The word certificate implies to me that the whole hack is remotely executed. Maybe someone with more knowledge on the matter can chime in. Do local physical connections use a certificate, I presume something similar to an SSL cert, to authenticate the connection?