• If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • Finally, you can manage your Google Docs, uploads, and email attachments (plus Dropbox and Slack files) in one convenient place. Claim a free account, and in less than 2 minutes, Dokkio (from the makers of PBworks) can automatically organize your content for you.



Page history last edited by PBworks 13 years, 5 months ago

As telebiometrics, biotelemetrics, biometrics and other wetware data capture systems proliferate, hacking strategies will inevitably evolve. In human evolution, evolutionary biologist Geoffrey Miller's work suggests that human language was precisely such a biometric hacking strategy, as language helped humans (1) seduce each other as birds do with song and (2) both inform and misinform each other about their heredity and fitness. As can been seen in its specification hierarchy representation


{Biosphere{Noosphere{wetware biometric modalities{subjectivity{subjectivity-objectivization through telebiometrics{Biotelemetrica/BiotelemetricHackingtools}}}}}


this page will serve as an information sink collecting links and opening a discourse to wetware users and administrators for sharing strategies by which emerging biometric technologies are actively or hypothetically hacked. Please feel free to add links, text, images, scripts etc. This page should become interesting to security analysts and the now burgeoning biometrics hobbyist community and other self aware, embodied systems capable of self modification and self organization :)



Comments (0)

You don't have permission to comment on this page.