[FoRK] On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces

Stephen Williams sdw at lig.net
Sun Aug 19 18:56:35 PDT 2012

Your personal monitor / agent / quantified self recorder / brain 
intrusion detection service (BIDS) / iBuddy / iMe (those are mine 
Apple!) will notice that you have responded with your current PIN and 
auto-change it immediately, before you get the whole thing out.  Most 
of your protection will be in positive ID between you and your iBuddy / 


On Sun Aug 19 18:13:27 2012, Damien Morton wrote:
> I think that, over an extended period, it would be easier to present
> all 10k possible PIN numbers.
> Flash "Your PIN number is 1234" and register brain activity for truthiness.
> Might even be able to recognise partial truthiness to improve the search.
> On Sun, Aug 19, 2012 at 8:58 PM, Bill Kearney <wkearney99 at hotmail.com> wrote:
>> I can see it now, a malware game embeds a sequence of questions designed to
>> expose critical private info.  Then collects the results.  Talk about the
>> ultimate subliminal message hack.  Flash a picture of "tell me your PIN" and
>> extract it from the brainwaves.
>> On 8/19/2012 8:41 PM, Noon Silk wrote:
>>> Awesome.
>>> "
>>> Brain computer interfaces (BCI) are becoming increasingly popular in
>>> the gaming and entertainment industries. Consumer-grade BCI devices
>>> are available for a few hundred dollars and are used in a variety of
>>> applications, such as video games, hands-free keyboards, or as an
>>> assistant in relaxation training. There are application stores similar
>>> to the ones used for smart phones, where application developers have
>>> access to an API to collect data from the BCI devices.

More information about the FoRK mailing list