research paper<\/a>\u00a0on the feasibility of side-channel attacks with brain-computer interfaces, this system analyzes brain activity and thus makes communication between a user and an external device possible. In recent decades, the BCI has been applied mainly in the medical field and was aimed at increasing the quality of life for patients suffering from severe neuromuscular disorders.<\/p>\nThis time, security researchers from the\u00a0Universities of Oxford<\/strong>, Geneva<\/strong>, and California<\/strong> have created the software specifically designed to search for sensitive data, such as your home location, your debit card PIN, your birth date, etc.<\/p>\nThe software has been tested on 28 participants who were quite cooperative and had no idea that they would accept the brain “invasion<\/strong>“. The experiments reached 10 to 40% chance of success in obtaining the necessary information.<\/p>\nAt present, this device still resembles science fiction, but the technology does not stop developing, and maybe in the near future, such brain hacking software will be available.<\/h5>\n This technology of mind control<\/strong>\u00a0will undoubtedly cause controversy. Many people will wonder who should be allowed to use this type of software and why.<\/p>\n\nShould the police have the opportunity to use this technology on suspects to prevent or solve crimes?<\/li>\n And what about the privacy rights of an individual?<\/li>\n And finally, what will happen in the brain, if the brain scan software contains malware?<\/li>\n<\/ul>\nThere are still many unanswered questions…<\/p>\n","protected":false},"excerpt":{"rendered":"
In the near future, it may become possible to extract sensitive information from the brain with the help of invasive software or spyware. It is not really important if you want to share this information with anyone or not because this software will force you to do it against your will. Your thoughts will no […]<\/p>\n","protected":false},"author":37,"featured_media":7665,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"0","ocean_second_sidebar":"0","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"0","ocean_custom_header_template":"0","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"0","ocean_menu_typo_font_family":"0","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"0","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"off","ocean_gallery_id":[],"footnotes":""},"categories":[7],"tags":[110,244],"yoast_head":"\n
Invasive Brain Hacking Software May Soon Become a Reality<\/title>\n \n \n \n \n \n \n \n \n \n \n \n \n \n\t \n\t \n\t \n \n \n \n \n \n\t \n\t \n\t \n