WEBVTT

00:00:00.199 --> 00:00:06.319
Hollywood has been using Teek in movies since the computer was first invented

00:00:04.279 --> 00:00:13.040
and they've been getting it wrong for just as long and just like the corridor

00:00:08.760 --> 00:00:15.160
crew when we see it mistakes in movies

00:00:13.040 --> 00:00:20.199
it's pretty hard to overlook and focus on the rest of the story which is why we

00:00:17.640 --> 00:00:25.519
were here at computex and we invited Wendell from level one Tex to help take

00:00:22.760 --> 00:00:30.960
a look and break down some scenes from TV shows and movies to see what they got

00:00:27.960 --> 00:00:33.719
wrong but maybe also some stuff they got

00:00:30.960 --> 00:00:38.879
right I was wandering outside and they brought me in that is actually

00:00:36.200 --> 00:00:44.200
true and we also brought in this message from our sponsor ug green their NEX ode

00:00:41.520 --> 00:00:48.680
x 160 W charger is smaller than the original nexe and comes equipped with

00:00:46.320 --> 00:00:54.239
four charging ports bring your 16-in MacBook Pro from 0 to 50% in just 27

00:00:51.520 --> 00:00:58.359
minutes with its 140 watt USBC port check it out in the description below

00:01:05.479 --> 00:01:12.680
starting with the TV show Bones in season 7 episode 6 their computer gets

00:01:10.960 --> 00:01:18.240
hacked because someone accidentally uploaded a virus by scanning a skeleton

00:01:16.840 --> 00:01:22.200
let's watch Once We scan the bones the

00:01:20.439 --> 00:01:26.600
computer can predict scenarios consistent with the damage yeah now now

00:01:25.759 --> 00:01:31.680
that's realistic especially these days okay now

00:01:30.200 --> 00:01:40.840
the computer should tell us what caused the internal injuries a gunshot there whoa whoa whoa

00:01:38.240 --> 00:01:45.439
whoa I'm not even into the computer stuff yet and that is straight up not

00:01:43.439 --> 00:01:52.119
how that would work it's not even pointing at a

00:01:48.040 --> 00:01:54.719
bone okay they fire under the rib cage

00:01:52.119 --> 00:01:59.280
I'm sorry was it a shotgun whoa whoa whoa what what just

00:01:57.280 --> 00:02:06.079
happened you think I smell something system f I smell something oh wow

00:02:10.640 --> 00:02:17.160
no yeah the computer wouldn't catch on fire even if the cooling failed

00:02:15.200 --> 00:02:20.400
catastrophically it wouldn't catch on sometimes the wires will catch on fire

00:02:19.200 --> 00:02:26.239
but that would be at the back yeah you can get little like spot Burns now there is a product that is specifically

00:02:24.239 --> 00:02:31.599
designed with a kill switch that is supposed to heat up the circuits and

00:02:29.239 --> 00:02:35.800
Destroy them a lot of the flight data stuff in in classified airplanes also

00:02:34.400 --> 00:02:39.360
have explosives so you just pull the thing and it's like thermite and it just

00:02:37.800 --> 00:02:44.560
and then it's gone but it would have to be designed for that also that first

00:02:42.400 --> 00:02:49.519
flame was about as convincing as when we did our April Fool's video where I said

00:02:47.000 --> 00:02:54.720
our server room was on fire so it turned out the malware killed our fans they're

00:02:52.360 --> 00:03:00.280
supposed to turn on when the CPU reaches 75° but the malware added a zero and

00:02:57.560 --> 00:03:06.920
made it 750 how did this malware get past our fire it doesn't go past 255

00:03:03.560 --> 00:03:09.519
sorry okay for everyone who gets that

00:03:06.920 --> 00:03:14.799
that's hilarious it doesn't catch fire immediately what it would slow down or

00:03:11.920 --> 00:03:20.000
turn off it's also weird cuz like you wouldn't unless the program is badly

00:03:16.720 --> 00:03:21.519
written and your adversary knows exactly

00:03:20.000 --> 00:03:26.200
the software that you're using and the version you could do this with like a

00:03:23.319 --> 00:03:29.560
buffer overflow so like the data is parsed as commands instead of data but

00:03:28.439 --> 00:03:35.400
most of the time when you're scanning something it's just going to be data I feel like by giving it that thorough of

00:03:33.519 --> 00:03:40.959
a debunking you're almost respecting it too much even if what he said wasn't

00:03:38.120 --> 00:03:44.640
true there isn't a processor on Earth that would manage to heat up that fast

00:03:42.680 --> 00:03:47.879
even if you turn the fans off it originated in my computer wait but it

00:03:46.680 --> 00:03:51.920
wouldn't have gotten in there unless you had downloaded something yeah or

00:03:49.959 --> 00:03:56.200
uploaded all you uploaded were the scans of those

00:03:53.959 --> 00:04:02.000
bones are you telling me that there's a computer virus in the bones the computer

00:03:58.920 --> 00:04:05.640
virus is in the bones imagine you had

00:04:02.000 --> 00:04:07.280
like a CT scan and you have a malformed

00:04:05.640 --> 00:04:11.720
CT scan file and you give it to your hospital and they parse that and then it

00:04:09.400 --> 00:04:15.360
turns into a virus that's kind of what happens with PDFs or anything in your

00:04:13.599 --> 00:04:19.160
emails like you get a malform PDF you're not running a PDF thing and it takes

00:04:17.639 --> 00:04:22.400
over your computer looking at a PDF should be a perfectly safe operation but

00:04:21.079 --> 00:04:27.479
it takes over and does stuff so that part is the least unrealistic part and

00:04:24.880 --> 00:04:31.039
it's really a stretch and no two scans are likely to be exactly identical

00:04:29.039 --> 00:04:35.360
because that's largely an analog process again I think you're respecting it far

00:04:32.720 --> 00:04:39.960
too much also what was the point of that just to light their computer on fire a

00:04:37.520 --> 00:04:44.199
motov cocktail would get you there a lot faster and a lot cheaper anything

00:04:42.320 --> 00:04:48.000
promising it's hard to say all the documents were photographed are in

00:04:45.360 --> 00:04:56.280
Chinese he got his hard drives scans of everything in now hold on just a moment

00:04:52.400 --> 00:04:57.600
here this is disappointing because like

00:04:56.280 --> 00:05:01.720
some of the stuff is like there there's there's artistic creative license you

00:04:59.800 --> 00:05:05.240
know maybe they scan the bones that could have been a bomb this is just they

00:05:03.800 --> 00:05:07.600
didn't Google it does that even have chain of

00:05:08.240 --> 00:05:13.840
custody again respecting it far too much

00:05:12.240 --> 00:05:20.039
now just a minute we've got as hard drives for one thing that is one hard

00:05:17.560 --> 00:05:24.639
drive for another thing really you couldn't afford any more than a do stop

00:05:21.840 --> 00:05:30.039
power supply from the P3 era is that a 20 pin connector

00:05:26.440 --> 00:05:31.280
yep yeah that's like 300 W power supply

00:05:30.039 --> 00:05:35.400
you will have plenty of stuff to go through in the

00:05:33.080 --> 00:05:39.720
morning he has so many questions he's like that's not a hard

00:05:37.280 --> 00:05:46.280
drive I haven't talked about this much but Luke and I actually did a little bit

00:05:42.319 --> 00:05:48.960
of unpaid Consulting on a Hightech

00:05:46.280 --> 00:05:52.479
script for some medium don't worry about the details because I'm pretty sure I'm

00:05:50.720 --> 00:05:56.400
under NDA but speaking from that experience if I had to guess how these

00:05:54.520 --> 00:06:01.120
things happen I would say it's not because nobody knew better it's not

00:05:58.840 --> 00:06:05.039
because a tech EXP expert wasn't hired to come in and tell them something

00:06:02.680 --> 00:06:10.400
different but because they actually made a conscious decision to not care or they

00:06:08.240 --> 00:06:14.560
or they did it too late like there was some changes that we had suggested that

00:06:12.240 --> 00:06:17.680
were like well we can't do it now I think they could have sourced an e-w

00:06:15.960 --> 00:06:21.880
hard drive instead of an e-w power supply system breach go firewall one we

00:06:20.479 --> 00:06:27.680
got a problem this is from Castle someone sned a rat to one of my servers

00:06:24.120 --> 00:06:30.039
a remote access tool we're being

00:06:27.680 --> 00:06:34.800
hacked first of all it's remote access Trojan like is it the more firewalls I

00:06:32.039 --> 00:06:38.120
have the more safe I am no no it's like swiss cheese defense right all the

00:06:36.400 --> 00:06:41.560
firewalls have minor vulnerabilities and you just have a variety of them the

00:06:39.639 --> 00:06:45.800
whole way through yeah that's the Battle Star Galactica

00:06:43.400 --> 00:06:49.880
model I love the percentage to breach thing I love that they have this tool

00:06:47.680 --> 00:06:53.120
where they're like we know we suck let's make sure that we can measure exactly

00:06:51.520 --> 00:06:58.039
how screwed we are yeah what's the morale of the team that develops that

00:06:56.199 --> 00:07:02.280
breached in red I mean if you could figure this out it would be great cuz as

00:06:59.800 --> 00:07:05.560
firewall one hits breached you just message the backup battery and be like

00:07:04.160 --> 00:07:10.160
hey you need to turn off right now and it turns off yeah no that would be too

00:07:07.759 --> 00:07:14.240
sensible and look I know that this is probably going to be the most pedantic

00:07:11.840 --> 00:07:18.000
nitpick of all but that's not how you spell

00:07:15.720 --> 00:07:21.800
synced I'll start an intrusion inspection and find out who IR ran

00:07:23.039 --> 00:07:31.319
is who hieroglyphs uhoh oh they're hold

00:07:28.720 --> 00:07:36.599
on you don't decrypt a firewall no firewall number

00:07:32.840 --> 00:07:40.400
four he stopped respecting them too much

00:07:36.599 --> 00:07:44.440
his brain's broken yeah it's not this is

00:07:40.400 --> 00:07:44.440
terrible view options yes

00:07:44.879 --> 00:07:53.599
no it's coming from inside the city trying to narrow it down okay what even

00:07:51.039 --> 00:07:57.599
is this it's supposed to be narrowing down which is funny because how this

00:07:55.560 --> 00:08:01.080
circle Works they already know theoretically that it's in the middle I

00:07:58.960 --> 00:08:06.000
can ping it a friend that's three states away has a lower ping than my neighbor

00:08:03.560 --> 00:08:11.479
across the street so I don't this is like oh let's figure out how far away it

00:08:08.240 --> 00:08:13.720
is it doesn't always work like this yeah

00:08:11.479 --> 00:08:18.120
tight faster oh my God this scene is like 3 minutes

00:08:15.879 --> 00:08:21.319
long that barely slowed him down I'm sorry but he's going to find us in less

00:08:19.240 --> 00:08:24.080
than a minute should we abort no we we've only got two of the Blinky boxes

00:08:22.720 --> 00:08:31.440
left to go I like that that's good come on got

00:08:28.759 --> 00:08:36.360
it exact address that's Castle's office he

00:08:34.560 --> 00:08:40.279
must be working with Haley she's got the skill set for this and she is about to

00:08:38.159 --> 00:08:45.640
breach our firewall if she does they'll have instant access to our entire

00:08:42.159 --> 00:08:49.399
investigation no they won't okay tell me

00:08:45.640 --> 00:08:52.480
this you have breached the URL of

00:08:49.399 --> 00:08:55.640
apple.com do you have instant access to

00:08:52.480 --> 00:08:58.320
all of the data that's on it no although

00:08:55.640 --> 00:09:02.399
Dell if all of it's public Dell's public suffering lately with that though they

00:09:00.399 --> 00:09:07.640
did exfiltrate a lot of data to do with the customer orders and names and but it

00:09:05.279 --> 00:09:13.920
would take time yes and if they were if Dell was literally sitting there

00:09:10.600 --> 00:09:15.760
preventatively anti-hacking yeah no in

00:09:13.920 --> 00:09:20.640
fact they would not have access to everything I can launch a cybernuke but

00:09:18.040 --> 00:09:26.839
it'll completely fry a cybernuke cyber what is this

00:09:23.720 --> 00:09:28.640
interface why do they have this

00:09:26.839 --> 00:09:31.600
interface but they don't have the ability to sh off the

00:09:31.600 --> 00:09:37.200
power oh what just happened we got Cyber

00:09:35.480 --> 00:09:40.680
News Armageddon I'm afraid it doesn't work that

00:09:38.640 --> 00:09:44.040
way you don't just have like digital icbms I mean I assume that what's

00:09:42.880 --> 00:09:48.560
supposed to happen there is like you can trick the person attacking you into running some executable code and it

00:09:47.000 --> 00:09:53.120
wipes something but it doesn't work that way someone hacked a curtain ad on the

00:09:50.480 --> 00:09:59.560
scroll MD site looks like a normal ad right and this is the code for the

00:09:56.000 --> 00:10:02.040
ad but peekaboo there's actually two two

00:09:59.560 --> 00:10:07.440
codes written right on top of each other okay we were doing really good

00:10:05.040 --> 00:10:12.640
surprisingly good for AIT I was convinced this was quite solid that was

00:10:10.040 --> 00:10:19.320
actually really cool like and pretty realistic uh injecting a malicious

00:10:15.640 --> 00:10:21.880
redirect into some kind of seemingly

00:10:19.320 --> 00:10:25.800
real advertisement especially a pharmacy where you'd collect a lot of personal

00:10:23.519 --> 00:10:29.680
information and valuable personal information about people maybe that guy

00:10:28.200 --> 00:10:33.480
was just thinking his coor workers or morons and is using that to explain it

00:10:31.560 --> 00:10:37.360
and it's like okay this code actually injects this other code it's not like

00:10:35.560 --> 00:10:41.399
code on top of another code I'm convinced that dude wants to claim that

00:10:39.360 --> 00:10:45.440
he has like two weeks to a month of work to do and he's going to do it in like

00:10:43.240 --> 00:10:49.880
four hours now that sounds realistic the target had to breach the

00:10:47.519 --> 00:10:55.720
scroll MD service to inject this Cod not true actually you could just exploit uh

00:10:53.040 --> 00:10:59.600
kind of delivery Network this happens all the time he's operating almost

00:10:57.560 --> 00:11:05.560
entirely on the surface web where he can reach millions of everyday sys on the

00:11:02.160 --> 00:11:08.079
surface web what is the surface web uh

00:11:05.560 --> 00:11:10.760
well as opposed to like the dark web or better script dialogue for that would

00:11:09.480 --> 00:11:14.160
have been it's like they're you're utilizing like public ad networks and

00:11:12.639 --> 00:11:18.200
they're flying under the radar of public ad networks yeah are you you should do

00:11:16.600 --> 00:11:24.720
this are you audition for your next career move Consulting for

00:11:21.600 --> 00:11:29.720
Hollywood they won't listen to you

00:11:24.720 --> 00:11:32.800
no 218 gone okay

00:11:29.720 --> 00:11:34.560
no what I mean if it's a pharmacy

00:11:32.800 --> 00:11:40.800
website there's probably tens of I mean just bot traffic is going to be tens of

00:11:37.079 --> 00:11:43.680
thousands of ips but look at the IPS 164

00:11:40.800 --> 00:11:47.560
387 that it'll never be more than 255 on any number whoopsy Doodles no that might

00:11:45.959 --> 00:11:52.120
be on purpose just cuz like you could accidentally have an IP address in there and it's like oh look it's bang are all

00:11:50.320 --> 00:11:56.959
of these breaking that rule think you might be right whole like there's

00:11:53.600 --> 00:12:00.639
reserved IP ranges for kind of like

00:11:56.959 --> 00:12:02.639
5555555 there's fake IPS so they could

00:12:00.639 --> 00:12:06.519
just use those if they actually knew they need like a whole ocean of them and

00:12:04.200 --> 00:12:10.839
these all look like they broke that rule yeah none of these are are can be real

00:12:08.800 --> 00:12:15.199
IP I don't think any of them are maybe it was on purpose then let's give them

00:12:12.920 --> 00:12:18.959
that one and their whole narrowing exercise doesn't work at all because the

00:12:17.240 --> 00:12:24.880
guy working in the mail room and the executive would actually have the same

00:12:21.040 --> 00:12:28.199
public facing IP likely yeah God kidding

00:12:24.880 --> 00:12:30.519
me Target's using an IR LED array makes

00:12:28.199 --> 00:12:37.279
his license plate on B the cameras all four tires up okay

00:12:34.040 --> 00:12:39.680
yes that's actually kind of cool and

00:12:37.279 --> 00:12:44.680
like that and the the whole none of those IPS would be working stuff like

00:12:41.839 --> 00:12:47.880
there's there's you know there traces in here all four tires give up Bluetooth

00:12:46.639 --> 00:12:51.760
signals report when they're low on pressure what do you think I don't know

00:12:49.639 --> 00:12:56.880
if they're Bluetooth Bluetooth no they really don't yeah that would be done

00:12:53.959 --> 00:13:00.279
over low frequency signal yeah that's not even a little bit Bluetooth uh the

00:12:59.199 --> 00:13:07.000
there is something really wild that's happening with self-driving cars and that is the standard for aircraft like

00:13:04.839 --> 00:13:12.040
the aircraft to aircraft communication uh has been co-opted and modified

00:13:10.240 --> 00:13:16.440
slightly for carto car communication so a lot of smart cars are emitting tons of

00:13:14.279 --> 00:13:20.839
radio and can be uniquely identified if you drive a Tesla your Tesla can be

00:13:18.480 --> 00:13:26.000
fingerprinted and and tracked without a license plate now Wendell this is

00:13:23.360 --> 00:13:31.079
something I legitimately don't know would a Bluetooth device have a MAC

00:13:27.959 --> 00:13:32.440
address okay okay okay I've never looked

00:13:31.079 --> 00:13:35.600
up the Mac Address of my Bluetooth device well Apple actually has been

00:13:34.360 --> 00:13:41.440
worried about this for a long time and so they've been doing Mac randomization and Android got that feature later so

00:13:39.680 --> 00:13:44.920
when you connect to a public Wi-Fi uh actually I used to work on a project for

00:13:43.320 --> 00:13:49.279
a very large commercial entity where we were doing Bluetooth uh Beacon tracking

00:13:47.720 --> 00:13:53.160
and you could track somebody moving through a commercial store like a

00:13:51.120 --> 00:13:55.639
Marshalls or something like that it's like oh the same people are coming back

00:13:54.440 --> 00:13:59.440
we don't know who they are but they're they're probably somebody that bought something oh yeah that's kind of like

00:13:58.120 --> 00:14:03.639
what they do on the cruises where they can bring your drink right to you see

00:14:01.279 --> 00:14:07.680
that little white box right there the Department of Transportation

00:14:05.959 --> 00:14:11.320
traffic monitoring system picks up Bluetooth signals to report traffic

00:14:09.079 --> 00:14:16.120
patterns sadly this has become reality it's not Bluetooth no but if

00:14:14.279 --> 00:14:20.440
you're trying to communicate this to people that are going to watch this show

00:14:18.440 --> 00:14:27.720
it's not that bad why don't you just say Wireless yeah yeah no

00:14:23.880 --> 00:14:29.480
way I'm getting HED this is classic no

00:14:27.720 --> 00:14:35.240
no this is okay like there's just so much they already burned to the NC my

00:14:32.440 --> 00:14:39.040
goodness my frontal lo I have never actually seen this this this is a super

00:14:37.199 --> 00:14:43.399
legendary scene if someone is stealing your documents the documents that are

00:14:40.639 --> 00:14:46.279
being stolen are not opening on your screen like it doesn't you're not going

00:14:44.759 --> 00:14:51.959
to get a million it would be impossible to do any work on this computer because of all the popups remember the '90s like

00:14:50.199 --> 00:14:56.320
you get all the popups and bad things happening on your computer because of the malware it's like oh what is this

00:14:54.759 --> 00:15:02.560
take the node and dump them on the other side of the router I'm trying it's moving too fast have you seen this

00:14:59.320 --> 00:15:04.519
before Oh my God this is so like okay

00:15:02.560 --> 00:15:09.120
two people one keyboard does not work in any there's just no Universe where two

00:15:07.079 --> 00:15:16.680
people one keyboard works ah where'd it go Abby I didn't do

00:15:13.560 --> 00:15:17.759
anything I thought you did no hence why

00:15:16.680 --> 00:15:22.360
you don't have two people on One keyboard he unplugged it well that's the

00:15:20.880 --> 00:15:26.880
first person with a brain we did it literally the most

00:15:24.680 --> 00:15:31.040
reasonable thing in that entire scene with all the submissions you guys gave

00:15:28.160 --> 00:15:35.880
us from crime show like CSI and NCIS we could probably make an entire second

00:15:32.759 --> 00:15:37.279
episode just from that so hit the like

00:15:35.880 --> 00:15:42.199
button if you guys want to see a second one of these I mean according to IMDb

00:15:39.800 --> 00:15:46.519
NCIS has a budget of only $25 million per episode so that would explain why

00:15:44.800 --> 00:15:51.040
they just didn't have the budget to accurately represent hacking and

00:15:48.079 --> 00:15:55.160
Technology on the show um let's pivot though and take a look at a movie that

00:15:52.480 --> 00:15:59.759
had a budget of a mere $200 million surely they did a much better job a oh

00:15:58.160 --> 00:16:06.759
good it's f Ramsey has created something interesting

00:16:02.519 --> 00:16:09.000
bring it up yes sir say hello to God's

00:16:06.759 --> 00:16:11.959
eye now this little bastard hacks into anything that's on the digital Network

00:16:10.440 --> 00:16:16.560
that means every this is certainly the intelligent

00:16:14.199 --> 00:16:19.839
Services want this if we look at it it's like we we and they try to make

00:16:18.120 --> 00:16:23.680
components of this the headlines for the Pegasus malware and the Dual elliptic

00:16:22.000 --> 00:16:29.440
curve incursions by the intelligence services

00:16:25.560 --> 00:16:31.600
and this is scary close to re reality

00:16:29.440 --> 00:16:35.600
possibly maybe I say thank God it can only access anything on the digital

00:16:33.440 --> 00:16:39.839
Network as opposed to the analog networks that we're still rolling one

00:16:37.560 --> 00:16:44.240
thing that I may argue is that I don't know that the Fast and Furious universe

00:16:42.519 --> 00:16:50.319
is actually the same as our own really I think at this point I think

00:16:47.800 --> 00:16:55.560
it's arguable that it is not actually the same universe Dr Chan recalculate

00:16:53.360 --> 00:17:01.839
the new Thruster data and relay it to Blue Oyster called immediately insens he

00:16:58.199 --> 00:17:04.640
Roger that do to

00:17:01.839 --> 00:17:08.280
[ __ ] what's wrong seriously you auto updating now General I won't be able to

00:17:07.160 --> 00:17:12.959
calculate the right data for the satellite for 49 minutes how long you

00:17:11.079 --> 00:17:16.240
impact 11 minutes and 44 seconds probably do it on a different computer

00:17:17.199 --> 00:17:22.039
Microsoft it do be like that sometimes okay this is actually pretty funny but

00:17:21.160 --> 00:17:25.959
you could probably use a different machine on the network I'm enjoying this

00:17:24.240 --> 00:17:30.679
one enough though that I don't feel like I need to pick it apart it didn't pull

00:17:27.799 --> 00:17:34.120
me complet completely out of the scene Elijah actually has some inaccuracies in

00:17:32.679 --> 00:17:37.840
there that we were supposed to notice their group policy almost certainly

00:17:36.000 --> 00:17:41.799
would have prevented an update for happening at such an inopportune time

00:17:39.880 --> 00:17:46.480
although Microsoft has started ignoring group policy and they can for certain

00:17:44.000 --> 00:17:50.200
things yeah Group Policy is not as Ironclad as it used to be if they're

00:17:47.880 --> 00:17:55.480
like Microsoft if they're like this is important enough of an update they'll

00:17:51.720 --> 00:17:58.400
just our last clip also from The Fast

00:17:55.480 --> 00:18:00.840
and Furious universe as Luke calls it yeah

00:18:03.840 --> 00:18:08.600
wait he's in a giant motorcade in a city and they weren't

00:18:08.880 --> 00:18:15.400
sure okay they found him those coordinates to's copy that so like if

00:18:13.919 --> 00:18:19.880
that was a dude that was under surveillance already and they had

00:18:18.000 --> 00:18:23.840
malware on his phone like the Pegasus malware they absolutely could do that

00:18:22.000 --> 00:18:27.480
yeah turned the microphone on surreptitiously like the whole nine also

00:18:26.200 --> 00:18:31.080
am I going to be the one to point out that they have planes

00:18:29.880 --> 00:18:34.720
yeah that are just in the air all the time and yet they choose to pursue on

00:18:33.240 --> 00:18:39.000
the ground in the Fast and the Furious Universe cars are the best thing that

00:18:37.039 --> 00:18:41.760
exist at all other than family well wait if they've got a New York police escort

00:18:40.400 --> 00:18:45.080
just radio the New York police would be like stop this is what I've been saying

00:18:43.720 --> 00:18:48.840
they had to try to track this person down but they have a giant motorcade in

00:18:47.000 --> 00:18:52.280
the middle of a huge City wait why do we need to read his license plate this is

00:18:50.520 --> 00:18:55.159
what I'm this is what I'm saying they definitely know this is happening do

00:18:53.919 --> 00:19:01.559
these guys work for the Department of redundancy Department if you have this level of control can't you just turn a

00:18:58.480 --> 00:19:04.120
stop light red yeah want every chip with

00:19:01.559 --> 00:19:08.480
a zero die exploit in any idiot with a flipper zero who whoa who every chip

00:19:06.760 --> 00:19:13.240
with a zero day exploit in a certain mile radius I thought why do they need a

00:19:11.039 --> 00:19:17.000
chip with a zero day exploit they've got God's eye they should have everything

00:19:14.960 --> 00:19:20.760
got to use the orange text on the video them

00:19:18.320 --> 00:19:25.799
all that's like in the Batman movie that made Alfred upset yeah what this hacking

00:19:24.440 --> 00:19:31.120
they're going to start driving the cars to crash the motorcade oh my God

00:19:27.840 --> 00:19:31.120
excellent this will also be a

00:19:32.600 --> 00:19:38.440
thing why would they want it to do

00:19:36.240 --> 00:19:42.480
that how did they want the windshield wipers to go now there's a lot of

00:19:41.120 --> 00:19:47.240
intelligence services that would be really happy for this level of functionality cuz it's like oh look this

00:19:45.559 --> 00:19:51.880
problematic person died in a horrible car accident

00:19:49.720 --> 00:19:56.640
whoops okay where did those coins come from whoa wo wo W did the coins just

00:19:53.960 --> 00:20:02.679
come out of the ground what the happened to that parking meter I think those were

00:19:59.000 --> 00:20:06.000
added in post really also notice how

00:20:02.679 --> 00:20:09.600
much rust there is on the ones that are

00:20:06.000 --> 00:20:12.559
real shoot their

00:20:09.600 --> 00:20:16.560
engines there's people in those C wo wo W did you see the spread what are these

00:20:14.919 --> 00:20:18.640
bullets hitting that's epic

00:20:18.640 --> 00:20:25.520
dude oh interesting when you shoot the engine it naturally diverts

00:20:23.200 --> 00:20:29.679
away massive thanks to Wendell for joining us to critique some scenes from

00:20:27.440 --> 00:20:32.520
TV shows and movies if you guys have any suggestions for ones we should check out

00:20:31.120 --> 00:20:37.880
in the future make sure you leave a comment with them down below and while you're down there why

00:20:36.400 --> 00:20:42.720
don't you check out this message from our sponsor Squarespace creating your

00:20:40.360 --> 00:20:46.600
own website doesn't have to be difficult and luckily with Squarespace it isn't

00:20:44.520 --> 00:20:50.120
their allinone platform makes it easy to get your website up and running quickly

00:20:48.400 --> 00:20:56.480
and designing with their fluid engine site Builder is easy it's so easy start

00:20:54.720 --> 00:21:00.679
with a template and customize the details to your heart's desire with in

00:20:58.559 --> 00:21:04.600
intuitive drag and drop elements on both desktop and mobile you can also use

00:21:02.480 --> 00:21:09.840
their asset library to manage all your files from one Central Hub and use them

00:21:07.120 --> 00:21:13.799
across the entire Squarespace platform plus with squarespace's analytic

00:21:11.679 --> 00:21:20.200
insights you can see what's working well and What needs a little TLC a

00:21:17.600 --> 00:21:24.640
littleit you know and if you need help Squarespace has got your back with

00:21:21.919 --> 00:21:28.679
helpful guides and a 247 support team they do not sleep head to

00:21:26.240 --> 00:21:32.520
squarespace.com get 10% off today if you guys enjoyed

00:21:31.080 --> 00:21:38.320
this video why not checking out the one where James my wife and I watched some

00:21:35.240 --> 00:21:41.760
in some cases pretty scintillating Tech

00:21:38.320 --> 00:21:44.919
ads it was awkward it involved a glory

00:21:41.760 --> 00:21:44.919
hole at one point
