Don't suffer through that video.
The summary is here
https://www.wired.com/story/card-shu...0machine%20and
and it doesn't conclude with that they were able to change the order of anything, and the article is written before anything was actually presented, but according to the article the team was supposed to present later that day their findings of that inserting something into the USB port on the Deckmate 2 should be able to gain access to its camera to then know what the machine knows about the order of the cards in there.
According to their findings, in theory if someone could stick something into the machine at the tables and then transmit that information to someone's nearby phone via bluetooth that information about the order of the cards could be analyzed and conveyed back to a person at the tables via coded signals, and used for cheating.
In other words, that supposedly there is a way to gain access to the camera inside this Deckmate 2 shuffler (under laboratory conditions) to know the order of the cards inside the machine via the USB port on the machine. The programmers thought that there might be a way to access it without plugging in a USB device, if the machine was connected via cellular connection to the manufacturer for monitoring, and they could tap into that communication line.
The programmers did not figure out a way to "reprogram" the Deckmate 2 machine to put the cards in any particular order, although they stated that they believed that this too could be done. These guys had the machine's password, they did not hack it, and it took a very long time to figure out how to do what they did. Probably without that password, they would have taken even longer to access the machine.
They thought that the older model Deckmate 1 machine could be hacked to reorder the cards, or to not shuffle the cards at all, but only if the chip inside the machine itself were physically accessed and somehow reprogrammed, which would take some effort, again, take a long time to figure out and do.
If someone can find the notes from what was actually presented at the August 2023, Black Hat security conference in Las Vegas, and not just what they assumed was going to be presented, that might shed more light on this.
Deckmates are 1 deck shufflers, used in poker rooms.
My understanding is that possibly the reason this Deckmate is vulnerable to this sort of hacking is not just because it has a camera in it to read the cards, but because of its "wheel" design where there ends up just one card per slot, placed into a wheel with 52 slots (or more if there are jokers). The cards are loaded until all the slots are full, and then the machine unloads the cards into a platter for distribution. During some point in the process the camera reads each card, maybe just to determine that all cards are present in the slots and none are duplicated. That sort of slotted wheel design with just 1 card per slot wouldn't really work I don't think for a multi deck shuffler, but in any case, this slotted wheel / one card per slot design combined with a camera might be what makes this machine susceptible.
Someone who knows more about the mechanics of this machine and other shuffling machines could probably analyze the data from these hackers even better. Someone, of course, OTHER than that thieving lying low down no good varmint, UNKewlJ.