[FoRK] On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces
sdw at lig.net
Sun Aug 19 18:56:35 PDT 2012
Your personal monitor / agent / quantified self recorder / brain
intrusion detection service (BIDS) / iBuddy / iMe (those are mine
Apple!) will notice that you have responded with your current PIN and
auto-change it immediately, before you get the whole thing out. Most
of your protection will be in positive ID between you and your iBuddy /
On Sun Aug 19 18:13:27 2012, Damien Morton wrote:
> I think that, over an extended period, it would be easier to present
> all 10k possible PIN numbers.
> Flash "Your PIN number is 1234" and register brain activity for truthiness.
> Might even be able to recognise partial truthiness to improve the search.
> On Sun, Aug 19, 2012 at 8:58 PM, Bill Kearney <wkearney99 at hotmail.com> wrote:
>> I can see it now, a malware game embeds a sequence of questions designed to
>> expose critical private info. Then collects the results. Talk about the
>> ultimate subliminal message hack. Flash a picture of "tell me your PIN" and
>> extract it from the brainwaves.
>> On 8/19/2012 8:41 PM, Noon Silk wrote:
>>> Brain computer interfaces (BCI) are becoming increasingly popular in
>>> the gaming and entertainment industries. Consumer-grade BCI devices
>>> are available for a few hundred dollars and are used in a variety of
>>> applications, such as video games, hands-free keyboards, or as an
>>> assistant in relaxation training. There are application stores similar
>>> to the ones used for smart phones, where application developers have
>>> access to an API to collect data from the BCI devices.
More information about the FoRK