprint, no facial<br>recognition. But if the reader sees<br>this, it'll reject the transaction<br>because it knows that the $10,000<br>payment it originally asked for is high<br>value and should therefore require<br>customer verification. So now we need to<br>trick the reader into thinking that the<br>customer has verified the payment. So we<br>intercept the response from Marquez's<br>phone. and look for the bit of<br>information that says customer<br>verification hasn't been done. Then we<br>change it to say that the payment has<br>been verified by flipping this zero to a<br>one. Now the reader's happy. It forwards<br>the information onto the bank and the<br>bank authorizes the payment. After all,<br>it sees a transaction that's been<br>verified by the customer on their<br>device.<br>Green approved.<br>That is crazy.<br>>> Verified on device.<br>>> Yeah, verified.<br>>> You didn't verify it,<br>>> right? So, why isn't all this<br>information encrypted? That would make<br>it impossible to secretly tamper with.<br>Well, the way the phone and reader<br>communicate has to be compatible with<br>thousands of different devices, which<br>would be impossible to update all in one<br>go. So, for that reason, the information<br>we've looked at so far is just sent<br>across unencrypted.<br>Even still, phones, readers, and banks<br>all have checks in place to make sure an<br>attack like this can't happen. And<br>normally, it can't, except if you happen<br>to use a specific type of phone and a<br>specific type of card because when you<br>combine them in this particular<br>scenario, they create a loophole.<br>So, our hack relied on a specific phone<br>and credit card combination. We also use<br>a sophisticated method developed by<br>cyber security experts. But hackers are<br>scammers online. Well, they don't need<br>to be that smart. Often, they can just<br>buy information to target you. When I<br>started working at Veritasium, I was on<br>a work trip to go meet Derek for the<br>first time. And I got an email from<br>somebody was saying he was Derek asking<br>for my phone number. That made a ton of<br>sense. I was leaving the airport. So, I<br>just responded by sending my phone<br>number. I immediately was like, "Wait,<br>let me look at that." I checked the<br>email. Not Derek. Of course, for the<br>next few months, I was just getting scam<br>call after scam call. That's one way<br>they can get you. I felt like an idiot.<br>But it's not just scam calls like that.<br>I've also had that feeling after news of<br>a major data breach. I've wondered<br>whether me using some website has led to<br>my personal information being exposed<br>somewhere without me even knowing about<br>it. But you can protect your personal<br>info with today's sponsor, Incogn. See,<br>whenever scammers purchase your email,<br>phone number, and even your home address<br>from data brokers, Incogn automates the<br>grueling process of requesting that<br>these data brokers delete your<br>information. Okay, so I've had this<br>since June 2025. And since then, we've<br>had 94 different removal requests. And I<br>really like how you can track the<br>progress in this dashboard here. They've<br>estimated that that saved me 70 hours<br>and 30 minutes of my own time if I were<br>to reach out to these people myself. And<br>with Incogn's new custom removal feature<br>in their unlimited plans, you can point<br>to any specific site where your<br>information is visible. And then one of<br>their privacy agents will take care of<br>the rest. So to take your data off the<br>market today, go to<br>incogn.com/veritassium<br>and then use code veritassium for 60%<br>off. You can click the link below or you<br>can scan this QR code to claim that 60%<br>off and get your personal data off the<br>market. I want to thank Incogn for<br>sponsoring this video about taking money<br>from Marquez Brownley. And now let's get<br>back to that thing.<br>So which combination of card and phone<br>make this hack possible? Firstly, the<br>phone has to be an iPhone. As we saw<br>earlier, when an iPhone is deciding<br>whether to ask for customer<br>verification, it doesn't look at the<br>numerical value of the transaction. It<br>only looks at the high value or low<br>value label provided by the reader. But<br>other phones don't work that way. For<br>example, when a Samsung phone goes into<br>transit mode, it doesn't rely on this<br>low value label from the reader. It<br>looks at the actual numerical value of<br>the transaction, and it only accepts a<br>payment of $0. Then it relies on the<br>transport provider to count up all the<br>times you've used the subway and then to<br>send you a bill at the end of the day.<br>So if a Samsung phone saw a transit<br>terminal trying to charge you $10,000<br>for a single tap, it would immediately<br>reject it. But it's not just Apple's<br>transit mode that makes this hack<br>possible. You've got to have one<br>specific type of card in the transit<br>slot.<br>>> It was tr truly a design feature that<br>was introduced by the way you mixed<br>Apple and Visa. And the reason that this<br>works with a Visa card, but wouldn't<br>let's say a Mastercard, comes down to<br>the different processes they use to<br>verify transactions. So, what is it<br>about Visa's verification process that<br>makes this hack possible? In a previous<br>video, we saw that any card transaction<br>relies on a secret cryptographic key<br>shared by the card in the bank. When you<br>tap the card or phone onto a reader, the<br>reader sends across a long string of<br>transaction details. The card then<br>applies its secret key to garble that<br>message into a unique code for the<br>transaction. The card sends this to the<br>reader which the reader forwards onto<br>the bank along with the raw transaction<br>details. The bank then applies its own<br>secret key to the raw data as well. And<br>if the output matches the one from the<br>card, the bank authorizes the<br>transaction. This is called symmetric<br>cryptography since the card and the bank<br>use the same secret key. And this step<br>is required in all transactions no<br>matter whether you have a Visa, a<br>Mastercard or something else. But<br>there's actually another layer of<br>security which Mastercard uses in all of<br>its transactions. But in this particular<br>case, Visa doesn't. This layer of<br>security is not between the card and the<br>bank, but between the card and the<br>reader. And it's at this step where<br>Mastercard thwarts our attack.<br>The second step relies on asymmetric<br>cryptography, so-called because it uses<br>two different keys, a private key for<br>the card and a public key for the<br>reader. It starts with the reader<br>sending across the transaction details<br>to the card. Just like before, the card<br>then uses its private key to garble that<br>message into another long string of<br>digits. This is the card's digital<br>signature for the transaction. The card<br>sends this signature back to the reader<br>along with the public key which the<br>reader then uses to verify that the<br>signature came from that specific card<br>for this specific transaction. To<br>illustrate how this works, let's<br>consider a simple example. The private<br>key and public key both have two<br>components. N is a shared number. In<br>this case, let's say 55.<br>D is the card's private number, let's<br>say 7. And E is the public number, let's<br>say three. Now when the reader sends<br>across the raw transaction data, it<br>represents it as one long number. But<br>for simplicity, we'll use a much smaller<br>one. Let's say two. To sign for the<br>transaction, the card or the phone<br>raises the transaction number, in this<br>case 2, to the power of its private<br>number. So we get 128. And then divides<br>this by the shared number 128 over 55,<br>which leaves a remainder of 18.<br>And this is the card signature 18 which<br>it sends on to the reader. Now the<br>reader needs to know whether the<br>transaction is valid. So it takes the<br>card's signature and raises it to the<br>power of the public number. Then it<br>takes the remainder when you divide by<br>the shared number 55 and you get two.<br>This matches the original transaction<br>data the reader sent to the card. The<br>reason this works is that the private<br>and public numbers are specifically<br>chosen so that when combined with the<br>shared number, the public key<br>effectively reverses the operation of<br>the private key. And this allows the<br>reader to verify that the card signature<br>is valid without ever having seen its<br>private number.<br>This is based on a type of cryptography<br>called RSA. In reality, the numbers<br>involved are much larger, but that makes<br>it incredibly secure because that makes<br>it virtually impossible to reverse<br>engineer the card's private key. And it<br>also means that even a one-digit change<br>in the transaction data will produce a<br>different result when the reader checks<br>the phone's signature, in which case the<br>reader won't approve the transaction.<br>This is a problem because we've modified<br>the data. The reader is expecting a<br>signature for a high value retail<br>transaction, but we intercepted the<br>communication. So the phone signature is<br>actually for low value transit<br>transaction. This wouldn't pass the<br>asymmetric signature check. But while<br>Mastercard always requires this<br>asymmetric verification which would spot<br>our hack, Visa doesn't. They only<br>require this signature in certain<br>situations like when the reader's<br>offline. For example, when you're<br>underground with no signal, there's no<br>way for the reader to communicate with<br>the bank for that first layer of<br>symmetric cryptography. At least not<br>until it comes back online.<br>So during our attack, we make sure the<br>reader is online the whole time. That<br>way, it doesn't bother using the<br>asymmetric layer of security, which<br>contains the signature that would<br>unravel our lives. But the funny thing<br>is, we've tricked the phone into<br>thinking it's interacting with the<br>transit reader. And transit transactions<br>are one of those times where Visa does<br>require the asymmetric signature since<br>the reader could be underground on the<br>subway and therefore offline. So, the<br>phone actually does send across its<br>signature to the reader, but the reader<br>doesn't check it because in reality, the<br>reader is online. So instead, it just<br>relies on that first layer of security<br>with the bank. Even though if it did<br>check the phone signature, it would have<br>all the evidence it needed to stop the<br>hack.<br>>> So yeah, there you go.<br>>> Makes sense that it's that sophisticated<br>cuz it shouldn't be that easy. But that<br>still seemed way too easy.<br>>> And Marquez was not the only victim. I<br>thought it was only fair that I first<br>try it out on myself.<br>>> Approved.<br>>> Yeah. Here. Your souvenir from the UK<br>from Tom and me. Oh, what a lovely<br>receipt for this this theft.<br>>> And then I got another victim with a bit<br>of a bigger budget. Our channel has a<br>like CFO basically who lives very<br>nearby. What we're doing is we're<br>setting it to be your transit card.<br>>> Okay.<br>>> So that means that if if you're in<br>London, you have to use the two. It'll<br>take money from this card. Something<br>just happened.<br>>> Yeah.<br>>> How you feel about that?<br>>> Oh my goodness me. Oh my god.<br>>> There you go.<br>>> We were just going to meet for a drink.<br>That that's what you know that was the<br>agreement.<br>>> In the real world, say you had your<br>phone in your pocket.<br>>> Yeah.<br>>> I would walk by you<br>>> doing this and Tom would have this in a<br>shop and pay.<br>>> The easiest way for this to actually be<br>a crime would be a stolen iPhone.<br>>> Sure.<br>>> And then someone goes and spends<br>thousands of pounds.<br>>> So, you know, you you could buy a car<br>with this.<br>>> Yeah. Yeah. Theoretically. Jeez.<br>>> Yeah. Wow.<br>>> I guess from your perspective, you've<br>revealed all this information publicly.<br>You're telling us we're walking it<br>through it in great detail. How does how<br>do we stop people from using this for or<br>can we stop people like who's whose<br>responsibility is is it to stop this?<br>>> Oh, whose responsibility is it is an<br>interesting question. But you can stop<br>it by turning uh transit mode off<br>>> or not turn it off and not have a Visa<br>card in transit mode on an Apple.<br>>> Yes. And you do need to be careful<br>because as soon as you have a suitable<br>card in your Apple Wallet, Express<br>Transit mode is turned on by default.<br>This hack was first made public way back<br>in 2021 after the professors had<br>informed Apple and Visa privately. And<br>to get to the bottom of why it's still<br>possible, we reached out to Apple and<br>they didn't agree to an interview. But<br>here's what they said. This is a concern<br>with the Visa system, but Visa does not<br>believe this kind of fraud is likely to<br>take place in the real world. Visa has<br>made it clear that their card holders<br>are protected by Visa's zero liability<br>policy. This is exactly the same as<br>their position when the hack was first<br>made public back in 2021. So it seems<br>like Apple are basically saying, well,<br>this is a Visa problem. So we went and<br>asked Visa what they thought.<br>>> I think this specific vulnerability is<br>likely within a controlled setting, very<br>unlikely from a scaled real world<br>setting. And then kind of the last point<br>is from a consumer perspective is that<br>in the cases where this is successful,<br>they have the ability to dispute this<br>transaction and get their refunds<br>returned to them.<br>>> I I think that's fair. You're saying<br>it's not entirely scalable and then even<br>if it does happen, we'll give you your<br>money back. Like that that's a great<br>it's a great stance.<br>>> I still think though a lot of people and<br>I think our audience would really want<br>to hear that you're actually making the<br>technical changes to stop this from ever<br>happening again. is when you think about<br>it from a scale perspective<br>and whether the network level defenses<br>that we have are effective in making<br>sure that this type of vulnerability is<br>isolated. We believe it is effective<br>because if it wasn't, you would hear a<br>lot more data about how this is an issue<br>and it simply isn't. The the point that<br>I'm making is that you're never going to<br>be able to completely eradicate any<br>specific type of fraud because it's<br>going to exist, right? Yes.<br>>> What I'm saying is that we have the<br>right detections in place to ensure that<br>this type of fraud is not endemic.<br>>> Would it not be even better to just say<br>this type of fraud is not possible? Why<br>not just say it's not probable? Why not<br>just totally get rid of it by<br>implementing an actual technical change?<br>>> If you think about for every $100 of<br>spend that occurs on card payments, 10<br>cents of that is lost to fraud.<br>>> So every $100 10 cents. If you look at<br>in-person transactions, which is what<br>kind of this topic is really much more<br>related to, that number goes down to two<br>cents for every $100 of fraud that's<br>being made.<br>>> So, I've been thinking about this hack<br>and it reminds me a lot about people who<br>are afraid of flying. Statistically,<br>you're a lot more likely to crash on the<br>drive to the airport than you are in the<br>air. So, I do understand Visa's argument<br>generally. Compared to other kinds of<br>fraud, this is just a drop in the ocean.<br>But airlines don't accept a small number<br>of crashes each year as an inevitable<br>cost of doing business. No, anytime<br>there's a crash, they analyze it<br>meticulously. Then they do everything in<br>their power to make sure that it's never<br>going to happen again. Visa says that<br>they'll get you your money back, and<br>that's great, but you've still got to<br>notice the charge, dispute it, and then<br>wait. Imagine waking up to see $10,000<br>gone from your account. That's money for<br>rent, insurance, car payment, or a<br>medical bill. Even if the refund does<br>come, the stress before is going to be<br>very real. So for me, the question is<br>whether just saying they're going to<br>refund it after the fact is good enough,<br>or when a system touches the lives of so<br>many people, should we expect better?<br>One last thing, we've been nominated for<br>two Webbby awards. One for our video<br>about the dangers of forever chemicals,<br>and that's been nominated for best long-<br>form video. The other one is about<br>American football, and we did it with<br>Tom Brady. That's been nominated for<br>best creator to creator collaboration.<br>The thing is, when I checked last, we<br>were second place in voting for both of<br>them. So, if you want to help us out,<br>you can go to the Webbby website and<br>vote for us up till April 16th. So, if<br>you do that, thank you very much.<br>That'll help us out a lot. And as<br>always, thank you for watching.<br>Okay. Yeah, that's the that's the whole<br>demo. I will now give you your money<br>back. Yes.<br>Okay. We got the