Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Biohacking: Integration of Smart Technology with the Human Body

b2ap3_thumbnail_nfc_payment_400.jpgWearable technology is still emerging, but a much different type of smart tech is coming soon. At the Kaspersky Labs Security Analyst Summit, the question of whether or not embedding technology in the human body is a viable concept was discussed in detail. This is supposedly the future of smart technology.

Hannes Sjoblad, a member of a Swedish group called BioNyfiken (warning: unless you speak Swedish, you might have trouble on this website), has implanted NFC (Near Field Communication) chips into his own hands in an attempt to back what he calls “biohacking.” This is the process of embedding technology into the human body to perform certain functions. This technology is still in development, but if it’s successful, we can expect to see “cyborg-like” results.

Sound too weird to be true? It’s a squeamish trend that’s happening all around the world. For proof, here’s a real video of YouTuber Mike James getting an xNT NFC chip implanted into his hand (skip the video if you don’t like needles).

According to ZDNet, over 300 Swedish citizens have volunteered to have these NFC chips implanted in their hands, specifically between the thumb and the forefinger. This project began as a crowdfunding campaign on Indiegogo, and has quickly turned into a topic of interest. Sjoblad himself uses this chip for a number of things. He says he can use it to unlock his house doors, bike lock, and even for his shop memberships and business cards. How’s that for smart technology?

Sjoblad was quick to defend his organization’s ideas by explaining that cyborgs “are already among us,” in the form of people with pacemakers, insulin pumps, and other medical technologies. He also explains that this technology is rapidly becoming more affordable as time goes on, not unlike other technologies like computers and smartphones. In terms of privacy, we already have smartphones that are capable of sharing personal data; therefore, these NFC chips shouldn’t be a cause for concern.

Sjoblad hopes that embedded NFC chips will improve the way that humans perform day-to-day activities normally achieved through use of smartphones, without having to use the device itself. Devices “clutter up” these daily routines and complicate things. Even wearables are considered “clutter.” Sjoblad’s goal is to eliminate these devices and simplify tasks using his NFC chips.

You can imagine the possibilities for this type of technology in the future. One of the most notable possibilities is two-factor authentication. Imagine keeping your computer locked until you and your unique NFC chip are within range. Or, imagine accessing a bank account without fear that someone else has access to it. Whether or not this type of technology will become readily available for the public is another topic altogether, but there’s a very real possibility that this kind of authentication can change the way we use our technology.

What are your thoughts on turning NFC chips and the human body itself into an authentication tool? Let us know in the comments.

Bonus technology: Want to take advantage of NFC tech without the use of needles? Try the NFC Ring.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation User Tips Data Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity IT Support Smartphones Communication Smartphone Miscellaneous Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Office Server Save Money Data Recovery Cloud Computing Passwords Windows 10 Saving Money Holiday Chrome Virtualization Gadgets Social Media Tech Term Microsoft Office Managed IT Services Managed Service Automation Artificial Intelligence Cybercrime Operating System Facebook Computers Wi-Fi BYOD Health Mobile Device Management Networking IT Support Hacking Internet of Things Remote Spam Managed Service Provider Office 365 Telephone Systems Covid-19 Information Information Technology Alert Recovery Employer-Employee Relationship Bandwidth Social Engineering Router Mobility BDR Human Resources Password Application Money Data Breach Encryption Remote Monitoring Applications Big Data App Law Enforcement History Mobile Computing Data Storage Patch Management Apps Remote Computing Mobile Office Blockchain Paperless Office Government Office Tips How To Training Private Cloud VPN Managed IT Website Bring Your Own Device Budget Data Management Work/Life Balance Vulnerability Windows 7 Two-factor Authentication Word Mouse HaaS Servers Google Drive Data Security Avoiding Downtime Wireless Flexibility Marketing Infrastructure WiFi Voice over Internet Protocol Gmail IT solutions Entertainment Settings Firewall Conferencing USB Cleaning Scam Virtual Reality Data Protection Apple End of Support Social Education Physical Security Vendor Management Safety User Error Meetings HIPAA Sports Redundancy Vendor Keyboard Managed Services Telephone System Staff Software as a Service Display Risk Management Hacker Machine Learning Connectivity Remote Work The Internet of Things Employee/Employer Relationship Lithium-ion battery RMM Save Time Fraud Fax Server Remote Worker Computing Infrastructure Digital Signage Business Intelligence Going Green Cryptocurrency SaaS Worker IT Consultant Audit IT Management Procurement Battery Workplace Strategy Humor Shadow IT Botnet Comparison Net Neutrality Network Congestion eWaste IT Plan Legal CES Help Desk Printing Internet Exlporer Unsupported Software Business Technology Content Management Charger PDF Access Control Managed Services Provider Wearable Technology Hard Drives Compliance Virtual Assistant Retail OneNote Instant Messaging Computer Care Authentication Proactive IT Database Robot Current Events Excel Remote Workers Best Practice Telephony Biometrics Samsung YouTube Black Market Processor Virus Virtual Desktop Update Value Unified Threat Management Hard Drive Computer Accessories DDoS Electronic Medical Records Document Management Google Docs Spam Blocking SharePoint Solid State Drive Wireless Technology Identity Theft Downtime How to Hiring/Firing Computing Data storage Printer Customer Service Environment Automobile Augmented Reality Bluetooth Cabling Antivirus Assessment Search Engine Twitter Messaging NIST Policy Monitor Business Mangement Hypervisor Printer Server Windows Server 2008 Windows 8 Dark mode Smart Tech Trend Micro Tools Trending IT service Amazon Default App Television Addiction SMS Procedure Reputation Recycling Saving Time Streaming Media Tablet Content Wiring dark theme Practices Shopping Tech Support Google Search Domains Amazon Web Services IT Infrastructure Public Computer Techology Cache AI Laptop Safe Mode FinTech Customers Criminal IaaS Regulations Bing Maintenance Transportation Bloatware Rootkit Audiobook GDPR Hosted Computing Social Network Computer Fan Online Shopping Investment Wireless Internet Touchpad File Sharing Employees Employee/Employer Relationships Workers Tablets Benefits FENG Entrepreneur Politics Camera Windows 365 Advertising Inventory Specifications ISP Evernote ROI IBM Wire Video Conferencing Consultant Smart Technology Sales Bitcoin Analytics Notifications Flash Travel Shortcuts Shortcut Cost Management Printers Point of Sale Personal Millennials Cryptomining Wireless Charging Software Tips Social Networking Supercomputer Smart Office Supply Chain Management Best Available Monitoring WIndows 7 Relocation Batteries Sync Emails Virtual Private Network Windows 8.1 Digitize Workforce Cables Windows Server 2008 R2 Running Cable Video Games Memory Two Factor Authentication Worker Commute Customer relationships Netflix Root Cause Analysis Experience Project Management Email Best Practices Nanotechnology IT Assessment Telecommuting Manufacturing Cortana HBO Knowledge Music Scalability Business Owner Computer Tips User Digital Signature Managed IT Service PowerPoint Skype Security Cameras Windows Media Player Data loss Warranty Virtual CIO OneDrive NarrowBand Biometric Security Google Apps Outlook Leadership Science Troubleshooting Search HVAC Peripheral Digital Security Cameras Managing Stress iPhone Analysis Using Data Start Menu Screen Mirroring Loyalty Administrator Devices Copiers 5G Enterprise Content Management Quick Tip Cameras Distributed Denial of Service Frequently Asked Questions Customer Relationship Management Books Analyitcs MSP Ergonomics Files Accountants Mobile Smartwatch Windows 10s Credit Cards OLED Cast Programming Microchip Thought Leadership Development Chromecast Password Management PCI DSS Password Manager Virtual Machine Tip of the week webinar Emergency Employer Employee Relationship 2FA Colocation Fiber Optics Uninterrupted Power Supply Professional Services Multi-Factor Security Employee Public Cloud

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code