Toggle light / dark theme

I have recently re-kindled my interest in neuro-hacking, the process of using technological and spiritual tools to essentially hack my consciousness, make myself calmer, and of course, happier! I’ve been using vitamins (D3!) and isochronic tones for some time, but I have run across a number of new devices and apps recently. I got a demo kit for a new device called Thync, that purports to alter brain waves to achieve greater calm, less stress, and more energy. This follows, for me, several decades of interest in this arena, also fueled by a bunch of projects in the works that seek to augment human potential using the latest brain science, emerging hardware, and games.

This is an area of professional interest as well as personal. I’m a socio-cultural anthropologist with a focus on digital culture, technology use, and future possibilities. My graduate work focused on social learning associated with online gaming. A lot of my focus falls into a sub-discipline of anthropology known as cyborg anthropology:

Read more

Fun in fiction. Perhaps not so much in reality.


The human mind is already pretty open to manipulation—just ask anyone who works in advertising. But neural implant technology could potentially open up a direct digital link to our innermost thoughts that could be exploited by hackers.

In recent months, companies like Elon Musk’s Neuralink, Kernel, and Facebook have unveiled plans to create devices that will provide a two-way interface between human brains and machines.

While these devices could undoubtedly bring many benefits, they would be networked to computers and therefore essentially part of the Internet of Things. That should immediately set off alarm bells for anyone paying attention to cybersecurity news.

Read more

Quantum computing and the blockchain both get plenty of attention in 2017, and now researchers in Russia have combined the two to create what they claim is an unhackable distributed-ledger platform.

The new technology, described as the “first quantum-safe blockchain,” promises to make it secure for organizations to transfer data without the fear of hacking from even the most powerful computers, in this case, the emerging field of quantum computing. Quantum computers make use of the quantum states of subatomic particles to store information, with the potential to do some calculations far faster than current computers. There’s some dispute whether we have actually reached that point yet, but companies such as Google Inc. are promising that true quantum computing is just around the corner.

“Quantum computers pose a major threat to data security today and could even be used to hack blockchains, destroying everything from cryptocurrencies like bitcoin to secure government communications,” a spokesperson for the Russian Quantum Center told SiliconANGLE. “Because quantum computers can test a large number of combinations at once, they will be able to destroy these digital signatures, leaving the blockchain vulnerable.”

Read more

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software.” https://en.wikipedia.org/wiki/Hackathon

In February 2014, Dr. Brian May, astrophysicist and famed guitarist for the rock band QUEEN, began working with Grigorij Richters, the director of a new film titled 51 Degrees North, a fictional story of an asteroid impact on London and the resulting human condition. May composed the music for the film and suggested that Richters preview it at Starmus, an event organized by Dr. Garik Israelian and attended by esteemed astrophysicists, scientists and artists, including Dr. Stephen Hawking, Richard Dawkins and Rick Wakeman. The result was the beginning of discussions that would lead to the launch of Asteroid Day in 2015. See : https://asteroidday.org/

Read more

Confidential details of a top-secret encryption-breaking supercomputer were left completely exposed on an unsecured computer server belonging to New York University (NYU), according to a new report.

While it’s not uncommon for even critical-level infrastructure to suffer potentially catastrophic security breaches, what makes this event different is that there was seemingly no foul-play or attempts to hack into NYU’s systems.

Instead, it looks like somebody may have just forgotten to secure their classified data properly, exposing hundreds of pages of information on a covert code-breaking machine co-administered by the Department of Defence, IBM, and NYU.

Read more

Malicious software that blocks access to computers is spreading swiftly across the world, snarling critical systems in hospitals, telecommunications and corporate offices, apparently with the help of a software vulnerability originally discovered by the National Security Agency.

The reports of the malware spread began in Britain, where the National Health Service (NHS) reported serious problems throughout Friday. But government officials and cybersecurity experts later described a far more extensive problem growing across the Internet and unbounded by national borders. Europe and Latin America were especially hard hit.

“This is not targeted at the NHS,” British Prime Minister Theresa May told reporters. “It’s an international attack, and a number of countries and organizations have been affected.”

Read more

In the near future, as artificial intelligence (AI) systems become more capable, we will begin to see more automated and increasingly sophisticated social engineering attacks. The rise of AI-enabled cyberattacks is expected to cause an explosion of network penetrations, personal data thefts, and an epidemic-level spread of intelligent computer viruses. Ironically, our best hope to defend against AI-enabled hacking is by using AI. But this is very likely to lead to an AI arms race, the consequences of which may be very troubling in the long term, especially as big government actors join the cyber wars.


It will become the problem and the solution.

Read more