Hacked Implants
Hi everyone,
I'm new to the forum, pls bear with me.
I have a question regarding RFID, NFC implants (and other tag/chips some of you might have contemplated implanting or experimented with). Had any of you performed security checks or had any experience of getting your implant hacked? Is this a concern in the community?
Thanks for your input! tf
I'm new to the forum, pls bear with me.
I have a question regarding RFID, NFC implants (and other tag/chips some of you might have contemplated implanting or experimented with). Had any of you performed security checks or had any experience of getting your implant hacked? Is this a concern in the community?
Thanks for your input! tf
Comments
That said if it's spelt out on the implant what it is and there is no other form of security then I would worry like if there was bank account and routing number free for the scanning.
My personal setup:
I can make in-store purchases with my phone. My phone will unlock without prompts so long as my smart watch is near and turned on. If the connection is lost with my smart watch I need to scan my NFC tag, located in my hand, or enter a password. Could a super-spy with high-tech surveillance and reconnaissance get into my phone with a little time and effort. Yes, of course. Could a hoodlum who steals my phone on the street use my phone to make purchases, or even read my text message? Probably not.
The lesson I want to show is that I don't have great security on my phone but it is suitable for the threat level.
Some people enjoy having security that is orders of magnitude above the threat level and there's nothing wrong with that.
If you don't know how to use a door handle then you won't open a door. If you worry about security on information on a chip then don't put it on the chip. If your being targeted call the police.
Benbeezy points out, I guess an unauthorized transfer of information would not need to be harmful. Could you create a mesh network of RFID chips acting as bike messengers, sending information from body to body until it reaches it's intended recipient, guided by geotags...
Donovan880 please let us know how your hack attempts turn out!
ps: I am coming at this form an angle of cyber-anthropology, interested in our bodily relationship with technology and it's effects on privacy and intimacy...