Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Biohacking: Integration of Smart Technology with the Human Body

b2ap3_thumbnail_nfc_payment_400.jpgWearable technology is still emerging, but a much different type of smart tech is coming soon. At the Kaspersky Labs Security Analyst Summit, the question of whether or not embedding technology in the human body is a viable concept was discussed in detail. This is supposedly the future of smart technology.

Hannes Sjoblad, a member of a Swedish group called BioNyfiken (warning: unless you speak Swedish, you might have trouble on this website), has implanted NFC (Near Field Communication) chips into his own hands in an attempt to back what he calls “biohacking.” This is the process of embedding technology into the human body to perform certain functions. This technology is still in development, but if it’s successful, we can expect to see “cyborg-like” results.

Sound too weird to be true? It’s a squeamish trend that’s happening all around the world. For proof, here’s a real video of YouTuber Mike James getting an xNT NFC chip implanted into his hand (skip the video if you don’t like needles).

According to ZDNet, over 300 Swedish citizens have volunteered to have these NFC chips implanted in their hands, specifically between the thumb and the forefinger. This project began as a crowdfunding campaign on Indiegogo, and has quickly turned into a topic of interest. Sjoblad himself uses this chip for a number of things. He says he can use it to unlock his house doors, bike lock, and even for his shop memberships and business cards. How’s that for smart technology?

Sjoblad was quick to defend his organization’s ideas by explaining that cyborgs “are already among us,” in the form of people with pacemakers, insulin pumps, and other medical technologies. He also explains that this technology is rapidly becoming more affordable as time goes on, not unlike other technologies like computers and smartphones. In terms of privacy, we already have smartphones that are capable of sharing personal data; therefore, these NFC chips shouldn’t be a cause for concern.

Sjoblad hopes that embedded NFC chips will improve the way that humans perform day-to-day activities normally achieved through use of smartphones, without having to use the device itself. Devices “clutter up” these daily routines and complicate things. Even wearables are considered “clutter.” Sjoblad’s goal is to eliminate these devices and simplify tasks using his NFC chips.

You can imagine the possibilities for this type of technology in the future. One of the most notable possibilities is two-factor authentication. Imagine keeping your computer locked until you and your unique NFC chip are within range. Or, imagine accessing a bank account without fear that someone else has access to it. Whether or not this type of technology will become readily available for the public is another topic altogether, but there’s a very real possibility that this kind of authentication can change the way we use our technology.

What are your thoughts on turning NFC chips and the human body itself into an authentication tool? Let us know in the comments.

Bonus technology: Want to take advantage of NFC tech without the use of needles? Try the NFC Ring.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 28 February 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Google Business Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications Business Continuity Smartphones Communication IT Support Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Upgrade Phishing Windows Data Backup Outsourced IT Ransomware Windows 10 Office Data Recovery Server Save Money Cloud Computing Windows 10 Passwords Saving Money Holiday Gadgets Social Media Chrome Virtualization Tech Term Managed IT Services Automation Microsoft Office Managed Service Artificial Intelligence Facebook Operating System Cybercrime Computers Internet of Things BYOD Mobile Device Management Networking Wi-Fi IT Support Hacking Health Spam Office 365 Covid-19 Alert Telephone Systems Managed Service Provider Information Technology Information Remote BDR Bandwidth Social Engineering Mobility Recovery Employer-Employee Relationship Router Remote Monitoring Law Enforcement Data Breach Application App History Password Money Big Data Encryption Applications Human Resources Mobile Computing Private Cloud Managed IT Office Tips Blockchain Training Paperless Office Apps How To VPN Data Storage Remote Computing Patch Management Government Mobile Office Website Budget Servers Bring Your Own Device Wireless Data Management Data Security Work/Life Balance Gmail Settings Infrastructure Google Drive Two-factor Authentication Voice over Internet Protocol Flexibility Marketing WiFi Vulnerability Mouse Windows 7 HaaS IT solutions Avoiding Downtime Word Entertainment Vendor User Error Data Protection Meetings USB Managed Services Display Vendor Management Save Time Risk Management Employee/Employer Relationship Hacker RMM Cleaning The Internet of Things Lithium-ion battery Telephone System Staff Software as a Service Machine Learning End of Support Remote Work Connectivity Education Physical Security Firewall Safety Sports HIPAA Virtual Reality Redundancy Apple Conferencing Keyboard Social Scam IT Management Cryptocurrency Database Botnet IT Plan Wearable Technology Document Management Remote Workers Hard Drives Solid State Drive Wireless Technology Retail Comparison IT Consultant Instant Messaging How to Downtime Processor Unsupported Software CES Robot Excel Charger Biometrics Humor Data storage Hard Drive Business Technology Content Management Virtual Desktop Automobile Access Control Compliance Computer Care OneNote Virtual Assistant DDoS Current Events Computing Infrastructure Computing Going Green Telephony Authentication SharePoint Samsung Value Battery Shadow IT Digital Signage Customer Service Update Environment Legal Spam Blocking Electronic Medical Records Virus Internet Exlporer Fax Server Google Docs Identity Theft Hiring/Firing Procurement Unified Threat Management Computer Accessories Net Neutrality SaaS Workplace Strategy PDF Help Desk Proactive IT Augmented Reality Printing Fraud Network Congestion Business Intelligence eWaste Best Practice Printer YouTube Remote Worker Worker Bluetooth Black Market Managed Services Provider Audit Public Computer Recycling Business Owner Monitoring Batteries Digitize Printer Server NarrowBand Regulations Wiring Practices Shortcut Windows 8.1 Transportation Rootkit Amazon Web Services Cost Management Search Windows Server 2008 R2 Computer Fan Cache Safe Mode Criminal Social Networking Customer relationships iPhone IT Assessment Manufacturing GDPR Workers Hosted Computing Email Best Practices Benefits Online Shopping FENG Wireless Internet Security Cameras File Sharing Running Cable IBM Computer Tips Files Managed IT Service Memory OneDrive Chromecast Biometric Security Flash Camera Inventory Virtual CIO Smart Technology Specifications Evernote Peripheral Wire Uninterrupted Power Supply Software Tips Supercomputer Digital Security Cameras Travel Colocation Using Data Copiers 5G Sync Printers Emails Millennials Wireless Charging Quick Tip Monitor Smart Office Smartwatch Ergonomics Consultant Science Development Analytics OLED Virtual Private Network Netflix Two Factor Authentication Workforce Cables PCI DSS Reputation Virtual Machine Streaming Media Root Cause Analysis Tech Support Employee HBO Distributed Denial of Service Knowledge Customer Relationship Management Content 2FA Music Best Available Fiber Optics Telecommuting WIndows 7 Analyitcs Techology Messaging Laptop Cabling Skype Project Management Nanotechnology Cortana Programming Policy Customers Hypervisor Data loss Outlook Leadership Digital Signature Audiobook Dark mode Troubleshooting Trend Micro SMS Touchpad Default App Start Menu Warranty HVAC Antivirus Loyalty Google Apps Procedure Saving Time Screen Mirroring Google Search Frequently Asked Questions Analysis Politics dark theme Books Windows 8 Advertising Shopping User AI PowerPoint IT Infrastructure Mobile Windows Media Player Administrator Windows 10s Devices IT service Cast Enterprise Content Management FinTech Notifications Bing Tip of the week MSP webinar Accountants Emergency Tablet Social Network Employer Employee Relationship Credit Cards Managing Stress Investment Professional Services Microchip Public Cloud Thought Leadership Domains Password Management Assessment Password Manager Employees Relocation Employee/Employer Relationships Cameras ISP Windows Server 2008 IaaS Maintenance Windows 365 Multi-Factor Security Bloatware Video Games Video Conferencing ROI Tools Search Engine Twitter NIST Television Business Mangement Worker Commute Sales Bitcoin Shortcuts Personal Cryptomining Smart Tech Experience Point of Sale Trending Tablets Amazon Entrepreneur Scalability Supply Chain Management Addiction

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code