 Thank you guys very much. Give Ducky a big hand. Yeah! I love you, brother. I love you. Kill it. All right. Thank you. Okay. I feel like I don't need to go through this part. Because Dr. K.S. Taylor already did. But my name, as you know, is Ducky. Some people call me Scott Molnick. I am the Principal Security Research and Developer for Bulletproof. I've been in the gaming industry for over 13 years. I worked for a slot company. I've done everything from slot development, system software, security, security ops. I had the whole IT networking and everything career, like probably most of you. I have over six patents in that field. This is my information to get in touch with me. And I imagine you can find us on the slide. So what we're talking about, the what? What is Hustler Casino Live? Well, it's an online streaming real money game poker tournament. And they air every night where they invite some of the best poker cash players and stream it online. There's quite a lot of streaming. Some buy-ins have exceeded $1 million on the show. You have to pony up a million of your own cash and chips to get on. So you know what happened? In November of 2022, there was a newcomer. She was a casual leisure player by the name of Robbie J. Lude. She was accused of cheating. Her opponent, which we'll get into, shoved for all in. And she won a $269,000 pot, which with a poker hand that she probably should have folded before the actual flop. So basically, everything just went wild, man, after that. And you'll hear the announcer. These streams are delayed. So the announcer who announces on YouTube, he doesn't even know what's going on. He has no knowledge to keep it kind of real. And so after that, the internet went wild. Reddit, Twitter, podcasts, the whole world was like, this is weird. She is cheating without a doubt. And Garrett Allison, it was known. Allison is known as one of the top cash players. And she beat her. So the whole world. Even these guys, if you believe they're coming or not, if you've been watching the conspiracy theories, I'm pretty sure they think that she cheated too. So right now, in case you haven't seen the hand, I'm going to show it, hope the video goes well. You will recognize, if you do follow poker, one of the very famous all-time poker players and card players, Phil Ivey's here at the table. He folded pretty quick with a better hand, actually. And let's watch it. And we don't have sound. I'm going to pause this. Sorry. I can if I have to. But it's important to kind of hear what's going on. So I need to check Windows. I'm going to try it again. Okay. Windows on mute. There it is. I didn't know I was responsible for meeting this. Here it's raised with Jack 4 off. It's wine versus wine. And Garrett here has flopped a straight flush draw. 10-10-9 with a couple of clubs. He's going to bet 2,500. Wow. And Robbie's going to call here with Jack 4 with the Jack of Clubs. Turn is 8-3. He puts backdoor hearts down. This is usually when Garrett will lay the hammer down with combo grace. He's going to bet 10,000. And I think Robbie should have probably been out of his hand pretty far. That's a car payment. She's got a one club and one heart. And wow, look at this. What is she thinking about here? She's going to raise it. We saw her raise Ace King a little bit ago for a min-raise. Here she's going to min-click Jack 4. And you know Garrett is just so experienced. Hold on, let me scratch her face. That's the shit I got. How often would she do this with a 10? Could he possibly bet 3-bet here? I mean, she just min-clicked the turn. If he calls, it could be about two pot size bets left. So I think that's what's got to be going through his head here. I think he's considering bet 3-betting. And yup, there's the all-in. There's the all-in. Garrett, like I said, he's just so experienced in bet patterns, bet sizing. I will still be gone forever. She's going to put an iron chip out. Real many games have options to call a time-out when you really have to think about some shit-talking happening right here. She calls? For once, but it's up to you. Oh my god. What is going on here? For once, but it's up to you. We're talking about running at twice. The river, which you can do. So it could end up 50-50 split. Go to the river. The river is a 9. They're going to run it twice. She's going to... You give me that much credit? She's good with the first one. Let's turn him over. No, no, no. Wait, the cards are correct. And the river breaks out again. Oh my god. I didn't... I want to see... Does she have jacks for? She has four jacks. Whoa! Whoa, that's... Look at Garrett's face. That doesn't fucking poke it right. That was sick. That was sick! That is super, super strange. You can see his reaction. Like, what is... You look like you want to kill me. There's why the laugh... Thanks. 20 years in tech. Thank you. Hello? Okay, there we go. This is better anyways. Wow, I'm very technical. By the way, this is why they called me in on this. Yeah. If you don't understand poker, and why she should have never even had this hand, don't worry about it. It's not the fun part. But everyone in the poker world knows you don't really keep that hand and play it out. And you see the look on his face. And if you watch the whole video, it's not hard to find this lookup J4 Hustler scandal. And it continues. He's talking. He's like, that's not a poker hand. And he's running the whole game through his head, trying to figure out what possibly could have gone on. And he has been cheated before. Not on live TV, though. Sorry, live YouTube. So, we got called in. So, as you know, I work for Bulletproof. So, why Hustler Live decided we're going to have an investigation here. Everyone's really upset about this cheating. And there had been, like, the postal cheating a few years back before that. And they never investigated it and said everything's fine. So, Hustler Casino Live did the right thing. And they said, let's get a security expert in here and look at everything. So, why Bulletproof? Well, as you heard at the beginning, we have gaming experts. We have gaming experts in this business, in the casino and lottery business. And, of course, we're security experts. But we're also owned in a part of a GLI company. We are a GLI company, and that's Gaming Laboratories International. What gaming labs do is they write the guidelines for gaming regulations. And states, countries, everyone uses those guidelines to make regulations. So, every state has different regulations. So, Nevada, for instance, has regulations based off of GLI's recommendations. So, once they do that, all the vendors have to comply with that. You know, they make their slot machine or their deck shuffler, and they submit it to the lab where it goes through the states, whatever specifications they did. They test it, and they give it the stamp of approval. So, we also have that resource. But what's important here about the gaming experts is there are so many nuances in gaming and really understand how it works. Coming from the outside, you think, oh, this is unsecure. But you have to understand, you know, like the mitigations and like what to do and how things work. Kind of like cop pits and airplanes are unsecure. If the door's open, we kind of know that. So, the FAA actually has a lot of rules about how to secure that door, because there's nothing else you can do. But so, they secure the door, pilots have procedures. It's kind of, that's an analogy. And so, that's why it's important what they picked us. So, the scope. The scope was like a dream come true. They're like, hey, look for evidence to cheating. Address all these conspiracies which we're going to get into. And figure out all the ways you can cheat. And then tell us how. And we're going to close that. I mean, what a dream. You're asking me to figure out how to cheat? I mean, who gets an assessment like that, right? And, you know, okay, challenge accepted. So, let me tell you about this talk, though. So, now I'm going on this assessment blindly. I've no idea what they have. And I've got to do this quick. So, this is kind of a war story. And per the last slide, this is why you hire hackers. So, you know, I went in and did all the forensic stuff, you know, imaging machines, whatever. We can, you know, you learn that forensics 101. But they don't kind of teach you how to cheat. And figure out and hack stuff. And this is what was needed. And this is why you hire hackers. Or why you should. All of you. And really, the root of this talk, even though it's going to be a lot of war story, this is how security conferences, mainly DEF CON. I've been coming since DEF CON 13. And before that, Hope, a long time. And this is about how the community has really helped me with all these facets of technology. Whether I was interested in it or not, I saw it. And I made so many friends. And it's kind of like having a catalog in your back pocket of experts when you need them. And that can teach you. This is before chat GPT. And you can get accurate information from your friends. So, let's address the conspiracies for a moment here. So, this is a signaling conspiracy that she was accused of using a vibrating ring. She was accused of using a sex toy. And a tens unit. The sex toy probably may have come because this was a few months after the chest cheating scandal, if you're familiar with it, where I think Elon Musk kind of suggested that the guy was wearing a sex toy and being signaled. And I think it just kind of flowed over from that. So, this is one of the conspiracies that I had to deal with. And then there was a lot more, and we're not going to get into it, but people like the card shufflers rigged. There's unsecured communications to the booth. And the cameraman, like they can hear, someone can pick up all the chatter of what's going on the booth. She had special sunglasses. And about the rigged card shuffler, I submitted this talk back in June or the final slides. So, I didn't really get to change them, but there was a talk at Black Hat kind of based off of this. So, I'm going to add a few more things to that, and then we'll move on. So, before I even got there, there was all these complications. She gave the money back to him. Whoa. She said, you know, she felt threatened and cornered, and maybe she did. I wasn't there. I didn't look at that video. But to the poker world, it was admittance of guilt. And like, I don't want this to go any further. I'm just going to give the money back and make this go away. Yeah, it didn't. It was just admittance of guilt. So, I don't know, you know, maybe she should have spoke to a lawyer, but she did it right after the game. Oh boy, it gets better. This guy, what a piece of work. I'm not going to butcher this last name, but Brian. Still on the run from the police and a wanted man in LA. Well, he worked for Hustler Live Productions in the booth, so he had knowledge of the hold cards. He knew all the cards the players had. So, I'm going to take a sip of water. He had knowledge of that. So, when Hustler Casino, which is different from the live production, went through security camera footage of the whole game and after. After the game, when everyone kind of left the table, there were still some poker players there, the production people were there, and they're all, you know, shooting, you know, the shit. He pawned $15,000 worth of chip off of her stack at the table, and Hustler Casino, I found this out and fired him instantly, and there's a bunch of police drama in that, but all of a sudden, all the internet slews the poker world, and let me tell you, man, poker players, wow, they are a class of their head. There should be a channel about them. There is. So, all of a sudden, he instantly became her conspirator, her partner, and he was pissed that she gave the money back, and he was going and getting his cut because she gave the money back, and that's what was flying everywhere on the podcast, on Reddit, et cetera, on X. So, let's get into this. So, card shufflers, there are multiple types of card shufflers, like voting machines and everything else, you can buy them online, not usually with the updated software, but nonetheless, you can get them there. So, you can also read all the patents, so if you want to know how all of these work, just read the patent and you'll see how they work. So, there's two different types of shufflers, and I don't know what kind I'm dealing with, but I'm familiar with both before I get there. There are single deck shufflers. They're quite old, the deckmate one. It really only knows that there's 52 cards, or it's making sure that there's at least 52 cards. It doesn't know what they are, they could be all aces, but it tilts if you have more or less. It randomly has an RNG that shuffles the deck. Some do it different ways. This one, it figures out the position, it cuts the cards over and over and over again until it's shuffled, and it passes a laboratory test for entropy and all that, so they make sure. Multi-deck shufflers. It knows the cards, it knows the count. They're really good for multi-deck games, because if you go out there like Blackjack, you have six card games, whether they're six, not six card, but six decks in there. When you have six decks, you don't really have time to make sure there's enough aces, enough kings, that's a lot of work, and every shuffle to make sure all those cards are present. So they have cameras inside it, and you can find that in the patent and how that works, and they're really good for multi-deck games. The RNG knows all the face values, and it orders the cards by the face values, and it comes up. So this is the part I'm going to add. There was a Black Hat talk about shufflers, and my thing is sleeping here, because I wrote down these notes. Before this investigation about earlier in the year, there was one of the podcasters. First of all, Doug Polk was one of them, and I missed Joe Ingram, and I apologize to him. Joe Ingram, there was incidents at Texas, at Prime Social Poker, where there was an accusation of a lot of cheating. So Joe Ingram looked into it and said, oh, you know, the multi-deck shufflers can be cheated. They know what the cards are. Somebody can have an iPhone or whatever in the background and get the list of the cards, and it's really a suspect, but that's how it works. So he disclosed this publicly early in 2022. Doug Polk, by the way, great podcast. Both of them have really hilarious podcasts. They're pro poker players. He also talked about it, too, and he went on site and did a live broadcast and said, I don't know what they have, but multi-deck shufflers have cameras. So this was disclosed a long time ago. We knew about it, the GLI Labs. I knew about it. I looked into these theories. So I knew going in. I wasn't at the Black Hat talk, and what this talk about is community and research. So I'm not sure if they gave the guys credit for that or not. I wasn't there, maybe you were, but I'm going to assume that they disclosed that these guys' research did that. I'll eventually see that talk. So back to card shufflers. Both have firmware, software, and bunches of fun wires. There's a hash value for both, and there's many different ways that this goes back to gaming experience. There are many different ways to check this hash value, depending on the situation that they're going into, but they're certified on the floor. And as everybody knows, if a shuffling device, or really anything out there that we hack on, if it knows the value of something, then so can an attacker. That's hacking 101, right? This is a quote from my report that was the Hustler Live put on there. So, you know, that's a no-brainer there. Now, it ended up being a Deck Mate 1, which is a little bit more complicated to rig, and it has an eProm, so we have a very special device, and it basically hashes it bit for bit, and there's ways to do that with many devices. Also, you have to kind of be in this industry to understand the procedures that go around all those securities. There's a lot of vulnerable stuff out there, but casinos and regulators know this, and there's a lot of nuances and a lot of procedures, just like that cockpit door on the 747. So, I get there. I have to inspect the shuffler for foreign devices. It's something, you know, soldered into it. I've played with them. They're fun. You know, since it was a Deck Mate 1, I can check the hashes. Everything ended up really cool. My previous slides aren't here. So, I gave them some advice. I said, look, you need to secure the shuffler between games. You need to have the dealer get a quick riffle shuffle, you know, even though the shuffler is very convenient for getting some entropy, but still give it a little riffle shuffle. And a lot of casinos do this because it adds entropy. Now, it depends on the game. And poker, doing a quick riffle shuffle like some regulated markets do, adds a little bit more entropy. So, if you know the cards and it gets riffle shuffled, the volatility of Texas Holden poker is so great that even a percentage can change the game. It's not perfect because you can kind of still, as a computer or whatever, can still kind of figure out that something may be near. So, it does give you slight advantage, but not so much. And then I said, hey, seal the shuffler with tamper-proof tape or better. Then I gave them some other advice that I'm not gonna talk about. But, when I'm telling them about securing this, and especially with the tamper-proof tape, and this is where DEF CON comes in, I know tamper-proof tape is bullshit. I mean, it helps mitigate it a little bit. You have to know what you're doing. But, you know, one year, I stroll in, I see my buddy, Kyve, and they're in the tamper-evident contest that was started by DT, dark tangent. And I'm like, dude, what are you doing? And he's like, oh, man, watch this. I'm gonna take this tamper-evident tape off of this using acetone. And I think there's a great video at DEF CON 30 on YouTube that shows this. And I'm like, no way. This is not the kind of stuff I'm gonna learn on my own. I just see it, and I'm like, so I know this. And then I hang out and talk with them. And, you know, when it comes to the shuffleware, and this is about getting, you know, this is why you should, when you're researching stuff, it's humble to give people credit. I couldn't have done it without these people. You know, Joe Gran, I first met him at Hack the Planet when, you know, it was part of the loft group. I don't know him personally, but I've talked to him many times. He used to hang out in the hardware village where I learned about electronics. I'm not an expert, but I knew what was possible. I have DEF CON friends, Big Dog. You know, he taught me how to do rework stations and a little bit of reverse engineering. All this stuff helps. And as I told you, the tamper evident contest, and now it's the village, and you should go over there and check it out. And my buddy, Kyve, Datagram, and of course DT, I want to thank them. I would not have known this if it wasn't for DEF CON. All right, now we're gonna get into the good stuff here. RFID conspiracies. So if you've seen, if you've ever watched poker tournaments a long time ago, they used to show what's called the hole cards. They used to show a camera built into the table, the cards, and some up in the booth would have to type it in so it comes up on the screen. So that kind of became inefficient, or it wasn't as efficient. So they started making RFID tables. These blue squares you see here are RFID antennas, and they all connect little wires under that black tape to an RFID reader, which is hardwired up to the booth on a computer that's running poker software. And so when they do that, they have to place their cards on that reader. This is what a card looks like. I have a pack here from the actual casino. Basically, if you know anything about RFID, you will recognize this, or if you've ever been to a book sort of when they existed, they kind of had this text in the back page. But here you can see the antenna, and then you can see the chip in the upper left corner. These ended up being my fair chips, ultralights, and at the 13.56 megahertz range, and those are rated at 10 centimeters that you have to get to the RFID antenna. So here's kind of how it works. I'm not going to go into it, but the RFID reader is sending out a magnetic pulse. It charges the card. It sends the coil, the chip puts back the value. They're all unique to each card, and now it goes up to the booth and they know what card it is. Now they can display it on the monitor. So now we know who has what, and then the poker software can instantly calculate the percentages of where they are and when it's happening. All right, ooh, look at that guy. So, thank you. Please, please, please. So when I was there, I wanted to be involved. I was there for a while. I wanted to be part of production. I need to know how everything works, just like every hacker does. I want to know how this works. I want to know what you do. I want to see everything because I need to. I got to figure out how cheating is on and other ways to cheat. So here's me at the table. Look at all those chips next to me, but I already know they're watching it on camera, and I wouldn't do that. They're registering those cards. Before every game, the software registers new cards. So they go from ace of spades all the way down to two clubs. So they say, okay, and they did call me ducky. They're like, put the ace of spades down. Okay, now the next king, et cetera. And they're registering it with the software. And if a card ever goes bad, they do go bad a lot because they're fragile. They'll run down and register a new one. Oh, boy, here comes the conspiracies. So, you know, everyone is a detective on the Internet, and poker players are detectives. So here it goes. She had in that water bottle an RFID reader that could capture his cards. Everyone started latching. The flipper zero was kind of gaining more traction, so everyone started latching onto that. And so she knew what all the cards were from nine feet away. So I knew going into this that it might be total BS. Excuse me. And I had the dealer's cards there. Now, you know, kind of be fair, if you knew anything about RFID, there is passive and active, and these cards are passive. But they do, when they're sitting on there, they are charged. So really, all you need to do is kind of sniff it. You don't have to worry about charging it. But if you do have a device, you know, like the Proxmark flipper zero, that will send that out. Well, flipper zero does more than that. So if she did have something that was charging the cards, it would have had to reach out nine feet. It also would have had to skip over all the dealer's cards that she had next to him in her hand and read the value. Not only that, she has to catalog all the cards. Like RFID, this is going to get a serial number. You don't know if it's A or seven. So you kind of have to see every card go by and catalog that in your water mug. Hey, you know, look, if it's possible, please let me know. Maybe that's what this is about, right? Yeah. I got to do it all, all right? So this report's going public to poker players, right? And I know this. So I'm like, oh, man, I'm going to have to test this. And maybe, you know, maybe I'm wrong. So I had a little bit of problem with my Proxmark before I went. I was packing, and I couldn't get the high frequency antenna working. And I was like, oh, crap. I called my good friend, I met at Defcon, to zone Matt, who's out in the audience. And I'm like, dude, my Proxmark. And he was like, dude, reach out to Iceman. And if you don't know who Iceman is, then you don't own a Proxmark. So I reach out to him, and he's like, yeah, describe the problem you're having. And we talked for a bit, but I got to go. So I bring it with me. And then Matt also shows me this other fun device and says, hey, I've got one of these. It's an iCopy X. And it's basically a Proxmark, like with a Raspberry Pi. It's like, you don't have to plug it into your computer. It just knows. It's right there. So from a few feet away, nope, doesn't work. I try to see how far I could get. And it just wasn't feasible. Yeah. So I'm a Big Myth Busters fan. So I, you know, I might be wrong. Maybe there is a way to do this. So now I got to look, well, what would it take to work? Whether it was whoever in the next room. And so, bam, here's where DEF CON comes in and research. You got to do your due diligence and research on everything. So this guy, I've never met before, but he's a fellow and very well known for securing RFID GP. I'm not going to butcher his last name, but Hanky. This is a test he did with high frequency. And this is the test he did with those antennas at three meters. It was unsuccessful. I have a link to the paper if you want to read it. He did eventually get liked to a foot, but I was pretty sure you couldn't fit those antennas into a water mug. And don't think I didn't want to go up in the ceiling. But still, the dealer's cards are there. Let me tell you how DEF CON helped. And I knew it was BS going in because I've attended these talks out of interest. Christine Paget does some mind blowing RFID stuff. I was at both these talks, but the one that really reigned to me and I had to go find it was 17. RFID myth busting. She talked about a lot of ranges, but she did show that she did get up to a foot, I believe, with my fare, which is impressive. She didn't demo it, but she was talking about you could do it at home. So here it goes. And some of this pertains to the last part, and I've got to speed up now. Someone at Discord helped me. He never gave me permission to use his name because he never answered back. He was like, I'm through with that clown. But he helped me out with some of the radio communication. And then this gentleman, Kett Bretton, who's super scary, who's been making antennas. I don't know, since the 1950s, you can find him in the RFID village. I didn't know who he is. I once again called up my buddy Matt and phoned a hacker. And I'm like, dude, do you know anybody who could build an antenna or a device that could SNF a RFID card? My fare. And he was like, you know what? He went and checked with his buddies. He said, call this guy. And I did. And I said, hey, what would it take? And he said, yeah, let me get back to you on that, buddy. I'm busy. He kind of laughed. So that was a definite sign. And when it came for the solution, one of my DC404 buddies in the protections, he deals with a lot of radio stuff. He tinkers, he makes a lot of stuff. But I know he had dealt with Faraday cages because that was one of the solutions I was looking about to stop. And he sings just for extra protection. I would have known any of these people or got any of this information. And that's what this is about. You make friends that are like knowledge that you'll always have for your life. So I'm going to speed up. Singularity remotes. This is where Kent really came in handy because we talked for hours on this. So let's address the tense unit in the sex toy and the vibrating chair, OK? First, her ring. It was a Ruby ring worth about 120 grand. This was about an hour into the game. So I was like, OK, you could have a signaling ring, whatever. But here's the problem. The production booth was approximately 20 to 25 feet away behind a constructed firewall, cement and bars. One thing about personal devices, tense units, remotes, whatever for your foot massager. We'll call it a foot massager. They typically work up to 30 feet because what are you going to do? Reach 100 feet with your personal device remote. And then Bluetooth is kind of what I found out is really low rated because they're not going to invest the money when you should have your phone for controls right there. And when it's somebody remotely from the other side of the country, wherever your significant other is, they have apps for that. They can control their phone. It goes to your phone, which has to be a very close proximity. I learned from Kent in the biohacking village, by the way. We'll talk about this in a second. The body, because of all the water, is not really good antenna. It does give problems. Kent actually developed the antenna for a ring that women use to put wherever. But it's for measuring temperature and all that for ovulation to conceive. Very cool. And he told me what a pain that was. He's like, yeah, it's very difficult. And that's why we're going to talk about it in a second. So I did all these tests, line of sight, 33 feet. I actually got it behind a firewall in a controlled and uncontrolled environment. About 16 feet, which is impressive. But it was not, by any means, 25 feet. So this is a fun story real quick. I want to do an experiment. Everyone travels here, right? And you have accounting departments. And I had recently had trouble. They were like, hey, what's this $5 for? I'm like, I don't have time. No, what's it for? OK, rightfully so, I get it. So I call up the boss man and sort of people, say, hey, I want to buy a raw chicken, a few pounds of beef and a sex toy. And I wrap it in jeans. And I want to see the remote distance from this. And I want to expense it and not say what it's for, for accounting. They said no, boo. I was like, ah, fine. Yeah, let's talk about the tens unit, please. This is me. I took videos. I attached the tens unit to myself and tortured myself. Yeah. I cranked that sucker up to 15 and it hurt. Now I wanted to see the possibility of vibrating in a chair. Like I said, I went all avenues here. People are latching on the stuff, man. So I went through that avenue. I'll never post the video, but I kind of keeled over. And I was like, oh my God. And hey, maybe she has that. So the report ended up non-conclusive. I did say it was possible. And I said, really, you know, if you think about it, only she truly knows. Oh, back to the report. I didn't mention this with the shuffler. There is kind of a misprint of what Hussler said. We never said the shuffler was unhackable. I think they meant that shuffler wasn't hacked because we gave them advice how to secure it. And we even told them, hey, nothing's ever going to be secure. That's all in the report. What security company or researcher would ever say something's unhackable? And if you read the whole thing, you should come to that conclusion. And so, yeah, we never said that. I think when Hussler was doing a live, was doing a synopsis of my evidence, they just kind of said, yeah, it's unhackable. Sorry, I forgot to put that in there. So hey, math real quick. Poker software, if you know what the Monte Carlo method is, it's measurement of uncertainty. It's complex. It's using accounting, a lot of stuff. And that's what they use. I decided to do it flat out. Now this wasn't in the report, but poker players still argue with me today she cheats. She cheated. I don't really offer an opinion, but I was thinking about this. And I said, you know, if somebody actually did know the cards, and really, you have to know what's coming up next in the hand. But we do know all the cards that went by, even if you watch the game. These are the cards G-Man, Garrett, needed to win. It's a 53 to 47 percent chance. If you're in the booth and you know, are you going to say, yeah, go all in? Go all in with the 193K you have left. You only have a 47 percent chance. I think putting it all in red on the roulette wheel. So I kind of think about it. I'm not saying, you know, hey, criminals are dumb. So maybe it happened. So look, back to this. Why did I do this talk? I want everyone to know this. I'm big on this. You know, academia, it does provide you with the foundation of knowledge and how to look into things, but not like DEFCON and other conventions. You come here, you go to all these villages, they will throw stuff at you that will blow your mind that you've never seen before, and you learn this, and you make friends, and you learn stuff from them. You're like, holy moly, at DC 404, we had the 13-year-old that was like, oh, this is how you smashed the stack in Linux. He did his first presentation back then, and you're like, wow. Everyone should know, you know, absolute knowledge. You're never going to know everything. You'll never know it, unless you invented it, maybe. But, you know, that's why, you know, my friends here and all of you out there are so valuable, and I could have done this investigation without knowing them. You know, it's just everything. This is the true saying, and I'm telling this to everybody. Jack-Oltre, it's mastering on is better than a master of one. I think in hacking, at least. And Robert Anton Wilson, a dead philosopher, that's why he's famous now. He really kind of said it all. Human beings should be able to kind of do everything. Build a bridge, start a work, change a diaper, you know, program a computer. Specialization is for insects. And I believe that. Hey, look, I want to thank Hustler Live Casino. They did the right thing. Nick and Ryan, Ryan Feldman, really hard to keep that. The poker players that really helped explain a little bit more poker to me. Joe Tall, I nicknamed this one. He's Gus Fricci, and I just call him the Fritz. That's his new poker name. D. Gaff, who I set up in the booth with, one of the announcers, and probably slow, they all explain poker. Again, thanks, you know, the Tampa Obvious Village, Hardware Hacking Village, all the DEFCON speakers' event, my DC-404 crew, you know, that's right. You know, the contest, I was in the DEFCON documentary at Ulam's Challenge. I got dragged on stage, it was short of person, and I learned a lot during the competition. I was like, okay, what do you want me to do? And that was fun. Here are all the links. I think it's all in the download media server. But hey, I was talking about Joe Ingram and how you disclose that shuffler. You can look at that for the Texas shuffler thing. And he talks about that. I might add that to the slide, and Joe Ingram's talking about that. And some more information later on the patent. I might add that, and you know, that's it, finito. Thank you. I'll be over here, I guess, so I think I have to leave the room, so maybe down the hall. And I have the RFID cards with me, if you want to see one, stand there and you want to scan one.