Quote:
Originally Posted by pocket_zeros
It's presumed the RFID readers at the table don't know the suite/ranks of the cards. The readers only know raw RFIDs, which after read are aggregated by a central unit at the table and transmitted over the network to the production room/software. The production software had the correct suite/rank association for the swapped cards - that's why the on-screen graphics were correct.
But if the hack is at the RFID aggregator that transmits the RFIDs to the software (ie, someone has access to the raw card RFIDs) then the hacker would need to maintain his own database of suite/rank associations to each card's RFID, and he may have failed to correctly update his database for the swapped cards.
Ok, so now I'm back to thinking it would matter that they were different decks in question and he'd have to be notified which rfid was wrong from which deck. What am I missing? Why isn't it instantly compatible as you said (i could be confused). Also under this theory isn't the exploiter aware from the onset he has two six of clubs in the 52 card deck? Thus knowing hey maybe I should stay away from any hands with the 4h and 6c. None of this makes sense imo.
If the gold deck was the one replaced with the bad read, and the black deck was the one used in the hand, how would the exploiter be confused?
Truly doesn't make much sense to me.
Can you, even if playing devils advocate, articulate how the hacker would make the 6c/4h mistake if it was a SEPERATE DECK that was replaced? And if what you said was true earlier, why didn't cards from both decks need to be swapped out? Also does this hacker know that he has too many 6c or 4h?
Last edited by Eskaborr; 10-05-2022 at 03:06 PM.