«
Expand/Collapse
18 items tagged "dna"
Related tags:
sql injection [+],
matrix [+],
vulnerability [+],
usa [+],
sql [+],
polymorphic [+],
metamorphic [+],
malware [+],
chet hosmer [+],
chaos communication congress [+],
black hat [+],
webapps [+],
united states [+],
identification [+],
hacks [+],
dna databases [+],
day [+],
conspiracy theorists [+],
collection [+],
work [+],
video [+],
technology [+],
syyn [+],
supports [+],
stack buffer [+],
source dna [+],
something [+],
slides [+],
safer use [+],
rube goldberg [+],
realnetworks [+],
pong game [+],
pong [+],
pearl biotech [+],
open source collection [+],
obama [+],
news [+],
music [+],
links [+],
leap [+],
lamp [+],
laboratory walls [+],
james bowman [+],
home [+],
helix [+],
hackaday [+],
engineering [+],
drew endy [+],
double helix [+],
dna strand [+],
dna sampling [+],
dna lab [+],
dna helix [+],
dna double helix [+],
dna animation [+],
desk lamp [+],
chemistry [+],
buffer overflow vulnerability [+],
board [+],
biotechnology community [+],
barcodes [+],
audio [+],
arduino [+],
andrew [+]
-
-
21:47
»
SecDocs
Authors:
Drew Endy Tags:
DNA Event:
Chaos Communication Congress 24th (24C3) 2007 Abstract: Biological engineering does not have to be confined to the laboratories of high-end industry laboratories. Rather, it is desirable to foster a more open culture of biological technology. This talk is an effort to do so; it aims to equip you with basic practical knowledge of biological engineering. Genetic engineering is now a thirty year old technology. For reference, over a similar period of time, modern computing machines went from exclusive objects used to design weapons of mass destruction, to the now ubiquitous panoply of personal computing devices that support mass communication and construction. Inspired by this and many other past examples of the overwhelmingly constructive uses of technology by individuals, we have been working over the past five years to develop new tools that will help to make biology easy to engineer. We have also been working to foster a constructive culture of future biological technologists, who can reliably and responsibly conceive, develop, and deliver biological technologies that solve local problems. This talk will introduce current best practice in biological engineering, including an overview of how to order synthetic DNA and how to use and contribute standard biological parts to an open source collection of genetic functions. The talk will also discuss issues of human practice, including biological safety, biological security, ownership, sharing, and innovation in biotechnology, community organization, and perception across many different publics. My hope is that the conferees of 24C3 will help me to understand how to best enable an overwhelmingly constructive hacker culture for programming DNA.
-
-
21:47
»
SecDocs
Tags:
intelligence data mining Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: As governments increase their data collection capabilities software developers are stepping up to both utilize and augment surveillance capabilities. DNA databases, facial recognition, behavioral patterning, and geographic profiling are all in use today. Police are crowdsourcing identification of suspects and citizens are willingly participating. This talk will cover real technologies in place today as well as educated speculation of what is coming next. Conspiracy theorists have been questioning the degree to which anyone truly has privacy for quite some time. State ID & fingerprints have given way to electronic passports & DNA analysis. With the increasing number of DIY BIO groups it isn't outside the realm of speculation to see clandestine collection & generation of genomic information by a state actor. Police agencies are engaging in genomic data collection of suspects, witnesses, and victims with no guarantee of the information safety of those individuals. The current scope of laws in the United States limits "genetic discrimination" to "health insurance and employment decisions" with no limitations on the implication of guilt or agency in a crime at the federal level. Similarly companies are collecting photographs of individuals from online services and using them as the corpus for facial recognition techniques which are then leased to government actors. The goal of this talk is to: Address the current vectors for public identification Discuss potential countermeasures for identification dragnets Analyze the role of genomic screening Review case studies of individuals trying to avoid "the system" and crowdsourced attempts to identify the individuals Imagine one was "erased" from these databases. How can one re-establish positive identification (and would they want to)?
-
21:47
»
SecDocs
Tags:
intelligence data mining Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: As governments increase their data collection capabilities software developers are stepping up to both utilize and augment surveillance capabilities. DNA databases, facial recognition, behavioral patterning, and geographic profiling are all in use today. Police are crowdsourcing identification of suspects and citizens are willingly participating. This talk will cover real technologies in place today as well as educated speculation of what is coming next. Conspiracy theorists have been questioning the degree to which anyone truly has privacy for quite some time. State ID & fingerprints have given way to electronic passports & DNA analysis. With the increasing number of DIY BIO groups it isn't outside the realm of speculation to see clandestine collection & generation of genomic information by a state actor. Police agencies are engaging in genomic data collection of suspects, witnesses, and victims with no guarantee of the information safety of those individuals. The current scope of laws in the United States limits "genetic discrimination" to "health insurance and employment decisions" with no limitations on the implication of guilt or agency in a crime at the federal level. Similarly companies are collecting photographs of individuals from online services and using them as the corpus for facial recognition techniques which are then leased to government actors. The goal of this talk is to: Address the current vectors for public identification Discuss potential countermeasures for identification dragnets Analyze the role of genomic screening Review case studies of individuals trying to avoid "the system" and crowdsourced attempts to identify the individuals Imagine one was "erased" from these databases. How can one re-establish positive identification (and would they want to)?
-
-
6:01
»
Hack a Day
[LucidMovement] was looking for some crystal-based artwork and just couldn’t seem to find anything that fit the bill, so he decided to build something himself. The inspiration for his desk lamp came from something we’re all familiar with, a DNA double-helix. To grow the crystals he built a helix-shaped growing substrate out of nichrome and [...]
-
-
14:05
»
Hack a Day
Spinning DNA animation using sprites [James Bowman] shows a way to use sprites to simulate parts of DNA moving in 3 dimensional space. The animations are driven by an Arduino board and Maple board, which allows a comparison of the processing differences between the two. [Thanks Andrew] Tiny Pong This Pong game is so small (translated), [...]
-
-
12:59
»
SecuriTeam
Remote exploitation of a stack buffer overflow vulnerability in RealNetworks Helix DNA Server.
-
Make your website safer. Use external penetration testing service. First report ready in one hour!
-
-
7:29
»
Hack a Day
This beautiful music syncronized double helix was made by Syyn labs. Last time we saw them, they had created that amazing rube goldberg style music video for OK Go. This 100 foot long LED DNA strand took over 1000 combined man hours to build. It took 512 LEDs, 32 LED controllers, 4 Arduinos, 4 computers, [...]
-
-
13:20
»
Hack a Day
[Jeri Ellsworth] stopped by Pearl Biotech’s booth at Maker Faire and took a look at their open source DNA sequencing work. It is by no means a grab-and-go solution for anyone, but from what we’ve seen in the video they’re breaking down those laboratory walls and letting us in to dabble at this work (assuming [...]