EEVblog

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 พ.ย. 2024

ความคิดเห็น • 177

  • @ScramblerUSA
    @ScramblerUSA 10 ปีที่แล้ว +127

    I actually spend more than 3 years developing applications for different POS devices, including Sagem EFT30 snd EFT930 families. So a couple of things:
    0) This is EFT930S model. S has Ethernet as communication method, so no GPRS here.
    1) Those are SAMs, not SIMs. SAM stands for secure application module. Those are to receive custom security devices, carrying some extended security keys, etc.
    2) Anti-tamper protection on these devices is really amazing! Not only they have tamper switch, but... Basically, there is a bunch of security keys (PIN key, MAC key, etc.) stored in flash inside crypto-processor. They are stored encrypted by the master key. Master key resides in crypto-processor SRAM. As soon as this crypto-processor detects tampering - it destroys master key. This in turn makes encrypted keys useless, because you can no longer decrypt and use them. And tampering conditions include, but not limited to:
    - case opening
    - temperature above max/below min
    - voltage above max/below min
    - invalid signals on I/O ports (e.g. you put something completely unexpected on USB bus)
    - circuitry parameters (impedance, capacitance) - you CAN'T just bodge something in
    - there is also a guard mesh wound around crypto-processor's crystal, so if you bypassed all the other systems and try to de-pot it to read contents using microscope - oops, keys are gone as soon as this mesh receives any damage.
    - un-sogned application upload to device - yes, even if you have the SDK, and wrote an app for this puppy, you have to sign it with some special key in order to be able to upload it to device
    3) It goes to "MOCKUP" mode after destroying the keys. To return it to productuion mode, you have to send it back to factory - i.e. only MANUFACTURER can revive it, not just a retailer or something. It requires factory keys for that.
    4) PINPAD in general is a separate device, connected to POS TERMINAL, so customer can enter his PIN, while merchant has the terminal. So it's not really correct to call this terminal a pinpad.

    • @EEVblog
      @EEVblog  10 ปีที่แล้ว +21

      Alexander Khritonenkov Thanks for the detailed info!

    • @TeganBurns
      @TeganBurns 10 ปีที่แล้ว

      Wow thats pretty impressive!!

    • @Kranbone
      @Kranbone 9 ปีที่แล้ว +2

      +Alexander Khritonenkov given your experience in the industry can I ask if we are more secure now compared to the past?

    • @ScramblerUSA
      @ScramblerUSA 9 ปีที่แล้ว +4

      Kranbone with EMV we definitely are safer. Just make sure to use the chip and don't fall back to magnetic stripe in suspicious locations.

    • @Kranbone
      @Kranbone 9 ปีที่แล้ว +1

      Alexander Khritonenkov thank you for your advice and input.

  • @lukestone1699
    @lukestone1699 10 ปีที่แล้ว +13

    Nice to see my item made it to a Teardown, Also i think that massive cap is probably not for tamper resistance but for the thermal printer. I have seen similar large ones in Dymo Thermal Printers.

  • @DanT10
    @DanT10 10 ปีที่แล้ว +10

    For those concerned there is a small industry in hacking these pin pads (as they are called in North America). People steal them and drill into to cases in specific places (bypassing the anti tamper). Which allows the harvest of PINs and MSR Data. Many stores are now physically locking down the pin pad so they cannot be stolen.
    Always check that the seal is in place in a pin pad. Also make sure that there are no funny holes in your pin pad.
    Also simply covering the keypad will stop people from recording your PIN with a video camera.

  • @jotaemebee
    @jotaemebee 10 ปีที่แล้ว +8

    metal pins at 15:45 are for minimizing smartcard socket to erode, many card insertions are expected and not always well-aligned to the socket, so plastic card will roll across the metal pins and not the plastic edge of the socket

  • @BastetFurry
    @BastetFurry 10 ปีที่แล้ว +26

    (Lawyer notice: This is not a manual on how to do it, it already happend that way here in Germany.)
    Gut one out, replace with own hardware that lets any card pass, store card data and PIN on mSD and call it a day, normal folks will never get the difference.
    If you want to spot that "hack" enter your PIN incorrectly the first time. If it passes the device is hacked. If you want good karma you tell the store folks. If you suspect the store owner to set this up, just walk away and call the police. :)

    • @jackaw1197
      @jackaw1197 10 ปีที่แล้ว

      I'd be pretty sure that there would be many more ways a store's system's could tell something is wrong, however if you were simply running your own 'store', it could be somewhat more successful. there are still many problems, like the pin thing you mentioned, and losing money every-time you give away a product without actually getting paid for it, also, nothing would show up on the victims statement, and anyone who happened to use a smart-card enabled card would be essentially impossible to steal from, because of how smart cards work

    • @BastetFurry
      @BastetFurry 10 ปีที่แล้ว

      ***** Here in Germany its you stick that card in, so the chip thingy is involved, press Enter once if you are OK with the price, enter your PIN and press Enter on that and either the terminal is fine with your PIN or not.
      So Joe Average could never tell that he just got his card number and pin stolen. I should mention that we in Germany use cards that belong to a wire-money/giro account like Maestro, actual credit cards are not that widespread here.

    • @CountSessine
      @CountSessine 9 ปีที่แล้ว +1

      Bastet Furry I don't get it - what's the point? The smart card uses a challenge-response exchange - recording the PIN is useless and there's nothing else to record other than the chip's response to the server's transaction-unique challenge.

    • @BastetFurry
      @BastetFurry 8 ปีที่แล้ว +1

      Ted Middleton
      They just need to regenerate the data on the magnetic stripe and then go grab the money in an "underdeveloped" country.
      No harm to you, because you can prove that you where, for example, at work and ~1000 km away from the terminal the money was withdrawn from. The banks rather pay what was lost trough fraud than fixing their system. :3

  • @berniwa
    @berniwa 10 ปีที่แล้ว +18

    There are some things I disagree about:
    1. The SIM Card holders are most likely SAM Card (+ probably 1 sim) holder en.wikipedia.org/wiki/Secure_access_module
    This may also be the reason its processor is not secured to hard, as the crypto stuff is done in the SAM module
    2. The "shielding with an unpopulated connector"you described at ~ minute 10 seems to me like and unpopulated GRPS module that could for example hold a telit module www.telit.com/products/product-service-selector/product-service-selector/show/product/g24-lite/
    3. The unpopulated stuff on the other side of (2) is presumably the powersupply for the GRPS module. Usually GPRS modules need a peak power of round about 7W.

    • @TheMrTape
      @TheMrTape 10 ปีที่แล้ว +8

      Well the text on the plastic does say SAM.

    • @SomeMorganSomewhere
      @SomeMorganSomewhere 10 ปีที่แล้ว +4

      Yeah, that's how those PIN pads typically work, SAMs are a lot cheaper than your typical hardened crypto processor.

    • @jonharson
      @jonharson 10 ปีที่แล้ว

      Exactly, one SIM for GPRS, unpopulated on this device, one SAM for the payment processor, and one for client applications.

    • @rodrigoberger7565
      @rodrigoberger7565 10 ปีที่แล้ว

      Chaiuitita

    • @rodrigoberger7565
      @rodrigoberger7565 10 ปีที่แล้ว

      Chaiuititas

  • @l28power
    @l28power 10 ปีที่แล้ว +5

    Nice teardown Dave. Designing anti-tamper hardware is a really involved process
    I spent many months designing a secure memory device recently for the aftermarket automotive industry.

    • @EEVblog
      @EEVblog  10 ปีที่แล้ว +3

      l28power Yes. This was a relatively simple job, they could have really gone to town if they wanted to.

  • @myusernameislongerth
    @myusernameislongerth 10 ปีที่แล้ว +3

    The massive cap there is for providing power for about 100ms in case of power failure. This allows the application to save any critical data to non-volatile storage. When power fails, The application in the terminal gets an event notification.

  • @mikeselectricstuff
    @mikeselectricstuff 10 ปีที่แล้ว +20

    Only one of the SIMs will be for the cellular radio - the others are to do with the security stuff, which is why they are populated,

    • @lmiddleman
      @lmiddleman 10 ปีที่แล้ว +4

      Yeah. A little surprised Dave didn't connect the fact that security/identity modules have applications beyond cellular.

    • @jotaemebee
      @jotaemebee 10 ปีที่แล้ว +2

      yep, maybe these are SAMs not SIMs for sure

    • @TheEPROM9
      @TheEPROM9 10 ปีที่แล้ว

      I'm surprised by the lack of physical security compared to the unit you took apart. With that design it would not be impossible to crack it open and probe the required chips.
      Although if I was assigned the job of hacking one I would attach a sniffer to the Ethernet and have a raspberry Pi sniff all the packets and wirelessly transmit them to a safe location that would not be risky to recover the data from, or have the remote device use a encrypted 3G/WiFi connection.
      As soon as you make tapping hardware require a recovery you are in real danger of being court for obvious reasons.

    • @aserta
      @aserta 10 ปีที่แล้ว

      lmiddleman Yeah, odd, you find them in printers too, so it's not like it's an oddity.

    • @evghenim1955
      @evghenim1955 10 ปีที่แล้ว +3

      ***** Sniffing the Ethernet packets may (or may not) reveal the credit card number only, but not (for sure) the PIN Code as it is transmitted heavily encrypted.

  • @arlobubble3748
    @arlobubble3748 6 ปีที่แล้ว +3

    Lathering chips in epoxy isn't much of a security mechanism, so it's understandable why they don't bother with it. More the illusion of security than anything else

  • @protogenxl
    @protogenxl 10 ปีที่แล้ว +8

    4:32 that is just a hole so you can see how much receipt roll you have left

  • @andysworkshopuk
    @andysworkshopuk 10 ปีที่แล้ว +2

    I suspect the large cap is there to activate the anti tamper if someone tries to slide an insulator between the button cell and its terminal. The operating life of the terminal would be equal to the life of the battery. Shame Dave didn't measure the voltage left in the battery. If it was exhausted then we know why the terminal was discarded.

  • @twocvbloke
    @twocvbloke 10 ปีที่แล้ว +3

    Over here in blighty we call them Chip & PIN pads (well, the ones where you stab the card in with the chip facing the right way up or down and get complained at cos you pulled out too early (giggety) even though you didn't that is)... :)
    As for stealing people's info, these days all you need is one of them FLIR iphone addons and the ability to mug people and take their cards physically, cos the FLIR thing reads where you entered the PIN on a rubber or plastic keypad (coldest to hottest) and there you have a stolen PIN, though a perfect way to thwart the potential muggers is a PIN with one pair of matching digits, so they can only pick out 3 numbers on the pad which increases the probability of getting the PIN wrong when they go to steal cash... :)

  • @Debraj1978
    @Debraj1978 10 ปีที่แล้ว +5

    Can you make another video with the POS equipment fixed back after tear down and try powering up. Does it display an error message or does not display at all considering that it detected a temper? I have a Garmin GPS that I tore down. But when I put it back and power it up, the backlit glows, but no display on the screen. I believe, it has too some anti-tamper mechanism.

  • @kylesenior
    @kylesenior 10 ปีที่แล้ว +1

    I would bet part of the anti-tamper was having that big-ass cap on a separate board. To access the microprocessor you had to putt it off effectively disconnecting it.

  • @MHRolley
    @MHRolley 9 ปีที่แล้ว

    Nice video - I went away learning a lot of new things! It makes sense when you point it out, but i didn't realise the industry already had hardware security mechanisms. Fascinating stuff, thanks! :)

  • @tready2008
    @tready2008 10 ปีที่แล้ว +1

    i have the same machine, and the phone line plugs into a little box first that is connected to the rs232 port on the little square connector. so i think the modem is also separate,

  • @Muny
    @Muny 10 ปีที่แล้ว +4

    You should do a video on how thermal printing works.

  • @faonlajoie
    @faonlajoie 8 ปีที่แล้ว

    the two nails at the entry of credit cart can be seen by outside; They are guides preventing wear of plastic when insertion of card

  • @WillPhoneman
    @WillPhoneman 10 ปีที่แล้ว

    Separating those two PCB's would trigger it to erase the keys too, that's why the chips are in that metal shield, once you expose the chips, they are already erased.

  • @Renatodonadio
    @Renatodonadio 10 ปีที่แล้ว

    I think the backup power is only given by the battery, the giant cap is there to give "electrocution" to the chips depleting instantly when locks are defeated and erasing all roms

  • @zaprodk
    @zaprodk 10 ปีที่แล้ว +3

    Is it standard practice in Australia to pronounciate it SA-GEM? The company is named "SA-SJEM" (French)

    • @EEVblog
      @EEVblog  10 ปีที่แล้ว +2

      ***** Yes, that is how it's pronounced here. I spent a lot of time at the Sagem factory many years back.

    • @zaprodk
      @zaprodk 10 ปีที่แล้ว

      EEVblog Cool :D - I have been teased a lot of times because i said "SA-GEM" and was told that it isn't the way it was pronounced.

    • @djbassaus
      @djbassaus 9 ปีที่แล้ว +2

      +zaprodk It's not universal.. round my way we pronounce it "Crap"

  • @jekader
    @jekader 10 ปีที่แล้ว +1

    I have a feeling that all the keys are on the smartcards you insert into those "SIM" slots on hte bottom.

    • @t.w.3
      @t.w.3 4 ปีที่แล้ว

      As they are SAM (Security Access Module) they are indeed where the keys are stored and uploaded to the unit itself.

  • @raguaviva
    @raguaviva 10 ปีที่แล้ว

    the cap stores power to flash the firmware when you open the case, no more security is needed. Cellphones store keys without security stuff anyway!

  • @MrGeekGamer
    @MrGeekGamer 10 ปีที่แล้ว

    I don't think switching the unit will work. The units I work with each have a unique identifier plus a site identifier. This is linked to the client's merchant account, so another terminal couldn't just appear to be it - they'd need to replace those IDs.

  • @thephantom1492
    @thephantom1492 10 ปีที่แล้ว

    At 6:55 you can see some very interresting marking on the case. I'm surprised that he didn't noticed it. It explain the 3 "sim" cards and the missing "GPRS" module. The marking say: "SAM1 SAM2 SAM3" and on top of it you see "SD CARD"
    The SD card, I guess, is used for developpement...
    The internal USB is most likelly to connect to the PC/register so it can send the info about the amount, and get back the result of the transaction.

  • @TilmanBaumann
    @TilmanBaumann 10 ปีที่แล้ว +2

    What is the point of tamper resistance if customers are conditioned like trained monkeys to hack in their PIN into any POS looking device?
    Ok, it makes skimming easier if the device actually works. But that is surely optional.
    Surely the real issues are trojan PIN pads and the total lack of authentication of the terminal device towards the card.

  • @mausball
    @mausball 10 ปีที่แล้ว

    That highly stitched area on the green PCB screams switchmode power supply to me. The unpopulated fine pitch header next to the large bare gold fill on the bottom is probably the header for the cellular card. It would make sense, since the cellular card will need an appreciable amount of power. No cellular? No-pop the PS section.

  • @mrjackdavies95
    @mrjackdavies95 10 ปีที่แล้ว

    That plastic spacer would be to prevent downward pressure from the Ethernet USB RS-232 connectors from bending the board?

  • @-Graham
    @-Graham 10 ปีที่แล้ว

    Generally here in the UK we wefer to these as EPOS. Just thought you might like to know.

  • @RaytracedFramebuffer
    @RaytracedFramebuffer 10 ปีที่แล้ว

    In here they use those machines to add credit to prepaid phones. The ones I used back when I worked doing that used GPRS for the transactions, and were pretty nice machines. But we use a different machine for actual transactions with cards.

  • @douro20
    @douro20 10 ปีที่แล้ว

    I wonder if Chris Tarnovsky has had a go at those Dallas secure microcontrollers. The Infineon ones are probably still more secure...

  • @DOGMA1138
    @DOGMA1138 10 ปีที่แล้ว

    The multiple SIM cards is are there for several reasons, the predominant one is that you usually have different payment processors for different card brands and transaction types(debit vs credit, local vs international card etc..). Also back then only some processors offered IP based interfaces while many others still used tone based modulation(basically PSTN (like) over cellular, usually a FAX compliant protocol or close enough), on top of that redundancy is something which was important to some costumers especially in the earlier days of GSM where carrier specific network reliability was a much more common issue than it is today.
    P.S.
    All PCI-DSS standards are available on the PCIcouncil website and on all major card brands, and for the most part they are complete shit when it comes to actual security. It's about compliance rather than about security and it's "cover thy arse" stamp basically for insurance purposes these days.
    www.pcisecuritystandards.org/security_standards/documents.php?association=PTS

  • @rtonynl
    @rtonynl 10 ปีที่แล้ว

    Oh and the usb on the side is for linking to epos. Nothing more. Updates are done over the PDQs connection.

  • @joelholdsworth
    @joelholdsworth 10 ปีที่แล้ว

    Why does the shielding can over the application processor have big open areas in the top of it? That would stop it from working, no?

  • @ggmm206
    @ggmm206 10 ปีที่แล้ว

    Pretty sure that empty connectors on the back of that top board is for the GPRS modem

  • @rtonynl
    @rtonynl 10 ปีที่แล้ว

    There called PDQs in the uk (process data quickly) i install a lot of them here in my job.

  • @ThatGuyThatThumbs
    @ThatGuyThatThumbs 10 ปีที่แล้ว +4

    Was anyone else waiting for explosive the dye pack?

  • @compactc9
    @compactc9 10 ปีที่แล้ว

    Ive always heard them called credit card terminals, or usually just a card terminal. Many businesses with a computer based POS system don't have these anymore, its all done with software on the computer and a USB or bluetooth card reader.

  • @Wintersky136
    @Wintersky136 10 ปีที่แล้ว

    Dave ... This is the E Modell which doesn't has GSM Capabilities... Ethernet & Modem only!

  • @compactc9
    @compactc9 10 ปีที่แล้ว

    I'm not sure how they would go about successfully swapping them without being noticed, the first card swipe would be the giveaway as in order to work it would have to know the correct phone number, the business' account number and the correct serial number. I do know that part of the security is in the communication as well, mostly to detect any sort of nonsense like that. I'd imagine the easy ting to do would be to stick some sort of thing on the terminal that would have a second reader head and memory so that as you swipe the card both the terminal and the added reader will get the card info, they do this on ATMs, they're called skimmers, and its becoming a big problem here in the US.

    • @teardowndan5364
      @teardowndan5364 10 ปีที่แล้ว +1

      A much easier "hack" is to swipe the card out-of-sight on a separate machine and use a camera for the PINs. That's why one of the card companies top security tips is to never let your card go out of sight and cover the keypad when entering your PIN.

  • @seitenas
    @seitenas 10 ปีที่แล้ว

    The big capacitor is used to maitain power when batery is replaced, perhaps.

    • @throwthisaway9
      @throwthisaway9 10 ปีที่แล้ว

      When you unplug the device you have like 80ms to dump things to the flash, I guess that is the big capacitor for.

  • @phillrullzXBL
    @phillrullzXBL 10 ปีที่แล้ว

    have you changed your camera? FPS seems smoother

  • @kylesenior
    @kylesenior 10 ปีที่แล้ว

    The USB ports might be for for connecting the reader to a computerised till system.

  • @SproutyPottedPlant
    @SproutyPottedPlant 10 ปีที่แล้ว

    Great video! Do you think alot of security is on our cards and at the Bank?

  • @martinda7446
    @martinda7446 10 ปีที่แล้ว

    Your video looks glorious Dave. Beautiful smooth sumptuously coloured and of course outstanding content. Did you receive the Irish whelks yet?

  • @Razor2048
    @Razor2048 10 ปีที่แล้ว

    I wonder, if someone knows the location of the security switches, won't they just make a small hole near each one and then superglue them in their pressed position before taking the device apart?

  • @KhanggiTanka
    @KhanggiTanka 9 ปีที่แล้ว +6

    Why are PCB's always green?

    • @Dreadnorth7734
      @Dreadnorth7734 9 ปีที่แล้ว +1

      +Spikey Husky there not

    • @KhanggiTanka
      @KhanggiTanka 9 ปีที่แล้ว +6

      +JamesCon Tanks ok why are they green MOST of the time? jees if you cant answer my question just don't comment

    • @Dreadnorth7734
      @Dreadnorth7734 9 ปีที่แล้ว

      it cheeper for them to be green thats y

    • @KhanggiTanka
      @KhanggiTanka 9 ปีที่แล้ว

      +JamesCon Tanks so green paint iis cheaper than no paint ?

    • @Dreadnorth7734
      @Dreadnorth7734 9 ปีที่แล้ว

      its not paint it what happens in fireing the plastic go green being made

  • @GalaxyCatz
    @GalaxyCatz 7 ปีที่แล้ว

    The driver for the anti-tamper is located???

  • @Daniel3200000
    @Daniel3200000 10 ปีที่แล้ว

    what do you think of the goot RX-802AS solder station

  • @DavidTelesPortugal
    @DavidTelesPortugal 10 ปีที่แล้ว

    14:37 what it that piece o metal sticking out of the bottom black plastic?

  • @dunxy
    @dunxy 8 ปีที่แล้ว +1

    I have a question for those in the know about these.
    I networked a friends shop, they had one of these exact terminals, i noticed it had ethernet,as they pay for a dedicated phone line for their terminal, i suggested they use the ethernet instead, save a few bucks.Never actually tested it, but they contacted their provider (ANZ) and they said it has to use phone line.I find this odd and don't really see the point of having the ethernet connector if you cant use it in place of a bloody phoneline! Unless its something not offered just by their merchant service provider.
    Anyone care to enlighten me? Anyone run a terminal on internet instead of phoneline, in Aus specifically?

  • @kd1s
    @kd1s 10 ปีที่แล้ว

    In the U.S. it's known in InfoSec as PCI-DSS.

  • @Antilevitation
    @Antilevitation 10 ปีที่แล้ว

    why are you waiting so long with the ds1054z review... :(

  • @alch3myau
    @alch3myau 10 ปีที่แล้ว +7

    OPEN IT ALREADY GRR!

  • @Finiras
    @Finiras 10 ปีที่แล้ว

    wow, thats really crappy tamper security (except for the chip). If you just break the cover instead of taking it off by releasing the screws, you can keep the button pressed down.

  • @Atristiel
    @Atristiel 9 ปีที่แล้ว +1

    I'm sure that if I was any good at electronics and software I could get past most of the security measures. For start, you can get past the switches by grinding plastic bit by bit without affecting plastic pressing down on the switches and then gluing the switches down permanently from the opening.
    Or if I was any good at electronics, I wouldn't be so arrogant and would acknowledge the impossibility of the feat.

    • @lukehovington9480
      @lukehovington9480 9 ปีที่แล้ว

      +Atristiel More modern security devices have a woven mesh in the case, so if any tool was to drill into the case would set off the erase procedure.

    • @Atristiel
      @Atristiel 9 ปีที่แล้ว

      +Luke Hovington Now that's a piece of something. Nothing much else to do with such a thing than probing for weakspots through edges of case parts or buttons and screen.

    • @Atristiel
      @Atristiel 9 ปีที่แล้ว

      +Luke Hovington Okay, I read more about their security. It's impossible.

    • @dickcheney6
      @dickcheney6 9 ปีที่แล้ว

      +Atristiel Yeah but you'd have to know where the switches on THAT device are. Dave was able to get this one BECAUSE it was decommissioned. For all we know, every Nth batch might have the switches in different places and even the install techs would likely be none the wiser, since they have no real need to take the terminals themselves apart in order to connect them to the register.
      Not only that, as soon as people start tracing any fraudulent transactions they'll figure out where the "leak" is and you're back to square one.

  • @lejink
    @lejink 10 ปีที่แล้ว

    Next step is to show us how to get the security keys from the chip :)

  • @RandomDigits
    @RandomDigits 10 ปีที่แล้ว +1

    I believe I may have purchased a USB car charger made in a similar very honourable high quality factory. with generous amounts of applied solder. The silk screen was even burned in places to provide security should anyone attempt the reverse engineer the product.

  • @uTube486
    @uTube486 10 ปีที่แล้ว +25

    Please !! Don't say PIN number...it's redundant. It's like saying Personal Identification Number number.
    Sorry, I'll crawl under my desk now....

    • @taemun0
      @taemun0 10 ปีที่แล้ว +25

      And with that, I'd like to introduce the New NTFS File System!

    • @OululainenIhiminen
      @OululainenIhiminen 10 ปีที่แล้ว +9

      Taemun Garacaius And the ATM machine!

    • @EspritBerlin
      @EspritBerlin 10 ปีที่แล้ว +15

      ... like LCD Display ;-)

    • @PeregrineBF
      @PeregrineBF 10 ปีที่แล้ว +9

      PNS syndrome (Personal identification number Number Syndrome syndrome) is the most common form of RAS syndrome (Redundant Acronym Syndrome).

    • @stephenwoods4118
      @stephenwoods4118 10 ปีที่แล้ว +1

      SAI Peregrinus Chai Tea

  • @e5frog
    @e5frog 8 ปีที่แล้ว +5

    Someone can empty it out and stuff their own circuits in it...

  • @EETechs
    @EETechs 10 ปีที่แล้ว +1

    Too bad no company has found a 100% way to stop side channel attacks. When a processor has to process data, it will draw current spikes of a specific pattern for whatever it is doing. Also electromagnetic waves that leak out of products not very well shielded could also be another attack vector.

    • @MrOpenGL
      @MrOpenGL 9 ปีที่แล้ว

      +EETechs Can't you just put an extremely big capacitor, maybe several small ones in parallel to reduce ESR? I think that's what the big capacitor is all about.

  • @TheDutyPaid
    @TheDutyPaid 10 ปีที่แล้ว +1

    Videos no longer play using the TH-cam app on my android note 2, anyone with a tech head got an idea? App fully updated.

    • @pordzio
      @pordzio 10 ปีที่แล้ว +1

      Dave's latest videos are uploaded in 1080p50. Maybe this is the issue?

    • @TheDutyPaid
      @TheDutyPaid 10 ปีที่แล้ว

      ***** a video from 4 years ago played and one from last month. Tried another from 2 years ago but it looks like it is hanging on or waiting for the advert. Must be a TH-cam bug?

    • @pordzio
      @pordzio 10 ปีที่แล้ว

      TheDutyPaid Yeah, looks like that's the case here. Try clearing the cache (go to settings-> apps -> youTube -> Clear cache). If that doesn't work, the write either to Samsung, or to Google directly.

    • @robertcalkjr.8325
      @robertcalkjr.8325 10 ปีที่แล้ว

      I have Win8.1 and haven't had a problem with any videos in 2 years. Maybe it's because I have fiber optic internet service, I'm not sure.

    • @TheDutyPaid
      @TheDutyPaid 10 ปีที่แล้ว

      Robert Calk Jr.
      This is for my phone, but now I am having problems on my PC Win7 and my internet is 80 down / 20 up.

  • @Leviathan15s
    @Leviathan15s 10 ปีที่แล้ว

    The key pad is upside down, weird.

  • @aerox8103
    @aerox8103 9 ปีที่แล้ว +1

    in sweden we call it "kortterminal"

  • @VandalIO
    @VandalIO 3 ปีที่แล้ว

    Most of the pads are very shiny … it looks like these are leaded joints

  • @albb0920
    @albb0920 10 ปีที่แล้ว +1

    I think people can actually make a fake terminal that looks just like it and replay megstrip / key stroke to the actually device.

    • @Atristiel
      @Atristiel 9 ปีที่แล้ว

      albb0920 Maybe the further devices need security signals from the terminal along with transaction information to check if it's a legitimate terminal.

  • @FC-xr1yp
    @FC-xr1yp 10 ปีที่แล้ว

    Very cool video, learned something new today :)

  • @FrontSideBus
    @FrontSideBus 10 ปีที่แล้ว

    Chip & pin machine in the UK.

  • @titorider1
    @titorider1 10 ปีที่แล้ว

    Nice piece of technology good video 10 /10

  • @MultiMegaMaxx
    @MultiMegaMaxx 10 ปีที่แล้ว

    awesome video!

  • @Daniel3200000
    @Daniel3200000 10 ปีที่แล้ว +1

    Or
    JBC Soldering Tools CD-2SD Precision Soldering Station - 230V - 2014 EDITION

  • @MnemonicHack
    @MnemonicHack 10 ปีที่แล้ว +1

    Would you call "engineering technicians" or "technologists" actual engineers, or would you reserve that title for someone who's gone through at least four years training?

    • @michaelrodger1170
      @michaelrodger1170 10 ปีที่แล้ว +3

      Would you regard this post as relevant to the video, or would you expect it to be posted somewhere else?

    • @MnemonicHack
      @MnemonicHack 10 ปีที่แล้ว

      I can't see the problem, since other people have asked unrelated questions and have gotten them answered in past videos. Ergo, as far as I can tell, there's no unspoken or hidden rule asto where one can't ask questions that aren't pertinent to the subject of the video.

    • @jonharson
      @jonharson 10 ปีที่แล้ว

      To be called an engineer one must be part of an order.

  • @nicoduck
    @nicoduck 10 ปีที่แล้ว

    Hackers nowadays don't need do physically tamper the devices. They got lan, sd-cards, wifi and other sort of interfaces which are not always 100% securely implemented ;)

  • @RecycleBin0
    @RecycleBin0 10 ปีที่แล้ว

    is that giant square or shielding
    REAL GOLD?????????????

  • @michaelrodger1170
    @michaelrodger1170 10 ปีที่แล้ว +3

    A local company (MWR Labs) have experimented with vulnerabilities in POS machines. Here's a video of them running Flappy Bird and a racing game using software exploits. vimeo.com/user12202355

  • @Gamewwx
    @Gamewwx 10 ปีที่แล้ว

    Cool device

  • @AlwayzPr0
    @AlwayzPr0 10 ปีที่แล้ว

    that is butter smooth.

  • @Pieh0
    @Pieh0 10 ปีที่แล้ว +1

    SAM != SIM

  • @acasosonilegaleslospisosfl6741
    @acasosonilegaleslospisosfl6741 6 ปีที่แล้ว

    Jajaa buenisimo, me encanto la serie, porfavor sube la segunda temporada saludos

  • @TransitAndTeslas
    @TransitAndTeslas 10 ปีที่แล้ว

    Looks like a ripoff of Ingenico here in the US

  • @JasperWaale
    @JasperWaale 9 ปีที่แล้ว

    Ones more just show, better to pay the " man" then try the hard way, why hack a company if they have a 100usd a month staff

  • @CountParadox
    @CountParadox 10 ปีที่แล้ว

    I got in trouble for having one of these, apparently they belong to the bank D:
    I had to return it after buying it for like $30 :(

  • @audibell
    @audibell 4 ปีที่แล้ว

    chip and pin

  • @N1CH0LAS12
    @N1CH0LAS12 10 ปีที่แล้ว

    I was born in 1994 awesome :-)

  • @SproutyPottedPlant
    @SproutyPottedPlant 10 ปีที่แล้ว

    @zaprodk zeeeeeeeeeee! Murca!!! You Essay you essay!!!!

  • @kandikid710
    @kandikid710 10 ปีที่แล้ว

    My iphone works fine

  • @hammershigh
    @hammershigh 10 ปีที่แล้ว

    whoops, my ears just fell off...

  • @saadamiens
    @saadamiens 10 ปีที่แล้ว

    I know why everybody came to see this video, ha haaaaaaa ;)

  • @TheBN1soldier
    @TheBN1soldier 10 ปีที่แล้ว

    Jazz

  • @Cashpots
    @Cashpots 6 ปีที่แล้ว

    PLEASE try and lower your voice tone. It is SO annoying - all you need to do is try to speak more from your chest. I love your stuff but increasing find I need to turn the sound off to watch.