Vulnerability and Security Flaw in the Automatic Card Shuffler

Article cover

In the realm of modern technology, automated devices have become an integral part of our lives, simplifying various tasks and enhancing efficiency. The Automatic Card Shuffler Deckmate 2 is one such innovation that aimed to revolutionize the way card games are played. However, like any technology, it is not immune to vulnerabilities and security flaws.

During the review of the Robbi Jade Lew case, one of the arguments supporting her defence was that the automatic shuffler used was unhackable. This statement motivated Joseph Tartaro, who is a security researcher from IOActive to initiate his own ivestigation. They discovered, that there are few ways how to hack this device.

A breakthrough in the case of the decade, Robbi Lew passed the lie detector testA breakthrough in the case of the decade, Robbi Lew passed the lie detector test

He and his team have discovered that the Deckmate 2 could be compromised by plugging a device into the exposed USB port, and a hacker could alter the device's shuffling code. They were also able to hack an internal camera which would allow them to know the order of the deck in real-time. It was also possible to hack Deckmate 2 remotely using a phone. However, to alter the shuffling technique the device would have to be restarted manually without drawing attention to it.

Light & Wonder, the company that sells the Deckmate gaming device, has offered a defense of their product. They have emphasized that their card shufflers have maintained their integrity without any compromises occurring in an authentic casino environment. They have expressed skepticism regarding the relevance of IOActive's assessments, contending that these tests fail to accurately replicate the genuine operational scenarios encountered in real-world usage.

Source: Pokerstrategy.com