Skip to main content

Cyber Cyborgs Among Us

 Not quite human...and not quite machine

I recently had the privilege to interview Len Noe on the Set Solutions podcast. Not only is Len an awesome human being...he's also a little bit more than human being. Sometimes referred to as cyborgs, grinders, transhuman, or biohackers. Len has augmented his own biology with technology in order to begin transforming himself into the ultimate cyber weapon.

He has multiple implants in his hands that can be used to support different types of cyber attacks. He introduced multiple different attack scenarios during his talk at the RSA Conference "Biohacking: The Invisible Threat", and will be covering them again at BlackHat USA later this year!!!


While there still remains a stigma and some controversy around this trend, I would argue that Len is just ahead of his time. With multiple major R&D firms investing in similar capabilities (such as Elon Musk's Neuralink), Len and others like him, are blazing a trail for what lies in the future.

“The Singularity will represent the culmination of the merger of our biological thinking and existence with our technology, resulting in a world that is still human but that transcends our biological roots. There will be no distinction, post-Singularity, between human and machine or between physical and virtual reality. If you wonder what will remain unequivocally human in such a world, it’s simply this quality: ours is the species that inherently seeks to extend its physical and mental reach beyond current limitations.”  

-- Ray Kurzweil, The Singularity is Near: When Humans Transcend Biology


Check out the full interview on the "Ready, Set, Secure" podcast at the link below, or wherever you download your podcasts.


Comments

Popular posts from this blog

ChatGPT Does Dad Jokes

So my new favorite hobby (at least for the next half hour or so), is feeding chatGPT (GPT-4 model) clever dad jokes and asking it to explain them.  It's amusing to see the responses, but it's also fascinating. Have you ever told a clever joke, only for someone to not understand it and ask you to explain. Perhaps (at least momentarily), you were at a loss for words, or struggled to succinctly explain the joke. This is perfectly normal. Clever jokes often play on language and can even require you to make complex multi-level logical connections based on double-entendres and hidden meanings.  Strangely enough, its usually much easier to understand a joke, than it is to have to explain the same joke. It can be exceptionally challenging to define what is funny, or even moreso, to explain why something is (or ought to be) funny. It often amounts to a seemingly inexplicable logical incongruence, which can be challenging to define in words. Having chatGPT interpret dad jokes is an ente...

Bypassing CAPTCHA with Visually-Impaired Robots

As many of you have probably noticed, we rely heavily on bot automation for a lot of the testing that we do at Sociosploit.  And occasionally, we run into sites that leverage CAPTCHA ("Completely Automated Public Turing Test To Tell Computers and Humans Apart") controls to prevent bot automation.   Even if you aren't familiar with the name, you've likely encountered these before. While there are some other vendors who develop CAPTCHAs, Google is currently the leader in CAPTCHA technology.  They currently support 2 products (reCAPTCHA v2 and v3).  As v3 natively only functions as a detective control, I focused my efforts more on identifying ways to possibly bypass reCAPTCHA v2 (which functions more as a preventative control). How reCAPTCHA v2 Works reCAPTCHA v2 starts with a simple checkbox, and evaluates the behavior of the user when clicking it.  While I haven't dissected the underlying operations, I assume this part of the test likely makes determ...

Another "Fappening" on the Horizon?

So in case you aren't fully up-to-speed on useless hacker trivia, "The Fappening" (also sometimes referred to as "Celebgate") was a series of targeted end-user cyber attacks which occurred back in 2014 (which strangely feels like forever in tech years), that resulted in unauthorized access to the iCloud accounts of several prominent celebrity figures.  Following these breaches, photographs (for many including personal sexually explicit or nude photos) of the celebrities were then publicly released online.  Most evidence points to the attack vector being spear phishing email attacks which directed the victims to a fake icloud login site, and then collected the victim's credentials to subsequently access their real icloud accounts. Migration to MFA In response to these events, Apple has made iCloud one of the very few social web services that implements compulsory MFA ("Multi-Factor Authentication").  But while they might be ahead of the indust...