Had to come in here because Reddit is a bit of a **** show and my legit post was removed or never approved for whatever reason while **** posts go up every 10 minutes...
I had posted a theory which I consider to be the exact method of how he is getting the card information in real time. I am sorry if this has been posted already, but I wasn't going to read the 236 pages before this to find out. I have only seen it mentioned once before on Twitter by @vdthemyk and casually retweeted by Joe Ingram but I haven't seen it talked about since then.
Here is my take on exactly how this is being carried out:
I just read the manual for PokerGFX, which is the software that is used at Stones as well as LATB and other various poker streams, and came across this gem about MultiGFX:
Quote:
MultiGFX: Run unlimited multiple copies of PokerGFX from a single table, for multiple video streams each with their own individual graphics and stream delay settings...
MultiGFX: ForcesPokerGFX to sync to another primary PokerGFX running on a different, networked computer, making it possible to generate multiple live and delayed video streams with different graphics, from the same table. This is achieved by running multiple copies of PokerGFX on separate computers which are networked together.
Enabling the ‘MultiGFX’ option forces PokerGFX to use another running copy of PokerGFX as a data source instead of a physical RFID table.
Basically what this means is that ANYONE with a laptop and wifi password is able to run their own copy of PokerGFX, click MultiGFX option which then uses all the data from the other running copy of the software in the back as the data source. It basically duplicates the entire system onto a different computer... This means anyone in wifi range could access the cards in real-time and message Mike on WhatsApp or the messaging app of their choosing.
The pages of the manual relevant to this are in PDF here
https://www.docdroid.net/VLB2oft/multigfxinfo.pdf
I am convinced now that this is the method of attack. It only requires a separate copy of the software on a laptop that is connected to the same network.
I asked /u/PokerJunkieKK on Reddit who claims to have worked in the tech room during 2017 and early 2018 before this started happening. I asked about the casino wifi that the software could possibly have been operating on. His/Her reply was:
"It was password protected, though not too difficult to guess. And it didn't change the whole time I was there."
Once the PW is cracked/guessed, anyone within wifi range could connect to the main copy of the software running and get all the same information in real-time.
I am not a tech-guru or anything. I don't have a copy of PokerGFX to test if this is actually that easy. I am merely pointing out what I have found which gave me kind of an "aha" moment. This makes perfect sense and by the manual, it seems incredibly easy once you guess the password(s).
I want this information to reach the powers that be in this case and hopefully all the way to the people assigned to the investigation. Hopefully they are looking at every single angle but this theory seems to be one of the more easier ones, and does not involve any help from the inside.
I will also take the time to email LATB about this potential exploit. If it's happening at Stones.... it could literally be happening at any even that uses PokerGFX with minimal security.
That's all guys thanks for coming to my TEDTalk.