1 00:00:01,340 --> 00:00:05,410 The widespread nature of local attacks is well known to every hotel manager. 2 00:00:06,450 --> 00:00:13,710 Each one of us stops at a hotel from time to time in the slide you can see two devices that prove very 3 00:00:13,710 --> 00:00:16,540 useful for anyone who plans to stay at a hotel. 4 00:00:18,030 --> 00:00:23,800 The device visible on the bottom left can get you free electricity in a hotel room. 5 00:00:25,650 --> 00:00:33,830 Electricity in hotel rooms is usually cut off until the guest sorts a card key into a special slot. 6 00:00:33,970 --> 00:00:39,690 If you play such a universal card they're It gets access to the code that will allow you to switch on 7 00:00:39,690 --> 00:00:45,980 electricity in every room of the hotel as Chinese made devices available on the Internet. 8 00:00:48,250 --> 00:00:51,930 On the right side of the slide you'll see another interesting device. 9 00:00:53,700 --> 00:00:57,110 In most hotels room door locks are unlocked with a key card. 10 00:00:58,300 --> 00:01:02,850 When you check into a hotel you get your key card program. 11 00:01:02,870 --> 00:01:07,970 This requires you to fill out a long and detailed questionnaire asking about lots of private information 12 00:01:10,790 --> 00:01:13,130 this alone creates a huge security issue. 13 00:01:14,930 --> 00:01:19,830 After you've filled out the form the receptionist hands you the key card. 14 00:01:20,000 --> 00:01:24,480 It carries information about your room and check out date. 15 00:01:24,500 --> 00:01:28,760 The staff can use a hotel master key card to open any room at any time. 16 00:01:30,910 --> 00:01:34,600 Once you get your key card you go to your room and place it on the device. 17 00:01:34,600 --> 00:01:41,450 You can see in the picture then you replace your key card with a blank card. 18 00:01:41,490 --> 00:01:47,580 The device copies the hotel data from the key card onto the blank card instead of a specific room number 19 00:01:47,820 --> 00:01:49,620 and checkout date. 20 00:01:49,710 --> 00:01:53,490 The device right sounds at their card a series of nines. 21 00:01:53,520 --> 00:01:58,550 This will give us unlimited access to every room in the hotel. 22 00:01:58,560 --> 00:02:04,440 There are many such devices that make local attacks easy. 23 00:02:04,540 --> 00:02:10,260 So if someone leaves a laptop in their hotel room the person who is in possession of such a master key 24 00:02:10,260 --> 00:02:12,740 card could easily get access to the laptop. 25 00:02:13,780 --> 00:02:19,480 Even if it's hard drive is encrypted with bit longer true crypt it wouldn't help much if the user left 26 00:02:19,480 --> 00:02:22,000 the laptop hibernated or not turned off 27 00:02:25,040 --> 00:02:30,680 a person that can get physical access to the machine will either read the password directly or infect 28 00:02:30,680 --> 00:02:34,210 the computer with a key logger and wait until the owner logs in. 29 00:02:36,690 --> 00:02:43,370 This will give that person full access to the data stored on the laptop software that extracts data 30 00:02:43,370 --> 00:02:49,750 encrypted with true crypt was tellingly named evil made local attacks present a serious threat.