Quantcast

Articles

Get all-in-one coverage of Internet security and online privacy issues brought up by the industry’s leading experts at security conferences and seminars.

Cybernetics for the Masses 4: Experimenting with Neodymium Implants

In this part Lepht Anonym gets into detail about neodymium implants, including the use of Sugru for bioproofing, and the results of her own experiments. Successfully installed implants just function like any other sense you’ve got. They’re just there in the background. They’re not intrusive; they just...

Cybernetics for the Masses 3: Using Thermistors and Neodymium Implants

Lepht Anonym now shares her experience with thermistor devices to determine the level of body heat, and dwells on a cheap way of going about neodymium implants. I’m on a lot of medications, as you can probably tell, so one of the side effects is occasionally my sense of temperature just blips in and out...

Cybernetics for the Masses 2: Nerve Stimulation and RFID Tagging

The main emphasis Lepht Anonym makes in this part of her presentation is on implants for nerve stimulation and experiments with RFID identification. This is my main principle: nerve stimulation (see image). Anything can stimulate nerves, as I said. This has been known to medical science for a very long...

Cybernetics for the Masses by Lepht Anonym

Lepht Anonym, a self-taught British subdermal electronics experimenter calling herself an underground biohacker, takes the floor at 27th Chaos Communication Congress to talk about sensory extension via haptic implants, as well as other things where technology merges with the human body. Hi, first of all...

Securing the Campaign 7: More Questions Answered

This section covers the final Q&A part of Ben Hagen’s talk at 29th Chaos Communication Congress in Germany, getting further into election campaign security. Question: It would be interesting to know what kind of technologies you were using for your web applications, like Python, Ruby, .NET, or...

Securing the Campaign 6: Relevant Discussion with the Audience

Having presented the main material of the presentation, Ben Hagen gets to take some questions from 29c3 attendees regarding security issues at Obama campaign. So, I think that’s all I had for you guys, but I’d be happy to take any questions if we have time. Host: Ok, thank you! If anyone has a question,...

Securing the Campaign 5: Application Assessment

The entry below encompasses Ben Hagen’s perspective on securing the code and highlights some recommendations as well as tools applicable for that purpose. In terms of cloud security, we used AWS for almost everything – that’s Amazon’s cloud solution. I think the most powerful security tool in AWS is...

Securing the Campaign 4: Risk Mitigation

On outlining the prevalent threats at the campaigns, Ben Hagen now proceeds with description of the tools and methods applicable for mitigating these perils. Keeping in mind all the threats we faced, let’s talk about what we did to actually mitigate them at the campaign. In terms of enterprise security,...

Securing the Campaign 3: Types of Technological Threats Being Faced

Ben Hagen’s main focus in this section is on the overview of technological hazards that the election headquarters were facing at the campaign. The role technology played in the election – people often quoted it as being a force multiplier. What that means is somebody who can call 100 people on their...

Securing the Campaign 2: The Role of Technology in 2008 and 2012 Election Campaigns

What Ben Hagen covers here is the way technology impacted the last two US presidential campaigns, and also highlights the problems that occurred along the way. So, getting into the actual campaigns: 2008 – obviously, Obama won that. And he won it by pretty big margin; I’m not sure if everybody is...