The video discusses hacking through physical contact, body modifications for technology, advanced chips like Neuralink and VivoKey, and speculates on future identity verification methods.
[32:46-33:26]
The first chapter discusses the concept of hacking through physical proximity, with Speaker explaining the nuances of this method.
right you know everybody's used to the scent you know ransomware and extortion where and all the ways that we've been getting hacked all along but nobody's expecting somebody to hack them through physical contact and there are people out there like me that can do this and as a as a general population they need to be aware of it to try and be better protected So does it have to be physical contact or can I just be within a few feet of you? The most powerful chip that I have right now, I need to be within about three and a half to 4 inches of the device that I'm trying to attack. But once I get the computer put in my arm, then I'll be able to reach out to an entire room. Jesus.
[33:30-34:34]
The second chapter explores body modification for technology, as Speaker explains surgery practices and where these procedures might take place.
when do you cut yourself open to actually do something good for us because covet says everybody stays 6 feet away from each other yeah i'm curious so the answer so the answer to you is a real virus to prevent us from getting that virus so that we all stay away from each other so that other so the computer viruses cannot hack us I want to ask you, though, you're cutting yourself open to do this surgery on yourself? I'm not personally doing it, no. But the truth is you can't go to a doctor for this. Right. You know, I love asking people, and I love y'all's personality, but it's like, how would that phone call even go? Hello, Dr. So-and-so, I'd like you to, you know, do surgery on me to take this thing that I bought off the Internet and put it in my body. Honestly, that doesn't sound that crazy. I mean, there's people in Hollywood that call up their doctors and be like, hey, I need, like, 17 bottles of Vicodin, please. And they get it. So who's doing, like, tattoo audits or something? Body modification parlors. You know, the same people that will split your tongue or gauge your ears. Wow.
[35:23-36:17]
In the third chapter, Speaker introduces advanced technology chips like Neuralink and VivoKey, discussing their applications in cybersecurity.
I can understand it for like Neuralink for people who have disabilities and all that stuff but like where does the positive intention for something like this come from for somebody who does not have any? One of the big ones is there's a chip called the VivoKey. And this is actually a crypto bionic FIPS compliant cybersecurity chip. And I use that to actually get one time passwords. It does. It's the key for my crypto wallet. And this is actually has the same all the certifications needed to be used for government. And one of the things that I like to throw out, especially amongst brain trust like this, because I love your guys' opinions, as we're moving into this future where we can't believe what we see and what we hear anymore due to deep fakes, what is the unique identifier for a human individual?
[36:17-36:19]
The fourth chapter speculates on future identity verification methods, raising questions about the role of microchips.
Is it gonna be something like microchip?