- I'm here with MKBHD,<br>and we're gonna try to steal<br>$10,000 from his locked iPhone.<br>- Really hope it doesn't work.<br>Really hope it doesn't work.<br>- I'm gonna get you to put that phone down<br>on top of this device.<br>- [Marques] Okay.<br>- Just put it down there.<br>- Just put it on like a, all right.<br>- I feel like I'm a bit of a magician,<br>but I'm like-<br>- Yeah.<br>- I haven't changed anything, right?<br>- Okay. Yeah.<br>- It's still locked.<br>- It's locked.<br>- Nothing else.<br>- Yeah.<br>- This is just a regular payment terminal.<br>- Yeah.<br>- Nothing weird about that.<br>- Seen these.<br>- And we'll start with a<br>little, like, maybe 100.<br>No, maybe $5?<br>Let's start with something like-<br>- Yeah, five. Five.<br>- Start with five.<br>- That sounds great.<br>- Yeah. Five bucks.<br>Do you think that we can take,<br>like, will we be able to<br>get this out of your phone?<br>- I hope not, but I<br>kinda feel like you will.<br>Let's see.<br>- So, now I'm gonna<br>charge $5 on this device.<br>Your phone's still locked, right?<br>- Yep.<br>- I haven't done anything.<br>- It's like a David Blaine.<br>- [Henry] It's like the<br>nerdiest David Blaine.<br>- Yeah. (chuckles)<br>- Sweet, so.<br>Just try to tap. We'll go.<br>(phone chimes)<br>- What just happened on my phone?<br>Approved? Whoa, whoa, approved.<br>(coins clinking)<br>So, okay.<br>I heard something happen on my phone<br>while you tapped this on this.<br>- Yes.<br>We got a little receipt for you.<br>- Credit verified on device, $5.<br>So, I'm gonna check my phone.<br>Ah, oh, I have a new $5 charge.<br>And it's time stamped right now.<br>I don't like that at all.<br>So, that's concerning.<br>Oh, so my phone had to be on this thing?<br>- [Henry] Yes.<br>- Did it have to be on this thing?<br>Or like, near it, I guess?<br>- So the way, well, I<br>could explain how it works-<br>- Yeah.<br>- But maybe before that,<br>$5, it's not very much.<br>- Yeah.<br>- Do we want to try upping it a bit?<br>- I...<br>- I'm gonna enter a<br>slightly larger amount.<br>- Careful. Careful with that.<br>Careful, careful.<br>That's a lot of zeros. Careful with that.<br>Oh my God. Okay.<br>- Do you even think it's<br>possible? Firstly, $10,000.<br>- I mean, the credit, the limit<br>on the card is above that.<br>I don't know if Apple<br>Pay will let you do that.<br>- The question is also<br>are you used to spending<br>this amount of money<br>on this card, you know?<br>- Not from my phone.<br>It's like a big screen activity.<br>- Yeah.<br>- Like, $10,000 purchase,<br>I gotta be checking everything.<br>So, yeah, no. This would be unusual.<br>- Let's see it. Let's see if it works.<br>Okay, I'm gonna do it again.<br>- Okay.<br>- We're just,<br>all we gotta do again.<br>Put your phone locked.<br>Phone-<br>- On this device.<br>- Locked on that device.<br>- [Henry] Yes, exactly.<br>And okay, we're gonna<br>start the script again.<br>Okay.<br>(suspenseful music)<br>(phone chimes)<br>- [Marques] Uh-uh.<br>(coins clinking)<br>Uh-uh. No.<br>- No? (laughs)<br>- It's just green. Approved.<br>- Print that out. Print that.<br>(receipt sprinting)<br>That is crazy.<br>- Oh my God. So, so, yeah,<br>I'm gonna need that back.<br>- Yeah. (laughs)<br>- For sure,<br>I'm gonna need that back.<br>But also, did that just?<br>Yeah, wow. It worked.<br>- $10,000.<br>- All right. I believe you.<br>I definitely believe you.<br>How do we get this back?<br>We do like a little Venmo or like PayPal?<br>How do we even?<br>- You know,<br>do we give it back though?<br>- Reverse the transaction.<br>I don't even know. Do I call my company?<br>Yeah, that's crazy.<br>- Yeah, exactly.<br>You can keep this if you wanna-<br>- Yeah.<br>- Get it framed.<br>- Yeah. A receipt of the damage.<br>I never unlock my phone.<br>I never put in a password.<br>I never did what I would normally do<br>to verify a transaction on my phone.<br>- Yes.<br>- It just happened<br>to be on top of that.<br>- So, how did we do it?<br>Well, we teamed up with<br>two cybersecurity experts,<br>Professors Ioana Boureanu and Tom Chothia.<br>And we went to visit them<br>at the University of Surrey,<br>where they ran us through a<br>unique hack that they developed<br>to bypass the phone's lock<br>screen and then to drain funds<br>from inside its mobile wallet.<br>- Without unlocking my phone<br>is the real magic part.<br>That's crazy.<br>- And the craziest thing<br>of all is that this hack<br>was made public back in 2021.<br>So, people have known that it's possible<br>to take money from locked phones<br>in this way for five years.<br>So, what kind of amounts does this?<br>- The only limit is how much someone has<br>in their bank account.<br>(suspenseful music)<br>- Yet the loophole<br>still hasn't been fixed.<br>So, how does it work?<br>Well, whenever you use Tap to<br>Pay, your phone and the reader<br>exchange information<br>about the transaction.<br>But they send this<br>information through the air<br>by a shared magnetic field,<br>so we can intercept the<br>communication and alter it.<br>All we need to do is to<br>insert our own devices<br>in between the phone and the reader.<br>First, we tap Marques's<br>phone against this.<br>It's an NFC device called the Proxmark.<br>To Marques's phone,<br>the proxmark looks like<br>a typical card reader.<br>So, it happily sends over<br>its transaction data.<br>That proxmark then sends that<br>data straight to our laptop,<br>where we run a Python<br>script to modify it.<br>Next, the laptop sends the<br>data to our burner phone,<br>which I tap on the actual card reader.<br>To the reader, my phone<br>looks just like Marques's.<br>So, both Marques's phone<br>and the card reader<br>think they're talking<br>directly to each other,<br>when in fact all their communication<br>goes through our series of devices.<br>This is a classic<br>man-in-the-middle attack.<br>Now, getting in the middle<br>to intercept the data<br>is actually the easy part.<br>The hard part is what you<br>need to do to that data<br>to trick the phone and the reader<br>into authorizing the transaction.<br>See, to actually steal<br>money using this attack,<br>you have to get past three layers<br>of defense on both systems.<br>And to do that, we have<br>to tell three lies.<br>Two to the phone, and one to the reader.<br>So, the first layer of<br>defense is the simplest.<br>The phone is locked.<br>And in an ordinary transaction,<br>you have to unlock your phone to pay.<br>But this is no ordinary transaction.<br>So, you know, if you<br>ever go to the subway,<br>there's a feature that Apple's<br>created where you know,<br>when you walk through,<br>they don't want a bunch<br>of people lining up<br>and having to unlock their face.<br>And you know, maybe they're wearing a coat<br>and glasses and stuff.<br>- Oh. Express Transit Mode.<br>- Apple introduced express<br>transit mode in 2019<br>to let you make transit transactions<br>without having to unlock your phone.<br>The way this works is<br>that the payment terminals<br>on the subway or on the<br>bus broadcast a message<br>that identifies them<br>as a transit terminal.<br>Then, when you tap your phone to pay,<br>it looks for whatever card<br>is in the transit slot<br>of its mobile wallet and it<br>pays without needing to unlock.<br>This is super convenient,<br>but we can also abuse it.<br>- We found out how this worked<br>by going to the London Underground<br>with our laptops and our equipment,<br>and actually scanning the signals<br>and seeing what the gate<br>was saying to the phone.<br>And that's how we discovered<br>this code the gate send<br>which unlocked the phone.<br>- We used the proxmark to<br>broadcast that same code,<br>which fools Marques's phone into thinking<br>that it's a transit reader.<br>So, when we tap Marques's<br>phone against the proxmark,<br>it's now expecting to<br>receive another message<br>with the details about<br>the transit transaction.<br>Here's what that message<br>would typically look like<br>in binary code.<br>Each of these bits carries<br>important information<br>about the transaction.<br>Now, the important part of this<br>message for us is this bit.<br>An authentic transit transaction<br>would have a 1 right here.<br>This tells the phone that<br>the reader may be offline.<br>Like if it's underground on the subway.<br>In which case the phone would need to send<br>an extra layer of authentication.<br>So, when Marques's phone<br>receives the transaction request<br>from what it thinks is a transit reader,<br>it's gonna be expecting<br>that value to be set to 1.<br>But in reality, the<br>device sending the request<br>is our retail reader, and<br>this reader is online,<br>which means that that bit<br>is currently set to zero.<br>Therefore, to trick the phone<br>into accepting the transaction,<br>we intercept the message from the reader,<br>pass it through our computer,<br>and we change that 0 to a 1.<br>So by the time the message<br>gets to Marques's phone,<br>it looks like a transit transaction.<br>As this communicates through our computer,<br>we're convincing the phone<br>that it is in fact talking<br>to a transit terminal.<br>But now there's a second line<br>of defense we need to break.<br>With this first lie,<br>we bypassed the need to unlock the phone.<br>And we can now trick it<br>into making small<br>payments of a few dollars.<br>Kind you'd expect on the subway.<br>But if we suddenly went and<br>asked the phone for $10,000,<br>well, its guard would go way back up.<br>After all, it's pretty<br>unusual for a transit reader<br>to ask for such a large amount of money.<br>So, this activates a<br>second layer of defense.<br>Customer verification.<br>On contactless payments like this,<br>there are two categories of transaction.<br>We got high value and low value.<br>Any transaction that's<br>classified as high value<br>requires additional<br>verification from the customer.<br>For example, in the UK,<br>most banks require a pin<br>or a fingerprint or facial recognition<br>for any transaction over 100 pounds.<br>So, for us to get this<br>$10,000 payment through<br>without customer verification,<br>we need to trick the phone into thinking<br>that $10,000 is in fact<br>a low value transaction.<br>And that's actually surprisingly simple.<br>That's because to determine<br>whether the transaction is high value,<br>Marques's phone doesn't actually look<br>at the numerical value of $10,000.<br>It just looks at another<br>single bit of information<br>in the transaction data.<br>A 1 here means high<br>value and 0 means low.<br>The reason for this is that the boundary<br>between high and low value<br>varies from country to country.<br>And of course,<br>different countries operate<br>in different currencies.<br>So, a simple label allows the flexibility<br>to deal with these variations.<br>And it allows the limits to be changed<br>without the banks needing<br>to issue new cards.<br>So, all we need to do<br>is intercept the message from the reader,<br>flip that bit to a zero,<br>and then the phone will believe<br>that this transaction is low value<br>even though it's for $10,000.<br>Then, when the phone receives our request<br>for a $10,000 transaction,<br>it doesn't ask for customer verification.<br>It just goes ahead and<br>authorizes the transaction.<br>Now, you might be asking,<br>why is this data so easy to tamper with?<br>And we'll get to that in just a minute.<br>But we have one final<br>security check to overcome.<br>See, with these first two lies,<br>we bypassed unlocking the phone<br>and then tricked it into<br>making a high value transaction<br>without asking for verification.<br>So, the phone is fully convinced<br>and it's ready to make the payment.<br>But we still need to convince the reader<br>that the transaction's valid.<br>And this is where our third lie comes in.<br>When Marques's phone replies,<br>it says it's approved<br>the $10,000 transaction.<br>But it also says that it hasn't asked<br>for customer verification.<br>No pin, no fingerprint,<br>no facial recognition.<br>But if the reader sees this,<br>it'll reject the transaction<br>because it knows that the $10,000 payment<br>it originally asked for is high value.<br>It should therefore require<br>customer verification.<br>So, now we need to trick the reader<br>into thinking that the customer<br>has verified the payment.<br>So, we intercept the<br>response from Marques's phone<br>and look for the bit of information<br>that says customer<br>verification hasn't been done.<br>Then we change it to say that<br>the payment has been verified<br>by flipping this 0 to a 1.<br>Now, the reader's happy.<br>It forwards the information onto the bank,<br>and the bank authorizes the payment.<br>After all, it sees a<br>transaction that's been verified<br>by the customer on their device.<br>(upbeat lively music)<br>(notification beeps)<br>Green approved.<br>(coins clinking)<br>- That is crazy.<br>- Verified on device?<br>- Yeah, verified.<br>- You didn't, you didn't verify it.<br>- Right.<br>- So, why isn't all this<br>information encrypted?<br>That would make it impossible<br>to secretly tamper with.<br>Well, the way the phone<br>and reader communicate<br>has to be compatible with<br>thousands of different devices,<br>which would be impossible<br>to update all in one go.<br>So for that reason, the<br>information we've looked at so far<br>is just sent across unencrypted.<br>Even still, phones, readers and banks<br>all have checks in place to make sure<br>an attack like this can't happen.<br>And normally, it can't.<br>Except if you happen to use<br>a specific type of phone<br>and a specific type of card.<br>Because when you combine them<br>in this particular scenario,<br>they create a loophole.<br>So, our hack relied on a specific phone<br>and credit card combination.<br>And we also use a sophisticated method<br>developed by cybersecurity experts.<br>But hackers or scammers online,<br>well, they don't need to be that smart.<br>Often they can just buy<br>information to target you.<br>When I started working at Veritasium,<br>I was on a work trip to go<br>meet Derek for the first time.<br>And I got an email from<br>somebody was saying he was Derek<br>asking for my phone number.<br>That made a ton of sense.<br>I was leaving the airport.<br>So, I just responded by<br>sending my phone number.<br>I immediately was like,<br>"Wait, let me look at that."<br>I checked the email. Not Derek.<br>Of course, for the next few months<br>I was just getting scam<br>call after scam call.<br>That's one way they can get<br>you. I felt like an idiot.<br>But it's not just scam calls like that.<br>I've also had that feeling<br>after news of a major data breach.<br>I've wondered whether<br>me using some website<br>has led to my personal information<br>being exposed somewhere<br>without me even knowing about it.<br>But you can protect your personal info<br>with today's sponsor, Incogni.<br>See, whenever scammers purchase<br>your email, phone number,<br>and even your home<br>address from data brokers,<br>Incogni automates the<br>grueling process of requesting<br>that these data brokers<br>delete your information.<br>Okay, so I've had this since June 2025.<br>And since then, we've had 94<br>different removal requests.<br>And I really like how you<br>can track the progress<br>in this dashboard here.<br>They've estimated that that saved me<br>70 hours and 30 minutes of my own time<br>if I were to reach out<br>to these people myself.<br>And with Incogni's new<br>custom removal feature<br>in their unlimited plans,<br>you can point to any specific site<br>where your information is visible.<br>And then, one of their privacy agents<br>will take care of the rest.<br>So, to take your data<br>off the market today,<br>go to incogni.com/veritasium<br>and then use code Veritasium for 60% off.<br>You can click the link below<br>or you can scan this QR<br>code to claim that 60% off<br>and get your personal data off the market.<br>I wanna thank Incogni<br>for sponsoring this video<br>about taking money from Marques Brownlee.<br>And now, let's get back<br>to that thing.<br>So, which combination of card and phone<br>make this hack possible?<br>Firstly, the phone has to be an iPhone.<br>As we saw earlier, when<br>an iPhone is deciding<br>whether to ask for customer verification,<br>it doesn't look at the numerical<br>value of the transaction.<br>It only looks at the high<br>value or low value label<br>provided by the reader.<br>But other phones don't work that way.<br>For example, when a Samsung<br>phone goes into transit mode,<br>it doesn't rely on this low<br>value label from the reader.<br>It looks at the actual numerical<br>value of the transaction<br>and it only accepts a payment of $0.<br>Then it relies on the transport provider<br>to count up all the times<br>you've used the subway,<br>and then to send you a<br>bill at the end of the day.<br>So, if a Samsung phone<br>saw a transit terminal<br>trying to charge you<br>$10,000 for a single tap,<br>it would immediately reject it.<br>But it's not just Apple's transit mode<br>that makes this hack possible.<br>You've gotta have one<br>specific type of card<br>in the transit slot.<br>- It was truly a design<br>feature that was introduced<br>by the way you mixed Apple and Visa.<br>- And the reason that this<br>works with a Visa card,<br>but wouldn't, with say, a MasterCard<br>comes down to the different<br>processes they use<br>to verify transactions.<br>So, what is it about<br>Visa's verification process<br>that makes this hack possible?<br>In a previous video, we saw<br>that any card transaction<br>relies on a secret cryptographic key<br>shared by the card and the bank.<br>When you tap the card<br>or phone onto a reader,<br>the reader sends across<br>a long string of transaction details.<br>The card then applies its secret<br>key to garble that message<br>into a unique code for the transaction.<br>The card sends this to the reader,<br>which the reader forwards onto the bank,<br>along with the raw transaction details.<br>The bank then applies its own secret key<br>to the raw data as well.<br>And if the output matches<br>the one from the card,<br>the bank authorizes the transaction.<br>This is called symmetric cryptography<br>since the card and the bank<br>use the same secret key.<br>And this step is required<br>in all transactions.<br>No matter whether you<br>have a Visa, a MasterCard,<br>or something else.<br>But there's actually<br>another layer of security<br>which MasterCard uses in<br>all of its transactions.<br>But in this particular case, Visa doesn't.<br>This layer of security is not<br>between the card and the bank,<br>but between the card and the reader.<br>And it's at this step where<br>MasterCard thwarts our attack.<br>The second step relies on<br>asymmetric cryptography.<br>So-called because it<br>uses two different keys.<br>A private key for the card and<br>a public key for the reader.<br>It starts with the reader sending across<br>the transaction details to<br>the card just like before.<br>The card then uses its private<br>key to garble that message<br>into another long string of digits.<br>This is the card's digital<br>signature for the transaction.<br>The card sends this<br>signature back to the reader<br>along with the public key,<br>which the reader then uses<br>to verify that the signature<br>came from that specific card<br>for this specific transaction.<br>To illustrate how this works,<br>let's consider a simple example.<br>The private key and public<br>key both have two components.<br>N is a shared number.<br>In this case, let's say 55.<br>D is the card's private<br>number. Let's say 7.<br>And E is the public number. Let's say 3.<br>Now, when the reader sends<br>across the raw transaction data,<br>it represents it as one long number.<br>But for simplicity, we'll<br>use a much smaller one.<br>Let's say 2.<br>To sign for the transaction,<br>the card or the phone<br>raises the transaction<br>number, in this case 2,<br>to the power of its private<br>number, so we get 128.<br>And then divides this by the<br>shared number, 128 over 55,<br>which leaves a remainder of 18.<br>And this is the card signature, 18,<br>which it sends on to the reader.<br>Now, the reader needs to know<br>whether the transaction is valid.<br>So, it takes the card signature<br>and raises it to the power<br>of the public number.<br>Then, it takes the remainder<br>when you divide by the shared number 55.<br>And you get 2.<br>This matches the original transaction data<br>the reader sent to the card.<br>The reason this works is that<br>the private and public numbers<br>are specifically chosen<br>so that when combined<br>with the shared number,<br>the public key effectively<br>reverses the operation<br>of the private key.<br>And this allows the reader to verify<br>that the card signature is valid<br>without ever having<br>seen its private number.<br>This is based on a type of<br>cryptography called RSA.<br>In reality, the numbers<br>involved are much larger.<br>But that makes it incredibly secure<br>because that makes it virtually impossible<br>to reverse engineer<br>the card's private key.<br>And it also means that<br>even a one digit change<br>in the transaction data will<br>produce a different result<br>when the reader checks<br>the phone's signature,<br>in which case the reader<br>won't approve the transaction.<br>This is a problem because<br>we've modified the data.<br>The reader's expecting a signature<br>for a high value retail transaction.<br>But we intercepted the communication.<br>So the phone signature<br>is actually for low value<br>transit transaction.<br>This wouldn't pass the<br>asymmetric signature check.<br>But while MasterCard always requires<br>this asymmetric verification,<br>which would spot our hack, Visa doesn't.<br>They only require this<br>signature in certain situations.<br>Like, when the reader's offline.<br>For example, when you're<br>underground with no signal,<br>there's no way for the reader<br>to communicate with the bank<br>for that first layer of<br>symmetric cryptography.<br>At least not until it comes back online.<br>So, during our attack,<br>we make sure the reader<br>is online the whole time.<br>That way, it doesn't bother using<br>the asymmetric layer of security,<br>which contains the signature<br>that would unravel our lies.<br>But the funny thing is<br>we've tricked the phone<br>into thinking it's interacting<br>with the transit reader.<br>And transit transactions<br>are one of those times<br>where Visa does require<br>the asymmetric signature,<br>since the reader could be<br>underground on the subway,<br>and therefore offline.<br>So, the phone actually does send across<br>its signature to the reader,<br>but the reader doesn't check it.<br>Because in reality, the reader's online.<br>So, instead it just relies<br>on that first layer of<br>security with the bank,<br>even though if it did<br>check the phone signature,<br>it would've all the evidence<br>it needed to stop the hack.<br>(screen whooshing)<br>So yeah, you go.<br>- Makes sense<br>that it's that sophisticated<br>'cause it shouldn't be that easy,<br>but that still seemed way too easy.<br>- And Marques was not the only victim.<br>I thought it was only fair<br>that I first try it out on myself.<br>(phone beeping)<br>- Approved it.<br>- Woohoohoo!<br>- Yeah, here. You souvenir<br>from the UK from Tom and me.<br>- Oh, what a lovely receipt<br>for this theft. (chuckles)<br>And then I got another victim<br>with a bit of a bigger budget.<br>Our channel has a CFO basically,<br>who lives very nearby.<br>What we're doing is we're setting it<br>to be your transit card.<br>- Okay.<br>- So that means<br>that if you're in, London <br>you have to use the tube-<br>- Yeah.<br>- It'll take money<br>from this card.<br>Something just happened.<br>- Yeah.<br>(everyone laughs)<br>How you feel about that?<br>- Oh my goodness me.<br>Oh my-<br>- [Henry] There you go.<br>- We were just gonna meet for a drink.<br>That's what, you know,<br>that was the agreement.<br>- In the real world, say you<br>had your phone in your pocket.<br>- Yeah.<br>- I would walk by you-<br>- Yeah.<br>- Doing this.<br>And Tom would have this<br>in the shop and pay.<br>- The easiest way for this<br>to actually be a crime<br>would be a stolen iPhone.<br>- [Henry] Sure.<br>- And then someone goes and<br>spends thousands of pounds.<br>- So you know, you<br>could buy a car with us.<br>- Jesus. Yeah, yeah.<br>Theoretically. Geez.<br>- Yeah.<br>- Wow.<br>- I guess from your perspective,<br>you've revealed all this<br>information publicly<br>and you're telling us.<br>We're walking through it in great detail.<br>How do we stop people from using this for-<br>Or can we stop people?<br>Like, whose responsibility<br>is it to stop this?<br>- Oh, whose responsibility is<br>it is an interesting question.<br>- Yeah.<br>- But you can stop it<br>by turning transit mode off.<br>- Or not turn it off,<br>but not have a Visa card<br>in transit mode on an Apple.<br>- Yes.<br>And you do need to be careful<br>because as soon as you<br>have a suitable card<br>in your Apple wallet,<br>Express Transit Mode is<br>turned on by default.<br>This hack was first made<br>public way back in 2021<br>after the professors had informed<br>Apple and Visa privately.<br>And to get to the bottom<br>of why it's still possible,<br>we reached out to Apple,<br>and they didn't agree to an interview.<br>But here's what they said.<br>"This is a concern with the Visa system,<br>but Visa does not believe<br>this kind of fraud<br>is likely to take place in the real world.<br>Visa has made it clear<br>that their cardholders<br>are protected by Visa's<br>zero liability policy."<br>This is exactly the same as their position<br>when the hack was first<br>made public back in 2021.<br>So, it seems like Apple<br>are basically saying,<br>"Well, this is a Visa problem."<br>So, we went and asked<br>Visa what they thought.<br>- I think this specific vulnerability<br>is likely within a controlled setting.<br>Very unlikely from a<br>scaled real world setting.<br>And then, kind of the last point<br>is from a consumer perspective,<br>is that in the cases<br>where this is successful,<br>they have the ability to<br>dispute this transaction<br>and get their refunds returned to them.<br>- I think that's fair.<br>You're saying it's not entirely scalable,<br>and then even if it does happen,<br>we'll give you your money back.<br>Like, that's a great,<br>that's a great stance.<br>I still think though, a lot of people,<br>and I think our audience<br>would really wanna hear<br>that you're actually making<br>the technical changes<br>to stop this from ever happening again.<br>- 'Cause when you think about<br>it from a scale perspective<br>and whether the network level defenses<br>that we have are effective in making sure<br>that this type of<br>vulnerability is isolated,<br>we believe it is effective.<br>Because if it wasn't, you<br>would hear a lot more data<br>about how this is an<br>issue, and it simply isn't.<br>The point that I'm making is<br>that you're never gonna be able<br>to completely eradicate<br>any specific type of fraud<br>'cause it's going to exist, right?<br>- Yes.<br>- What I'm saying<br>is that we have the right<br>detections in place to ensure<br>that this type of fraud is not endemic.<br>- Would it not be even better<br>to just say this type of<br>fraud is not possible.<br>Why not just say it's not probable?<br>Why not just totally get rid of it<br>by implementing an<br>actual technical change?<br>- If you think about for every $100<br>of spend that occurs on card payments.<br>10 cents of that is lost to fraud.<br>So, every $100 it's 10 cents.<br>If you look at in-person transactions,<br>which is what kind of this topic<br>is really much more related to.<br>That number goes down to 2 cents<br>for every $100 of fraud that's being made.<br>- So, I've been thinking about this hack<br>and it reminds me a lot about people<br>who are afraid of flying.<br>Statistically, you're a lot more likely<br>to crash on the drive to the airport<br>than you are in the air.<br>So, I do understand<br>Visa's argument generally.<br>Compared to other kinds of fraud,<br>this is just a drop in the ocean.<br>But airlines don't accept<br>a small number of crashes each year<br>as an inevitable cost of doing business.<br>No. Anytime there's a crash,<br>they analyze it meticulously.<br>And then they do everything in their power<br>to make sure that it's<br>never gonna happen again.<br>Visa says that they'll<br>get you your money back<br>and that's great.<br>But you've still gotta notice the charge,<br>dispute it, and then wait.<br>Imagine waking up to see<br>$10,000 gone from your account.<br>That's money for rent, insurance,<br>car payment, or a medical bill.<br>Even if the refund does come,<br>the stress before is gonna be very real.<br>So for me, the question<br>is whether just saying<br>they're gonna refund it after<br>the fact is good enough.<br>Or when a system touches<br>the lives of so many people,<br>should we expect better?<br>One last thing.<br>We've been nominated for two Webby Awards.<br>One, for our video about the<br>dangers of forever chemicals<br>and that's been nominated<br>for best long form video.<br>The other one is about American football<br>and we did it with Tom Brady,<br>and that's been nominated<br>for Best Creator to Creator Collaboration.<br>The thing is, when I checked last,<br>we were second place in<br>voting for both of them.<br>So if you wanna help us out,<br>you can go to the Webby website<br>and vote for us up till April 16th.<br>So if you do that, thank you very much.<br>That'll help us out a lot.<br>And as always, thank you for watching.<br>Okay, yeah. That's the whole demo.<br>I will now give you your money back.<br>- Yes.<br>- [Henry] Okay, we gotta. I'm here with MKBHD and we're gonna try<br>to steal $10,000 from his locked iPhone.<br>>> Really hope it doesn't work. Really hope<br>it doesn't work.<br>>> I'm gonna get you to put that phone down<br>on top of this device.<br>>> Okay.<br>>> Just Just put it down there.<br>>> Just put it on like a All right.<br>>> I feel like I'm a bit of a magician, but<br>I'm like I haven't changed anything.<br>Right.<br>>> Okay. Yeah.<br>>> It's It's still locked.<br>>> It's locked.<br>>> Nothing else.<br>>> Yeah.<br>>> This just a regular payment terminal.<br>Nothing Nothing weird about that.<br>>> Seen these?<br>>> We'll start with a little like maybe<br>100. No, maybe $5. Let's start something<br>like Yeah. Five. Five. Start with five.<br>Sounds great. Yeah. Five bucks. Do you<br>think that we can take like will we be<br>able to get this out of your phone?<br>>> I hope not, but I kind of feel like you<br>will.<br>Let's see.<br>>> So, now I'm going to charge $5 on this<br>device.<br>>> Your phone's still locked, right?<br>>> Yep.<br>>> I haven't done anything<br>>> like a David Blaine.<br>>> It's like the the nerdiest David Bla.<br>>> Yeah.<br>>> Sweet. So, let's try a tap. It will go.<br>>> What just happened on my phone?<br>Approve. Whoa. Whoa. Approved. So, okay.<br>I heard something happen on my phone<br>while you tap this on this.<br>>> Yes.<br>>> We got a little receipt for you.<br>>> Uh, credit verified on device $5. So,<br>I'm going to check my phone. Uh oh, I<br>have a new $5 charge<br>and it's timestamped right now.<br>I don't like that at all.<br>So, that's concerning. Oh, so my phone<br>had to be on this thing.<br>>> Yes.<br>>> Did it have to be on this thing or like<br>near it, I guess? So, the way Well, I<br>could explain how it works, but maybe<br>before that,<br>>> $5. It's not very much.<br>>> Yeah.<br>>> Do we want to try<br>>> upping it a bit? I I'm going to enter a<br>slightly larger amount.<br>>> Careful. Careful with that. Careful.<br>Careful. That's a lot of zeros. Careful<br>with that. Oh my god. Okay.<br>>> Do Do you even think it's possible?<br>First, firstly, $10,000.<br>>> I mean, the credit the limit on the card<br>is above that. I don't know if Apple Pay<br>will let you do that.<br>>> The question is also, are you used to<br>spending this amount of money on this<br>card? You know,<br>>> not from my phone.<br>>> That's like a big screen activity like<br>10,000 $10,000 purchase. I got to be<br>checking everything. So, uh yeah. No,<br>this would be unusual.<br>>> Let's see it. Let's see if it works.<br>Okay, I'm going to do it again.<br>>> Okay,<br>>> we're just all All we got to do again,<br>put your phone locked<br>>> phone<br>>> on this device. locked<br>on that device.<br>>> Yes, exactly.<br>And Okay, we're going to start the<br>script again.<br>Okay. Mhm.<br>No, just green approved.<br>>> Put that over that.<br>>> That is crazy.<br>>> Oh my god. So, so, uh, yeah, I'm going<br>to need that back.<br>>> Yeah,<br>>> for sure. I'm going to need that back.<br>But also, did that just Yeah. Wow. It<br>worked.<br>>> $10,000.<br>>> All right. I believe you. I definitely<br>believe you. Uh,<br>how do we get this back? We do like a<br>little Venmo or like PayPal.<br>>> Do we give it back?<br>>> Where's the transaction? I don't even<br>know. Do I call my That's crazy.<br>>> Yeah, exactly. You can keep this if you<br>want to.<br>>> Yeah.<br>>> Get it framed.<br>>> Yeah. A receipt of the of the damage. I<br>never unlocked my phone. I never put in<br>the password. I never did what I would<br>normally do to verify a transaction on<br>my phone.<br>>> Yes,<br>>> it just happened to be on top of that.<br>>> So, how did we do it? Well, we teamed up<br>with two cyber security experts,<br>professors Yana Borenu and Tom Chofia,<br>and we went to visit them at the<br>University of Suri, where they ran us<br>through a unique hack that they<br>developed to bypass a phone's lock<br>screen and then to drain funds from<br>inside its mobile wallet without<br>unlocking my phone is is the real magic<br>part. That's crazy. And the craziest<br>thing of all is that this hack was made<br>public back in 2021. So people have<br>known that it's possible to take money<br>from locked phones in this way for 5<br>years.<br>>> So what kind of amounts does this<br>>> The only limit is how much someone has<br>in their bank account.<br>>> Yet the loophole still hasn't been<br>fixed.<br>So how does it work? Well, whenever you<br>use Tap to Pay, your phone and the<br>reader exchange information about the<br>transaction, but they send this<br>information through the air via a shared<br>magnetic field. So, we can intercept the<br>communication and alter it. All we need<br>to do is to insert our own devices in<br>between the phone and the reader. First,<br>we tap Marquez's phone against this.<br>It's an NFC device called the Prox Mark.<br>To Marquez's phone, the Prox Mark looks<br>like a typical card reader, so it<br>happily sends over its transaction data.<br>That Proxm Mark then sends that data<br>straight to our laptop where we run a<br>Python script to modify it. Next, the<br>laptop sends the data to our burner<br>phone, which I tap on the actual card<br>reader. To the reader, "My phone looks<br>just like Marquez's."<br>So, both Marquez's phone and the card<br>reader think they're talking directly to<br>each other, when in fact, all their<br>communication goes through our series of<br>devices. This is a classic<br>man-in-the-middle attack.<br>Now, getting in the middle to intercept<br>the data is actually the easy part. The<br>hard part is what you need to do to that<br>data to trick the phone and the reader<br>into authorizing the transaction. See,<br>to actually steal money using this<br>attack, you have to get past three<br>layers of defense on both systems. And<br>to do that, we have to tell three lies.<br>Two to the phone and one to the reader.<br>So, the first layer of defense is the<br>simplest. The phone is locked. And in an<br>ordinary transaction, you have to unlock<br>your phone to pay. But this is no<br>ordinary transaction.<br>>> So, you know, if you ever go to the<br>subway, there's a feature that Apple's<br>created where, you know, when you walk<br>through, they don't want a bunch of<br>people lining up and, you know, having<br>to unlock their face and, you know,<br>maybe they're wearing a coat and glasses<br>and stuff.<br>>> Express Transit mode.<br>>> Apple introduced express transit mode in<br>2019 to let you make transit<br>transactions without having to unlock<br>your phone.<br>The way this works is that the payment<br>terminals on the subway or on the bus<br>broadcast a message that identifies them<br>as a transit terminal. Then when you tap<br>your phone to pay, it looks for whatever<br>card is in the transit slot of its<br>mobile wallet and it pays without<br>needing to unlock. This is super<br>convenient, but we can also abuse it. We<br>found out how this worked by going to<br>the London Underground with our laptops<br>and our equipment and actually scanning<br>the signals and seeing what the gate was<br>saying to the phone. And that's how we<br>discovered this code the gates send<br>which unlocked the phone. We used the<br>Prox Mark to broadcast that same code<br>which fools Marquez's phone into<br>thinking that it's a transit reader. So,<br>when we tap Marquez's phone against the<br>prox mark, it's now expecting to receive<br>another message with the details about<br>the transit transaction. Here's what<br>that message would typically look like<br>in binary code. Each of these bits<br>carries important information about the<br>transaction. Now, the important part of<br>this message for us is this bit. An<br>authentic transit transaction would have<br>a one right here. This tells the phone<br>that the reader may be offline, like if<br>it's underground on the subway, in which<br>case the phone would need to send an<br>extra layer of authentication. So when<br>Marquez's phone receives the transaction<br>request from what it thinks is a transit<br>reader, it's going to be expecting that<br>value to be set to one. But in reality,<br>the device sending the request is our<br>retail reader. And this reader is<br>online, which means that that bit is<br>currently set to zero. Therefore, to<br>trick the phone into accepting the<br>transaction, we intercept the message<br>from the reader, pass it through our<br>computer, and we change that zero to a<br>one. So, by the time the message gets to<br>Marquez's phone, it looks like a transit<br>transaction.<br>As this communicates through our<br>computer, we're we're convincing the<br>phone that it is in fact talking to a<br>transit terminal. But now, there's a<br>second line of defense we need to break.<br>With this first lie, we bypassed the<br>need to unlock the phone, and we can now<br>trick it into making small payments of a<br>few dollars, the kind you'd expect on<br>the subway. But if we suddenly went and<br>asked the phone for $10,000, well, its<br>guard would go way back up. After all,<br>it's pretty unusual for a transit reader<br>to ask for such a large amount of money.<br>So, this activates a second layer of<br>defense, customer verification. On<br>contactless payments like this, there<br>are two categories of transaction. We<br>got high value and low value. Any<br>transaction that's classified as high<br>value requires additional verification<br>from the customer. For example, in the<br>UK, most banks require a PIN or<br>fingerprint or facial recognition for<br>any transaction over £100. So, for us to<br>get this $10,000 payment through without<br>customer verification, we need to trick<br>the phone into thinking that $10,000 is<br>in fact a low value transaction.<br>And that's actually surprisingly simple.<br>That's because to determine whether the<br>transaction is high value, Marquez's<br>phone doesn't actually look at the<br>numerical value of $10,000. It just<br>looks at another single bit of<br>information in the transaction data. A<br>one here means high value and zero means<br>low. The reason for this is that the<br>boundary between high and low value<br>varies from country to country. And of<br>course, different countries operate in<br>different currencies. So, a simple label<br>allows the flexibility to deal with<br>these variations. and it allows the<br>limits to be changed without the banks<br>needing to issue new cards. So, all we<br>need to do is intercept the message from<br>the reader, flip that bit to a zero, and<br>then the phone will believe that this<br>transaction is low value even though<br>it's for $10,000.<br>Then, when the phone receives our<br>request for a $10,000 transaction, it<br>doesn't ask for customer verification.<br>It just goes ahead and authorizes the<br>transaction.<br>Now, you might be asking, why is this<br>data so easy to tamper with? And we'll<br>get to that in just a minute. But we<br>have one final security check to<br>overcome. See, with these first two<br>lies, we bypassed unlocking the phone<br>and then tricked it into making a high-v<br>value transaction without asking for<br>verification. So, the phone is fully<br>convinced and it's ready to make the<br>payment, but we still need to convince<br>the reader that the transaction is<br>valid. And this is where our third lie<br>comes in. When Marquez's phone replies,<br>it says it's approved the $10,000<br>transaction, but it also says that it<br>hasn't asked for customer verification.<br>No PIN, no fingerprint, no facial<br>recognition. But if the reader sees<br>this, it'll reject the transaction<br>because it knows that the $10,000<br>payment it originally asked for is high<br>value and should therefore require<br>customer verification. So now we need to<br>trick the reader into thinking that the<br>customer has verified the payment. So we<br>intercept the response from Marquez's<br>phone. and look for the bit of<br>information that says customer<br>verification hasn't been done. Then we<br>change it to say that the payment has<br>been verified by flipping this zero to a<br>one. Now the reader's happy. It forwards<br>the information onto the bank and the<br>bank authorizes the payment. After all,<br>it sees a transaction that's been<br>verified by the customer on their<br>device.<br>Green approved.<br>That is crazy.<br>>> Verified on device.<br>>> Yeah, verified.<br>>> You didn't verify it,<br>>> right? So, why isn't all this<br>information encrypted? That would make<br>it impossible to secretly tamper with.<br>Well, the way the phone and reader<br>communicate has to be compatible with<br>thousands of different devices, which<br>would be impossible to update all in one<br>go. So, for that reason, the information<br>we've looked at so far is just sent<br>across unencrypted.<br>Even still, phones, readers, and banks<br>all have checks in place to make sure an<br>attack like this can't happen. And<br>normally, it can't, except if you happen<br>to use a specific type of phone and a<br>specific type of card because when you<br>combine them in this particular<br>scenario, they create a loophole.<br>So, our hack relied on a specific phone<br>and credit card combination. We also use<br>a sophisticated method developed by<br>cyber security experts. But hackers are<br>scammers online. Well, they don't need<br>to be that smart. Often, they can just<br>buy information to target you. When I<br>started working at Veritasium, I was on<br>a work trip to go meet Derek for the<br>first time. And I got an email from<br>somebody was saying he was Derek asking<br>for my phone number. That made a ton of<br>sense. I was leaving the airport. So, I<br>just responded by sending my phone<br>number. I immediately was like, "Wait,<br>let me look at that." I checked the<br>email. Not Derek. Of course, for the<br>next few months, I was just getting scam<br>call after scam call. That's one way<br>they can get you. I felt like an idiot.<br>But it's not just scam calls like that.<br>I've also had that feeling after news of<br>a major data breach. I've wondered<br>whether me using some website has led to<br>my personal information being exposed<br>somewhere without me even knowing about<br>it. But you can protect your personal<br>info with today's sponsor, Incogn. See,<br>whenever scammers purchase your email,<br>phone number, and even your home address<br>from data brokers, Incogn automates the<br>grueling process of requesting that<br>these data brokers delete your<br>information. Okay, so I've had this<br>since June 2025. And since then, we've<br>had 94 different removal requests. And I<br>really like how you can track the<br>progress in this dashboard here. They've<br>estimated that that saved me 70 hours<br>and 30 minutes of my own time if I were<br>to reach out to these people myself. And<br>with Incogn's new custom removal feature<br>in their unlimited plans, you can point<br>to any specific site where your<br>information is visible. And then one of<br>their privacy agents will take care of<br>the rest. So to take your data off the<br>market today, go to<br>incogn.com/veritassium<br>and then use code veritassium for 60%<br>off. You can click the link below or you<br>can scan this QR code to claim that 60%<br>off and get your personal data off the<br>market. I want to thank Incogn for<br>sponsoring this video about taking money<br>from Marquez Brownley. And now let's get<br>back to that thing.<br>So which combination of card and phone<br>make this hack possible? Firstly, the<br>phone has to be an iPhone. As we saw<br>earlier, when an iPhone is deciding<br>whether to ask for customer<br>verification, it doesn't look at the<br>numerical value of the transaction. It<br>only looks at the high value or low<br>value label provided by the reader. But<br>other phones don't work that way. For<br>example, when a Samsung phone goes into<br>transit mode, it doesn't rely on this<br>low value label from the reader. It<br>looks at the actual numerical value of<br>the transaction, and it only accepts a<br>payment of $0. Then it relies on the<br>transport provider to count up all the<br>times you've used the subway and then to<br>send you a bill at the end of the day.<br>So if a Samsung phone saw a transit<br>terminal trying to charge you $10,000<br>for a single tap, it would immediately<br>reject it. But it's not just Apple's<br>transit mode that makes this hack<br>possible. You've got to have one<br>specific type of card in the transit<br>slot.<br>>> It was tr truly a design feature that<br>was introduced by the way you mixed<br>Apple and Visa. And the reason that this<br>works with a Visa card, but wouldn't<br>let's say a Mastercard, comes down to<br>the different processes they use to<br>verify transactions. So, what is it<br>about Visa's verification process that<br>makes this hack possible? In a previous<br>video, we saw that any card transaction<br>relies on a secret cryptographic key<br>shared by the card in the bank. When you<br>tap the card or phone onto a reader, the<br>reader sends across a long string of<br>transaction details. The card then<br>applies its secret key to garble that<br>message into a unique code for the<br>transaction. The card sends this to the<br>reader which the reader forwards onto<br>the bank along with the raw transaction<br>details. The bank then applies its own<br>secret key to the raw data as well. And<br>if the output matches the one from the<br>card, the bank authorizes the<br>transaction. This is called symmetric<br>cryptography since the card and the bank<br>use the same secret key. And this step<br>is required in all transactions no<br>matter whether you have a Visa, a<br>Mastercard or something else. But<br>there's actually another layer of<br>security which Mastercard uses in all of<br>its transactions. But in this particular<br>case, Visa doesn't. This layer of<br>security is not between the card and the<br>bank, but between the card and the<br>reader. And it's at this step where<br>Mastercard thwarts our attack.<br>The second step relies on asymmetric<br>cryptography, so-called because it uses<br>two different keys, a private key for<br>the card and a public key for the<br>reader. It starts with the reader<br>sending across the transaction details<br>to the card. Just like before, the card<br>then uses its private key to garble that<br>message into another long string of<br>digits. This is the card's digital<br>signature for the transaction. The card<br>sends this signature back to the reader<br>along with the public key which the<br>reader then uses to verify that the<br>signature came from that specific card<br>for this specific transaction. To<br>illustrate how this works, let's<br>consider a simple example. The private<br>key and public key both have two<br>components. N is a shared number. In<br>this case, let's say 55.<br>D is the card's private number, let's<br>say 7. And E is the public number, let's<br>say three. Now when the reader sends<br>across the raw transaction data, it<br>represents it as one long number. But<br>for simplicity, we'll use a much smaller<br>one. Let's say two. To sign for the<br>transaction, the card or the phone<br>raises the transaction number, in this<br>case 2, to the power of its private<br>number. So we get 128. And then divides<br>this by the shared number 128 over 55,<br>which leaves a remainder of 18.<br>And this is the card signature 18 which<br>it sends on to the reader. Now the<br>reader needs to know whether the<br>transaction is valid. So it takes the<br>card's signature and raises it to the<br>power of the public number. Then it<br>takes the remainder when you divide by<br>the shared number 55 and you get two.<br>This matches the original transaction<br>data the reader sent to the card. The<br>reason this works is that the private<br>and public numbers are specifically<br>chosen so that when combined with the<br>shared number, the public key<br>effectively reverses the operation of<br>the private key. And this allows the<br>reader to verify that the card signature<br>is valid without ever having seen its<br>private number.<br>This is based on a type of cryptography<br>called RSA. In reality, the numbers<br>involved are much larger, but that makes<br>it incredibly secure because that makes<br>it virtually impossible to reverse<br>engineer the card's private key. And it<br>also means that even a one-digit change<br>in the transaction data will produce a<br>different result when the reader checks<br>the phone's signature, in which case the<br>reader won't approve the transaction.<br>This is a problem because we've modified<br>the data. The reader is expecting a<br>signature for a high value retail<br>transaction, but we intercepted the<br>communication. So the phone signature is<br>actually for low value transit<br>transaction. This wouldn't pass the<br>asymmetric signature check. But while<br>Mastercard always requires this<br>asymmetric verification which would spot<br>our hack, Visa doesn't. They only<br>require this signature in certain<br>situations like when the reader's<br>offline. For example, when you're<br>underground with no signal, there's no<br>way for the reader to communicate with<br>the bank for that first layer of<br>symmetric cryptography. At least not<br>until it comes back online.<br>So during our attack, we make sure the<br>reader is online the whole time. That<br>way, it doesn't bother using the<br>asymmetric layer of security, which<br>contains the signature that would<br>unravel our lives. But the funny thing<br>is, we've tricked the phone into<br>thinking it's interacting with the<br>transit reader. And transit transactions<br>are one of those times where Visa does<br>require the asymmetric signature since<br>the reader could be underground on the<br>subway and therefore offline. So, the<br>phone actually does send across its<br>signature to the reader, but the reader<br>doesn't check it because in reality, the<br>reader is online. So instead, it just<br>relies on that first layer of security<br>with the bank. Even though if it did<br>check the phone signature, it would have<br>all the evidence it needed to stop the<br>hack.<br>>> So yeah, there you go.<br>>> Makes sense that it's that sophisticated<br>cuz it shouldn't be that easy. But that<br>still seemed way too easy.<br>>> And Marquez was not the only victim. I<br>thought it was only fair that I first<br>try it out on myself.<br>>> Approved.<br>>> Yeah. Here. Your souvenir from the UK<br>from Tom and me. Oh, what a lovely<br>receipt for this this theft.<br>>> And then I got another victim with a bit<br>of a bigger budget. Our channel has a<br>like CFO basically who lives very<br>nearby. What we're doing is we're<br>setting it to be your transit card.<br>>> Okay.<br>>> So that means that if if you're in<br>London, you have to use the two. It'll<br>take money from this card. Something<br>just happened.<br>>> Yeah.<br>>> How you feel about that?<br>>> Oh my goodness me. Oh my god.<br>>> There you go.<br>>> We were just going to meet for a drink.<br>That that's what you know that was the<br>agreement.<br>>> In the real world, say you had your<br>phone in your pocket.<br>>> Yeah.<br>>> I would walk by you<br>>> doing this and Tom would have this in a<br>shop and pay.<br>>> The easiest way for this to actually be<br>a crime would be a stolen iPhone.<br>>> Sure.<br>>> And then someone goes and spends<br>thousands of pounds.<br>>> So, you know, you you could buy a car<br>with this.<br>>> Yeah. Yeah. Theoretically. Jeez.<br>>> Yeah. Wow.<br>>> I guess from your perspective, you've<br>revealed all this information publicly.<br>You're telling us we're walking it<br>through it in great detail. How does how<br>do we stop people from using this for or<br>can we stop people like who's whose<br>responsibility is is it to stop this?<br>>> Oh, whose responsibility is it is an<br>interesting question. But you can stop<br>it by turning uh transit mode off<br>>> or not turn it off and not have a Visa<br>card in transit mode on an Apple.<br>>> Yes. And you do need to be careful<br>because as soon as you have a suitable<br>card in your Apple Wallet, Express<br>Transit mode is turned on by default.<br>This hack was first made public way back<br>in 2021 after the professors had<br>informed Apple and Visa privately. And<br>to get to the bottom of why it's still<br>possible, we reached out to Apple and<br>they didn't agree to an interview. But<br>here's what they said. This is a concern<br>with the Visa system, but Visa does not<br>believe this kind of fraud is likely to<br>take place in the real world. Visa has<br>made it clear that their card holders<br>are protected by Visa's zero liability<br>policy. This is exactly the same as<br>their position when the hack was first<br>made public back in 2021. So it seems<br>like Apple are basically saying, well,<br>this is a Visa problem. So we went and<br>asked Visa what they thought.<br>>> I think this specific vulnerability is<br>likely within a controlled setting, very<br>unlikely from a scaled real world<br>setting. And then kind of the last point<br>is from a consumer perspective is that<br>in the cases where this is successful,<br>they have the ability to dispute this<br>transaction and get their refunds<br>returned to them.<br>>> I I think that's fair. You're saying<br>it's not entirely scalable and then even<br>if it does happen, we'll give you your<br>money back. Like that that's a great<br>it's a great stance.<br>>> I still think though a lot of people and<br>I think our audience would really want<br>to hear that you're actually making the<br>technical changes to stop this from ever<br>happening again. is when you think about<br>it from a scale perspective<br>and whether the network level defenses<br>that we have are effective in making<br>sure that this type of vulnerability is<br>isolated. We believe it is effective<br>because if it wasn't, you would hear a<br>lot more data about how this is an issue<br>and it simply isn't. The the point that<br>I'm making is that you're never going to<br>be able to completely eradicate any<br>specific type of fraud because it's<br>going to exist, right? Yes.<br>>> What I'm saying is that we have the<br>right detections in place to ensure that<br>this type of fraud is not endemic.<br>>> Would it not be even better to just say<br>this type of fraud is not possible? Why<br>not just say it's not probable? Why not<br>just totally get rid of it by<br>implementing an actual technical change?<br>>> If you think about for every $100 of<br>spend that occurs on card payments, 10<br>cents of that is lost to fraud.<br>>> So every $100 10 cents. If you look at<br>in-person transactions, which is what<br>kind of this topic is really much more<br>related to, that number goes down to two<br>cents for every $100 of fraud that's<br>being made.<br>>> So, I've been thinking about this hack<br>and it reminds me a lot about people who<br>are afraid of flying. Statistically,<br>you're a lot more likely to crash on the<br>drive to the airport than you are in the<br>air. So, I do understand Visa's argument<br>generally. Compared to other kinds of<br>fraud, this is just a drop in the ocean.<br>But airlines don't accept a small number<br>of crashes each year as an inevitable<br>cost of doing business. No, anytime<br>there's a crash, they analyze it<br>meticulously. Then they do everything in<br>their power to make sure that it's never<br>going to happen again. Visa says that<br>they'll get you your money back, and<br>that's great, but you've still got to<br>notice the charge, dispute it, and then<br>wait. Imagine waking up to see $10,000<br>gone from your account. That's money for<br>rent, insurance, car payment, or a<br>medical bill. Even if the refund does<br>come, the stress before is going to be<br>very real. So for me, the question is<br>whether just saying they're going to<br>refund it after the fact is good enough,<br>or when a system touches the lives of so<br>many people, should we expect better?<br>One last thing, we've been nominated for<br>two Webbby awards. One for our video<br>about the dangers of forever chemicals,<br>and that's been nominated for best long-<br>form video. The other one is about<br>American football, and we did it with<br>Tom Brady. That's been nominated for<br>best creator to creator collaboration.<br>The thing is, when I checked last, we<br>were second place in voting for both of<br>them. So, if you want to help us out,<br>you can go to the Webbby website and<br>vote for us up till April 16th. So, if<br>you do that, thank you very much.<br>That'll help us out a lot. And as<br>always, thank you for watching.<br>Okay. Yeah, that's the that's the whole<br>demo. I will now give you your money<br>back. Yes.<br>Okay. We got the