[QUOTE]Research led by experts at Harvard University shows technology can be used to transmit information from one person's brain to another's even, as in this case, if they are thousands of miles away.
"It is kind of technological realization of the dream of telepathy, but it is definitely not magical," Giulio Ruffini, a theoretical physicist and co-author of the research, told AFP by phone from Barcelona.
[/QUOTE]
[URL="http://news.msn.com/science-technology/telepathy-experiment-sends-1st-mental-message"]source[/URL]
does anyone get the sense that this could be used to monitor our thoughts for those that use it?
[QUOTE=confinedUser;45925594]Does anyone get the sense that this could be used to monitor our thoughts for those that use it?[/QUOTE]
Maybe you could have some sort of encryption/decryption device in the telepathic headset? That said it'd need to be either very good or obscure so that the NSA has a very hard time snooping in.
I could either see the NSA having a field day with this or advertisements being tailored to what you think on sites that allow mental communication. You know, like what the hell happens today except with your brain.
[QUOTE]A pictures shows binary code reflected from a computer screen in a woman's eye on October 22, 2012.[/QUOTE]
What are they even trying to say here, this has nothing to do with the article.
It's nothing like telepathy in that you don't actually hear someone's voice. No-one's figured out how to inject information in the form of an electrical impulse yet, but they can stimulate your brain to "see" flashes of light, which turn on and off to display a binary code. A pretty awesome achievement, though.
[QUOTE=ironman17;45925604]Maybe you could have some sort of encryption/decryption device in the telepathic headset? That said it'd need to be either very good or obscure so that the NSA has a very hard time snooping in.[/QUOTE]
I imagine this will already use an error-correcting code (redundant information added on to avoid misinterpretation, e.g. a barcode). I think cryptographic code could be implemented fairly simply if the former is done.
It's not like the NSA does their spying by trying to break hashes or whatever. They can see everything and it doesn't matter what encryption you use.
can someone sciency break down the "science" behind this because all i'm getting from this article is clickbait
Sorry, you need to Log In to post a reply to this thread.