TubeReads

I Dissolved My Credit Card To Understand How It Works

What connects a Cold War spy device hidden inside a wooden plaque to the credit card in your wallet? By dissolving credit cards in acetone and tracing payment technology back to CIA counter-surveillance operations, this investigation reveals how modern contactless payments evolved from Soviet espionage tactics. The security features designed to protect your money may be more vulnerable than you think — especially when it comes to stealing thousands of dollars from a locked iPhone. Can a simple tap really drain $10,000 without unlocking the phone?

Duração do vídeo: 28:43·Publicado 26 de mar. de 2026·Idioma do vídeo: English
6–7 min de leitura·5,391 palavras faladasresumido para 1,316 palavras (4x)·

1

Pontos-chave

1

Contactless payment technology directly descends from «The Thing», a Soviet bug that required no battery and remained undetected in the US ambassador's office for seven years by using radio waves for both power and data transmission.

2

Magnetic stripe cards revolutionized payment speed in the 1970s but were trivially easy to clone — a vulnerability that enabled fraudsters to steal millions and build criminal empires before chip-and-pin finally arrived in the 2000s.

3

EMV chip cards use cryptographic keys buried deep in silicon to generate unique codes for each transaction, making them nearly impossible to clone — but the added security increased transaction times by over 10 seconds, costing the US economy an estimated 116 million hours per year.

4

Contactless NFC cards can be read through pockets from two centimeters away, and while transaction limits protect most users, the US has no cap — meaning a digital pickpocket could theoretically drain thousands in a single tap.

5

Mobile wallets appear to offer the best security by combining contactless convenience with biometric locks, but new vulnerabilities may allow attackers to authorize large payments from locked phones — a threat explored in the video's upcoming sequel.

Em resumo

Credit card technology has oscillated between speed and security for decades, from magnetic stripes to chips to contactless NFC — but each convenience feature opens new fraud vectors, and today's mobile wallets may not be as secure as banks claim.


2

The Soviet Bug That Launched a Payment Revolution

A Cold War listening device with no battery became the blueprint for contactless cards.

In 1945, Soviet schoolchildren gifted the US ambassador a hand-carved plaque concealing «The Thing» — a listening device with no battery or power source. It remained undetected for seven years because it only activated when the Soviets blasted it with radio waves from outside. The device used a resonant cavity whose frequency changed as sound vibrated a diaphragm, modulating the reflected radio signal to carry conversations back to eavesdroppers. When the CIA finally discovered it in 1952, they kept the find secret and reverse-engineered the technology for their own use.

This same principle — using radio waves to both power a device and extract data — would eventually evolve into RFID and near-field communication. Leon Theremin, the inventor coerced into building the bug while imprisoned in a Gulag, had unknowingly created the foundation for modern contactless payment. The CIA's Project Easy Chair refined the concept by adding a rectifier and amplifier, hiding listening devices inside furniture legs at the Soviet embassy in the Hague. Decades later, engineer Mario Cardullo adapted this for toll booth tags, and by the 2000s, the same technology powered credit card tap-to-pay.


3

Inside a Dissolved Credit Card

Acetone reveals the antenna coil and chip that enable contactless transactions.

Watch what happens if you take a credit card and stick it in a beaker of acetone. This is one that we started about 30 minutes ago. That's a credit card from 30 minutes ago? Why does it look — okay, so I see this like frame on the inside now. That's the antenna. And the chip right there in the middle.

Henry Belcaster


4

The Evolution of Card Payment Technology

Credit cards cycled through three phases, each balancing speed against security.

1

Embossed cards (1958–1970) Bank of America's BankAmericard required physical imprinting onto slips mailed to banks for approval. Transactions took days, and counterfeit fraud cost banks $100 million annually by the late 1960s.

2

Magnetic stripe (1970–2000s) IBM engineer Forrest Parry invented the mag stripe after his wife suggested ironing magnetic tape onto plastic. Transactions became instant, but static data made cloning trivial — fraudsters built empires swiping cards.

3

Chip-and-PIN (2003–present) EMV chips generate unique cryptographic codes per transaction using keys buried in silicon. UK counterfeit fraud fell 63% over seven years, but transaction times doubled, costing the US 116 million hours annually.

4

Contactless NFC (2005–present) Near-field communication uses magnetic fields to power and communicate with cards. COVID-19 accelerated adoption: global contactless transactions grew 40% in Q1 2020, and US usage surged 150% that year.


5

How Chip-and-PIN Cryptography Works

🔑
Secret Key Storage
The chip holds a cryptographic key buried in silicon layers, protected by countermeasures that destroy data if tampering is detected. Extracting it requires days of work and hundreds of thousands in specialist equipment.
🎲
Unique Transaction Codes
When inserted, the reader sends transaction details plus a random number. The chip uses its secret key to garble this into a unique code, which the bank verifies using its own matching key.
🚫
Anti-Replay Protection
Because each code is unique and can only be used once, stolen transaction data is worthless. This eliminated the static-data vulnerability that plagued magnetic stripes for decades.

6

The Criminal Economics of Mag Stripe Fraud

A former fraudster ran 300 restaurant employees to skim thousands of cards weekly.

I'd give them a grabber, and I'd just say to them, «Just swipe the numbers. Just when someone comes to pay, swipe their card, then swipe that one on there.» You know, I'm gathering thousands and thousands of numbers weekly. But I'm also becoming a wholesaler of the numbers. You know, at 16, I was paying loads of people 300 quid a week wages. I had half a million quid under my bed, didn't I, at 16? It's crazy how easy it was.

Tony Sales


7

Contactless Vulnerability: Digital Pickpocketing

NFC cards can be read through pockets, and the US has no transaction limit.

Contactless cards communicate via near-field magnetic induction, which requires proximity of about two centimeters. This enables «ghost tapping» or digital pickpocketing: an attacker with a hidden reader can extract card data through clothing. While the cryptographic protections prevent cloning, the attacker can still authorize a real transaction if close enough. In 2025, a woman was arrested in Rome for tapping tourists' cards in crowded streets, potentially draining accounts one transaction at a time.

Most countries impose transaction limits — the UK caps contactless at 100 pounds — but the United States has no such restriction. That means a single tap could authorize thousands of dollars. Tony Sales imagines embedding readers in subway turnstiles or narrow walkways, harvesting hundreds of cards daily. Countermeasures include Faraday cage wallets, carrying multiple cards together to interfere with reads, and enabling real-time bank notifications. But the safest approach may be abandoning physical cards entirely for mobile wallets — though even those have emerging vulnerabilities.


8

Key Fraud Statistics

Credit card fraud costs and adoption timelines reveal security trade-offs.

US credit card fraud (2003–2013)
+70%
While the UK rolled out chip-and-PIN and saw fraud drop 27%, the US delayed adoption and fraud exploded.
US counterfeit fraud decline (post-EMV)
76%
After chip cards finally arrived in the US in 2013, counterfeit fraud fell dramatically within a few years.
Annual time cost of chip transactions
116 million hours
Chip-and-PIN adds ~10 seconds per transaction; across all US payments, this equals over a century of collective waiting time per year.
Global contactless growth (Q1 2020)
+40%
COVID-19 drove rapid adoption as consumers avoided touching keypads.
US contactless growth (2020)
+150%
The pandemic accelerated American adoption even faster than global averages.
UK mag stripe fraud (late 1960s)
£100 million/year
Equivalent to roughly £1 billion today; skimming was trivially easy and enormously profitable.

9

The Mobile Wallet Paradox

Phones combine biometric security with contactless speed — but may enable $10,000 thefts.

⚠️

The Mobile Wallet Paradox

Mobile wallets appear to solve the contactless vulnerability: real card numbers aren't stored, and biometric locks prevent unauthorized use. Yet the video teases an upcoming demonstration where $10,000 is drained from MKBHD's locked iPhone using only a standard payment terminal. This suggests that the layering of convenience features — automatic small-transaction approval, Express Transit modes, or merchant-initiated billing — may have created exploitable gaps even biometrics can't close.


10

Pessoas

Derek Muller
Host, Veritasium
host
Henry Belcaster
Co-host
host
Marques Brownlee (MKBHD)
Tech YouTuber
guest
Tony Sales
Co-founder, We Fight Fincrime (former fraudster)
guest
Leon Theremin
Soviet inventor
mentioned
Forrest Parry
IBM engineer
mentioned
Mario Cardullo
Rocket engineer, RFID inventor
mentioned
Joseph Bezjian
CIA officer
mentioned

Glossário
EMVA 700-page global standard (named for Europay, Mastercard, Visa) defining how chip cards encrypt and authenticate transactions.
RFIDRadio Frequency Identification: uses radio waves to power a chip and read data remotely, common in toll tags and inventory tracking.
NFCNear-Field Communication: a short-range (~2 cm) variant of RFID using magnetic fields, enabling contactless credit card payments.
Amplitude ModulationEncoding information by varying the strength (amplitude) of a carrier wave; used in AM radio and the Soviet «Thing» bug.
Digital PickpocketingUsing a hidden NFC reader to tap a victim's contactless card through clothing and authorize fraudulent transactions.

Aviso: Este é um resumo gerado por IA de um vídeo do YouTube para fins educacionais e de referência. Não constitui aconselhamento de investimento, financeiro ou jurídico. Verifique sempre as informações com as fontes originais antes de tomar decisões. O TubeReads não é afiliado ao criador do conteúdo.