SlideShare a Scribd company logo
1 of 32
BioHackingBioHacking
–– Do It Yourself BiologyDo It Yourself Biology
RAHUL M. PRATHAPRAHUL M. PRATHAP
S1S1 M.Sc BioinformaticsM.Sc Bioinformatics
National College, ManacaudNational College, Manacaud
● BioHacking implies a Positive Purpose.
● Biohacking belongs to a ‘hacker ethic’ that
is based on positive principles, such as
universal access to information and general
quality of life improvement.
What is BioHacking ?What is BioHacking ?

Biohacking refers to the application ofBiohacking refers to the application of
IT hacks to biological systems, byIT hacks to biological systems, by
altering or enhancing the naturalaltering or enhancing the natural
condition of most prominently, thecondition of most prominently, the
human body – but also the entirehuman body – but also the entire
biosphere.biosphere.

‘‘Biohacking’Biohacking’ can also refer tocan also refer to
managing one's own biology using amanaging one's own biology using a
combination of medical, nutritionalcombination of medical, nutritional
and electronic techniques.
Who are Biohackers ?Who are Biohackers ?

They include both unprofessional and professionalThey include both unprofessional and professional
scientists who believes in hacking themselves withscientists who believes in hacking themselves with
technology & hardware (Grinders)technology & hardware (Grinders)

or who believes in making tools and resourcesor who believes in making tools and resources
available to anyone by using blogs and forums (DIYavailable to anyone by using blogs and forums (DIY
Biohackers)Biohackers)
Biohackers at VHS- VancouverBiohackers at VHS- Vancouver
Hack Space (Canada) working onHack Space (Canada) working on
EEG (Electroencephalography) andEEG (Electroencephalography) and
BCI (Brain-computer Interfaces).BCI (Brain-computer Interfaces).

Biohackers believe in experience-basedBiohackers believe in experience-based
learning. Or in plainer terms… they like to touchlearning. Or in plainer terms… they like to touch
stuff.stuff.

““If you don’t try it, how do you know it works?”If you don’t try it, how do you know it works?”

They make Biology access to everyone andThey make Biology access to everyone and
thus stimulate innovation !!thus stimulate innovation !!
Types of Biohacking
1.1.
Body or Mind HackingBody or Mind Hacking
What you put into your body has anWhat you put into your body has an
ENORMOUS impact on how you feel.ENORMOUS impact on how you feel.
Quantified SelfQuantified Self
● also known as Lifelogging
● It is started by Gary Wolf and Kevin Kelly of Wired
magazine
● It tries to incorporate technology into data acquisition on
aspects of a person's daily life such as data in terms of
1. Food consumed
2. Quality of surrounding air
3. Mood
4. Skin conductance as a proxy for arousal
5. Pulse oximetry for blood oxygen level
6. Performance - mental or physical activity
7. Caloric intake
8. Sleep quality
9. Posture and other factors involved in personal well-being
Quantified self is also being used to improve personal or professional productivity,Quantified self is also being used to improve personal or professional productivity,
with tools and services being used to help people keep track of what they do duringwith tools and services being used to help people keep track of what they do during
the workday, where they spend their time, and who they interact with.the workday, where they spend their time, and who they interact with.
Gary Wolf
““Self-knowledge through self-tracking with technology”Self-knowledge through self-tracking with technology”
People choose to wear self-monitoring andPeople choose to wear self-monitoring and
self-sensing sensors (e.g. EEG, ECG) and wearableself-sensing sensors (e.g. EEG, ECG) and wearable
computing to collect data.computing to collect data.
Personal trainer 2.0Personal trainer 2.0

Ben Greenfield is a fitness coach who uses biohacking methods toBen Greenfield is a fitness coach who uses biohacking methods to
take his and his clients’ health to the next level.take his and his clients’ health to the next level.

To boost performances he uses neurostimulation, which deliversTo boost performances he uses neurostimulation, which delivers
low current to specific areas of the brain and can also be effectivelow current to specific areas of the brain and can also be effective
against depression.against depression.

He coached topHe coached top
tier triathlontier triathlon
athletes toathletes to
enhance theirenhance their
bodies through abodies through a
unique nutritionunique nutrition
plan and coldplan and cold
thermogenesis,thermogenesis,
so they couldso they could
achieve incredibleachieve incredible
performances inperformances in
short time.short time.
2.2.
3D Bio-Printing3D Bio-Printing
Three-Dimensional Bio-printingThree-Dimensional Bio-printing

It is the utilization of 3D printing and 3DIt is the utilization of 3D printing and 3D
printing–like techniques to combine cells,printing–like techniques to combine cells,
growth factors, and biomaterials to fabricategrowth factors, and biomaterials to fabricate
biomedical parts that maximally imitate naturalbiomedical parts that maximally imitate natural
tissue characteristics.tissue characteristics.

It utilizes the layer-by-layer method to depositIt utilizes the layer-by-layer method to deposit
materials known asmaterials known as BioinksBioinks to create tissue-to create tissue-
like structures that are later used in medicallike structures that are later used in medical
and tissue engineering fields.and tissue engineering fields.

Currently, bioprinting can be used to printCurrently, bioprinting can be used to print
tissues and organs to help research drugs andtissues and organs to help research drugs and
pills.pills.
3D Bio-printing follows 3 steps..3D Bio-printing follows 3 steps..
1. Pre-bioprinting - Process1. Pre-bioprinting - Process
of creating a 2D images ofof creating a 2D images of
the model and are sent tothe model and are sent to
the printer.the printer.
2. Bioprinting - The liquid2. Bioprinting - The liquid
mixture of cells, matrix, andmixture of cells, matrix, and
nutrients known as Bioinksnutrients known as Bioinks
are placed in a printerare placed in a printer
cartridge and depositedcartridge and deposited
using the patients' medicalusing the patients' medical
scans. These cells whichscans. These cells which
are grown in the incubatorare grown in the incubator
will mature into tissues.will mature into tissues.
3. Post-bioprinting – It is necessary to create a stable structure from3. Post-bioprinting – It is necessary to create a stable structure from
the biological material by providing both mechanical and chemicalthe biological material by providing both mechanical and chemical
stimulations such as nutrient transport, microgravity environments, orstimulations such as nutrient transport, microgravity environments, or
changing the pressurechanging the pressure
3.3.
DNA / RNA HackingDNA / RNA Hacking
Gene editing / Genome editingGene editing / Genome editing

It is a group of technologies that give scientistsIt is a group of technologies that give scientists
the ability to change an organism's DNA.the ability to change an organism's DNA.

This allows genetic material to be added,This allows genetic material to be added,
removed, or altered at particular locations in theremoved, or altered at particular locations in the
genome.genome.

A recent approach is known asA recent approach is known as CRISPR-Cas9CRISPR-Cas9,,
which is short forwhich is short for CLUSTERED REGULARLYCLUSTERED REGULARLY
INTERSPACED SHORT PALINDROMICINTERSPACED SHORT PALINDROMIC
REPEATSREPEATS and CRISPR-associated protein 9.and CRISPR-associated protein 9.

This technique is faster, cheaper, moreThis technique is faster, cheaper, more
accurate, and more efficient than other existingaccurate, and more efficient than other existing
4.4.
DIY GrindingDIY Grinding
GrindersGrinders

Grinders are people who apply the hacker ethicGrinders are people who apply the hacker ethic
to improve their own bodies with do-it-yourselfto improve their own bodies with do-it-yourself
cybernetic devices.cybernetic devices.

Grinders practice functional extreme bodyGrinders practice functional extreme body
modification in an effort to improve the humanmodification in an effort to improve the human
condition.condition.

Grinders hack themselves with electronicGrinders hack themselves with electronic
hardware to extend and improve humanhardware to extend and improve human
capacities. Grinders believe in action, theircapacities. Grinders believe in action, their
bodies the experiment.bodies the experiment.
Sixth SenseSixth Sense

A group of biohackers haveA group of biohackers have
implanted small magnets inimplanted small magnets in
their fingers’ nerves so thattheir fingers’ nerves so that
they could feel thingsthey could feel things
completely invisible to most.completely invisible to most.

The brain processes theThe brain processes the
new information as a sixthnew information as a sixth
sense and allows them tosense and allows them to
feel electric and magneticfeel electric and magnetic
fields.fields.

They are able to feel the liveThey are able to feel the live
wires versus the dead wires andwires versus the dead wires and
they can also feel the securitythey can also feel the security
gates and they pass through ingates and they pass through in
stores or at the airport.stores or at the airport.
Some cool Biohack projects you should knowSome cool Biohack projects you should know
about....about....
NightvisionNightvision

A group of biohackers have developed eye drops with a substanceA group of biohackers have developed eye drops with a substance
found in deep-sea called Ce6found in deep-sea called Ce6

This substance is used in cancer treatment and to treat night blindnessThis substance is used in cancer treatment and to treat night blindness
in people with degenerative eye diseases.in people with degenerative eye diseases.

Gabriel Licina injected it in his eyes to acheive night vision and he canGabriel Licina injected it in his eyes to acheive night vision and he can
now see objects 160ft (50 m) away in dark field.now see objects 160ft (50 m) away in dark field.
Bullet proofBullet proof

Dave Asprey has sentDave Asprey has sent
over $300,000 over theover $300,000 over the
past 15 years hacking hispast 15 years hacking his
own biology to lose 100own biology to lose 100
pounds and improve hispounds and improve his
IQ score.IQ score.

He is most famous for his ‘Bullet proof’He is most famous for his ‘Bullet proof’
coffee a toxin-free coffee which, mixedcoffee a toxin-free coffee which, mixed
with butter and MCT oil, can boostwith butter and MCT oil, can boost
your performance.your performance.

He also runs an annual biohackingHe also runs an annual biohacking
conference at an entrance fee $1,599conference at an entrance fee $1,599
to present his newest experiments,to present his newest experiments,
including methods to lower biologicalincluding methods to lower biological
age.age.
Circadia 1.0Circadia 1.0

Transhumanist TimTranshumanist Tim
Cannon is the firstCannon is the first
known human toknown human to
implant a chipimplant a chip
transmittingtransmitting
biometrical data tobiometrical data to
an android device.an android device.

The large chip was implantedThe large chip was implanted
without anesthesia and is chargedwithout anesthesia and is charged
wirelessly. Texts from your phonewirelessly. Texts from your phone
can be displayed via LED throughcan be displayed via LED through
your skin.your skin.

Text messages are sent if the bodyText messages are sent if the body
reaches 100* F ( 38*C) and medicalreaches 100* F ( 38*C) and medical
data is stored in the device allowingdata is stored in the device allowing
Cannon to track his health with hisCannon to track his health with his
phone.phone.
Age killingAge killing

Dr. Aubrey De Grey believes theDr. Aubrey De Grey believes the
first person who will live to befirst person who will live to be
1,000 is already alive today, as1,000 is already alive today, as
we are on the cusp of a biologicalwe are on the cusp of a biological
revolution.revolution.

His model of gerentology is builtHis model of gerentology is built
on the principle that everyon the principle that every
metabolic reaction can bemetabolic reaction can be
described within just sevendescribed within just seven
categories.categories.

These ‘seven deadly things’These ‘seven deadly things’
constitute all pathological effectsconstitute all pathological effects
of aging and scientists are nowof aging and scientists are now
able to control and repair each ofable to control and repair each of
these different types of damage.these different types of damage.

The therapy can take peopleThe therapy can take people
aged 60 and rejuvinate themaged 60 and rejuvinate them
thorougly enough so they won’tthorougly enough so they won’t
be biologically 60 again until theybe biologically 60 again until they
are chronologically 90.are chronologically 90.
Upload your ConsciousnessUpload your Consciousness

In 2013, physicist StephanIn 2013, physicist Stephan
Hawking explained the brain isHawking explained the brain is
like a program in the mind,like a program in the mind,
which is like a computer. So it’swhich is like a computer. So it’s
theoretically possible to copytheoretically possible to copy
the brain onto a computer andthe brain onto a computer and
so provide a form of life afterso provide a form of life after
death.death.

Many biohackers claim thatMany biohackers claim that
with quantum computers it’swith quantum computers it’s
possible to have a map of allpossible to have a map of all
neurons and their connectionsneurons and their connections
and then artificially activateand then artificially activate
groups of neurons to basicallygroups of neurons to basically
have the copy of a person’shave the copy of a person’s
brain thus maybe transfer it tobrain thus maybe transfer it to
another body.another body.
Human EnergyHuman Energy

Industrial designer Naomi Kizhner has developed aIndustrial designer Naomi Kizhner has developed a
concept for a jewellery collection that converts kineticconcept for a jewellery collection that converts kinetic
energy from the body into electricity.energy from the body into electricity.

In response to the world’s energy crysis, she explored theIn response to the world’s energy crysis, she explored the
post-humanistic approach that sees the human body aspost-humanistic approach that sees the human body as
resource.resource.

This piece can harvest energy from blood flow and fromThis piece can harvest energy from blood flow and from
the electric pulses sent by the neurological system throughthe electric pulses sent by the neurological system through
the wearer’s spine.the wearer’s spine.

Other physiologicalOther physiological
functions can also be usedfunctions can also be used
to produce energy, whichto produce energy, which
would be infinite as long aswould be infinite as long as
we live meaning thatwe live meaning that
reaching a form ofreaching a form of
immortality would alsoimmortality would also
provide infinite renewableprovide infinite renewable
energy for our needs if theenergy for our needs if the
concept is developed.concept is developed.
Aftermath of BiohackingAftermath of Biohacking
Biohacking
Body/MindBody/Mind
HackingHacking
3D Bio-printing3D Bio-printing DNA/RNADNA/RNA
HackingHacking
DIY GrindingDIY Grinding
QS /QS /
Quantified-Quantified-
SelfSelf
Life enhancement & LifeLife enhancement & Life
extensionextension
TheThe
SingularitySingularity
TranshumanismTranshumanism
Potential issues & concernsPotential issues & concerns

Fear of terrorism with Biowarfare.Fear of terrorism with Biowarfare.

DIY Biohackers may decrease the demand forDIY Biohackers may decrease the demand for
professional scientistsprofessional scientists

Add to consumerism and capitalismAdd to consumerism and capitalism

As more scientific materials and resourcesAs more scientific materials and resources
become available as open-source, individualsbecome available as open-source, individuals
willl be able to create toxins, agents andwilll be able to create toxins, agents and
bioweopons.bioweopons.
How you can become aHow you can become a ‘Biohacker’‘Biohacker’ ??
BioHacking - Do It Yourself Biology
BioHacking - Do It Yourself Biology

More Related Content

What's hot

Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt9440999171
 
Ai in healthcare
Ai in healthcareAi in healthcare
Ai in healthcaremuskannn
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPTVijay Mehta
 
Timeline of Brain-computer interfaces
Timeline of Brain-computer interfacesTimeline of Brain-computer interfaces
Timeline of Brain-computer interfacesJet Flavell
 
AI in Healthcare: Defining New Health
AI in Healthcare: Defining New HealthAI in Healthcare: Defining New Health
AI in Healthcare: Defining New HealthKumaraguru Veerasamy
 
Securing the Healthcare Industry : Implantable Medical Devices
Securing the Healthcare Industry : Implantable Medical DevicesSecuring the Healthcare Industry : Implantable Medical Devices
Securing the Healthcare Industry : Implantable Medical DevicesTandhy Simanjuntak
 
Artificial intelligence in healthcare
Artificial intelligence in healthcareArtificial intelligence in healthcare
Artificial intelligence in healthcare121Omkar
 
Prediction of Heart Disease using Machine Learning Algorithms: A Survey
Prediction of Heart Disease using Machine Learning Algorithms: A SurveyPrediction of Heart Disease using Machine Learning Algorithms: A Survey
Prediction of Heart Disease using Machine Learning Algorithms: A Surveyrahulmonikasharma
 
Computers and medicine
Computers and medicine Computers and medicine
Computers and medicine mashiatmimosa
 
Seminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONSeminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONArhind Gautam
 
Artificial intelligence in Health
Artificial intelligence in HealthArtificial intelligence in Health
Artificial intelligence in HealthKajolDahal1
 
A STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTION
A STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTIONA STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTION
A STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTIONGarima Taneja
 
Bioethics
BioethicsBioethics
Bioethicsmjadair
 
ARTIFICIAL INTELLIGENCE.PPT
ARTIFICIAL INTELLIGENCE.PPTARTIFICIAL INTELLIGENCE.PPT
ARTIFICIAL INTELLIGENCE.PPTvandana gandhi
 

What's hot (20)

Brain chips ppt
Brain chips pptBrain chips ppt
Brain chips ppt
 
ARTIFICIAL INTELLIGENCE ROLE IN HEALTH CARE Dr.T.V.Rao MD
ARTIFICIAL INTELLIGENCE ROLE IN HEALTH CARE  Dr.T.V.Rao MDARTIFICIAL INTELLIGENCE ROLE IN HEALTH CARE  Dr.T.V.Rao MD
ARTIFICIAL INTELLIGENCE ROLE IN HEALTH CARE Dr.T.V.Rao MD
 
Ai in healthcare
Ai in healthcareAi in healthcare
Ai in healthcare
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 
brain computer-interfaces PPT
 brain computer-interfaces PPT brain computer-interfaces PPT
brain computer-interfaces PPT
 
Timeline of Brain-computer interfaces
Timeline of Brain-computer interfacesTimeline of Brain-computer interfaces
Timeline of Brain-computer interfaces
 
AI in Healthcare: Defining New Health
AI in Healthcare: Defining New HealthAI in Healthcare: Defining New Health
AI in Healthcare: Defining New Health
 
Securing the Healthcare Industry : Implantable Medical Devices
Securing the Healthcare Industry : Implantable Medical DevicesSecuring the Healthcare Industry : Implantable Medical Devices
Securing the Healthcare Industry : Implantable Medical Devices
 
Artificial intelligence in healthcare
Artificial intelligence in healthcareArtificial intelligence in healthcare
Artificial intelligence in healthcare
 
Prediction of Heart Disease using Machine Learning Algorithms: A Survey
Prediction of Heart Disease using Machine Learning Algorithms: A SurveyPrediction of Heart Disease using Machine Learning Algorithms: A Survey
Prediction of Heart Disease using Machine Learning Algorithms: A Survey
 
Computers and medicine
Computers and medicine Computers and medicine
Computers and medicine
 
Seminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTIONSeminar report SMART HEALTH PREDICTION
Seminar report SMART HEALTH PREDICTION
 
Ai in healthcare (3)
Ai in healthcare (3)Ai in healthcare (3)
Ai in healthcare (3)
 
Brain chip
Brain chipBrain chip
Brain chip
 
Artificial intelligence in Health
Artificial intelligence in HealthArtificial intelligence in Health
Artificial intelligence in Health
 
A STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTION
A STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTIONA STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTION
A STATISTICAL STUDY ON THE TRENDS OF FAST FOOD CONSUMPTION
 
AI in Practice for Healthcare
AI in Practice for Healthcare AI in Practice for Healthcare
AI in Practice for Healthcare
 
History of AI
History of AIHistory of AI
History of AI
 
Bioethics
BioethicsBioethics
Bioethics
 
ARTIFICIAL INTELLIGENCE.PPT
ARTIFICIAL INTELLIGENCE.PPTARTIFICIAL INTELLIGENCE.PPT
ARTIFICIAL INTELLIGENCE.PPT
 

Similar to BioHacking - Do It Yourself Biology

Zyto course project final
Zyto course project finalZyto course project final
Zyto course project finalstephenjames716
 
The Quantified Self: From Idiosyncratic Hobby to an Emerging Growth Industry
The Quantified Self: From Idiosyncratic Hobby to an Emerging Growth IndustryThe Quantified Self: From Idiosyncratic Hobby to an Emerging Growth Industry
The Quantified Self: From Idiosyncratic Hobby to an Emerging Growth IndustryLarry Smarr
 
Medical applications of biotech
Medical applications of biotechMedical applications of biotech
Medical applications of biotechanita devi
 
Will the Quantified Self Movement Disrupt Healthcare?
Will the Quantified Self Movement Disrupt Healthcare?Will the Quantified Self Movement Disrupt Healthcare?
Will the Quantified Self Movement Disrupt Healthcare?Larry Smarr
 
Will the Quantified-Self Movement Disrupt Healthcare
Will the Quantified-Self Movement Disrupt HealthcareWill the Quantified-Self Movement Disrupt Healthcare
Will the Quantified-Self Movement Disrupt HealthcareLarry Smarr
 
☛ Ultrawellness Health Care Paradigm Presentation
☛ Ultrawellness Health Care Paradigm Presentation☛ Ultrawellness Health Care Paradigm Presentation
☛ Ultrawellness Health Care Paradigm PresentationD. R. Arthur
 
What is biophysics brochure
What is biophysics brochureWhat is biophysics brochure
What is biophysics brochureMehdi Felfli
 
Biohacking; Everything you need to know.pdf
Biohacking; Everything you need to know.pdfBiohacking; Everything you need to know.pdf
Biohacking; Everything you need to know.pdfaditi agarwal
 
Biochip Informatics Technology For Electronic & Communication Engineering
Biochip Informatics Technology For Electronic & Communication EngineeringBiochip Informatics Technology For Electronic & Communication Engineering
Biochip Informatics Technology For Electronic & Communication EngineeringNazakatHussain15
 
Invasion of the Body Hackers - by Norwegian Airlines - Tom Jenkins
Invasion of the Body Hackers -  by Norwegian Airlines - Tom JenkinsInvasion of the Body Hackers -  by Norwegian Airlines - Tom Jenkins
Invasion of the Body Hackers - by Norwegian Airlines - Tom JenkinsWesley King
 
Biohacker's Handbook.pdf
Biohacker's Handbook.pdfBiohacker's Handbook.pdf
Biohacker's Handbook.pdfFaiverDiaz1
 
Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①
Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①
Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①wycha
 
The Human Microbiome in Sports Performance and Health
The Human Microbiome in Sports Performance and HealthThe Human Microbiome in Sports Performance and Health
The Human Microbiome in Sports Performance and Healthctorgan
 
Final Presentation
Final PresentationFinal Presentation
Final PresentationEryn Perry
 
application_of_bioinformatics_in_various_fields.ppt
application_of_bioinformatics_in_various_fields.pptapplication_of_bioinformatics_in_various_fields.ppt
application_of_bioinformatics_in_various_fields.pptshankjunk
 

Similar to BioHacking - Do It Yourself Biology (20)

Zyto course project final
Zyto course project finalZyto course project final
Zyto course project final
 
Zyto course project
Zyto course projectZyto course project
Zyto course project
 
The Quantified Self: From Idiosyncratic Hobby to an Emerging Growth Industry
The Quantified Self: From Idiosyncratic Hobby to an Emerging Growth IndustryThe Quantified Self: From Idiosyncratic Hobby to an Emerging Growth Industry
The Quantified Self: From Idiosyncratic Hobby to an Emerging Growth Industry
 
Medical applications of biotech
Medical applications of biotechMedical applications of biotech
Medical applications of biotech
 
Will the Quantified Self Movement Disrupt Healthcare?
Will the Quantified Self Movement Disrupt Healthcare?Will the Quantified Self Movement Disrupt Healthcare?
Will the Quantified Self Movement Disrupt Healthcare?
 
Introductionto biotechnology
Introductionto biotechnologyIntroductionto biotechnology
Introductionto biotechnology
 
Will the Quantified-Self Movement Disrupt Healthcare
Will the Quantified-Self Movement Disrupt HealthcareWill the Quantified-Self Movement Disrupt Healthcare
Will the Quantified-Self Movement Disrupt Healthcare
 
Future of Wellness
Future of WellnessFuture of Wellness
Future of Wellness
 
☛ Ultrawellness Health Care Paradigm Presentation
☛ Ultrawellness Health Care Paradigm Presentation☛ Ultrawellness Health Care Paradigm Presentation
☛ Ultrawellness Health Care Paradigm Presentation
 
Notes on HyperWellbeing Summit
Notes on HyperWellbeing SummitNotes on HyperWellbeing Summit
Notes on HyperWellbeing Summit
 
Training
TrainingTraining
Training
 
What is biophysics brochure
What is biophysics brochureWhat is biophysics brochure
What is biophysics brochure
 
Biohacking; Everything you need to know.pdf
Biohacking; Everything you need to know.pdfBiohacking; Everything you need to know.pdf
Biohacking; Everything you need to know.pdf
 
Biochip Informatics Technology For Electronic & Communication Engineering
Biochip Informatics Technology For Electronic & Communication EngineeringBiochip Informatics Technology For Electronic & Communication Engineering
Biochip Informatics Technology For Electronic & Communication Engineering
 
Invasion of the Body Hackers - by Norwegian Airlines - Tom Jenkins
Invasion of the Body Hackers -  by Norwegian Airlines - Tom JenkinsInvasion of the Body Hackers -  by Norwegian Airlines - Tom Jenkins
Invasion of the Body Hackers - by Norwegian Airlines - Tom Jenkins
 
Biohacker's Handbook.pdf
Biohacker's Handbook.pdfBiohacker's Handbook.pdf
Biohacker's Handbook.pdf
 
Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①
Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①
Bible Matrix 5_29_Current & future IoB, Jesus might be armed with IoB_①
 
The Human Microbiome in Sports Performance and Health
The Human Microbiome in Sports Performance and HealthThe Human Microbiome in Sports Performance and Health
The Human Microbiome in Sports Performance and Health
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
application_of_bioinformatics_in_various_fields.ppt
application_of_bioinformatics_in_various_fields.pptapplication_of_bioinformatics_in_various_fields.ppt
application_of_bioinformatics_in_various_fields.ppt
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

BioHacking - Do It Yourself Biology

  • 1. BioHackingBioHacking –– Do It Yourself BiologyDo It Yourself Biology RAHUL M. PRATHAPRAHUL M. PRATHAP S1S1 M.Sc BioinformaticsM.Sc Bioinformatics National College, ManacaudNational College, Manacaud
  • 2. ● BioHacking implies a Positive Purpose. ● Biohacking belongs to a ‘hacker ethic’ that is based on positive principles, such as universal access to information and general quality of life improvement.
  • 3. What is BioHacking ?What is BioHacking ?  Biohacking refers to the application ofBiohacking refers to the application of IT hacks to biological systems, byIT hacks to biological systems, by altering or enhancing the naturalaltering or enhancing the natural condition of most prominently, thecondition of most prominently, the human body – but also the entirehuman body – but also the entire biosphere.biosphere.  ‘‘Biohacking’Biohacking’ can also refer tocan also refer to managing one's own biology using amanaging one's own biology using a combination of medical, nutritionalcombination of medical, nutritional and electronic techniques.
  • 4. Who are Biohackers ?Who are Biohackers ?  They include both unprofessional and professionalThey include both unprofessional and professional scientists who believes in hacking themselves withscientists who believes in hacking themselves with technology & hardware (Grinders)technology & hardware (Grinders)  or who believes in making tools and resourcesor who believes in making tools and resources available to anyone by using blogs and forums (DIYavailable to anyone by using blogs and forums (DIY Biohackers)Biohackers) Biohackers at VHS- VancouverBiohackers at VHS- Vancouver Hack Space (Canada) working onHack Space (Canada) working on EEG (Electroencephalography) andEEG (Electroencephalography) and BCI (Brain-computer Interfaces).BCI (Brain-computer Interfaces).
  • 5.  Biohackers believe in experience-basedBiohackers believe in experience-based learning. Or in plainer terms… they like to touchlearning. Or in plainer terms… they like to touch stuff.stuff.  ““If you don’t try it, how do you know it works?”If you don’t try it, how do you know it works?”  They make Biology access to everyone andThey make Biology access to everyone and thus stimulate innovation !!thus stimulate innovation !!
  • 7. 1.1. Body or Mind HackingBody or Mind Hacking
  • 8. What you put into your body has anWhat you put into your body has an ENORMOUS impact on how you feel.ENORMOUS impact on how you feel.
  • 9. Quantified SelfQuantified Self ● also known as Lifelogging ● It is started by Gary Wolf and Kevin Kelly of Wired magazine ● It tries to incorporate technology into data acquisition on aspects of a person's daily life such as data in terms of 1. Food consumed 2. Quality of surrounding air 3. Mood 4. Skin conductance as a proxy for arousal 5. Pulse oximetry for blood oxygen level 6. Performance - mental or physical activity 7. Caloric intake 8. Sleep quality 9. Posture and other factors involved in personal well-being Quantified self is also being used to improve personal or professional productivity,Quantified self is also being used to improve personal or professional productivity, with tools and services being used to help people keep track of what they do duringwith tools and services being used to help people keep track of what they do during the workday, where they spend their time, and who they interact with.the workday, where they spend their time, and who they interact with.
  • 10. Gary Wolf ““Self-knowledge through self-tracking with technology”Self-knowledge through self-tracking with technology” People choose to wear self-monitoring andPeople choose to wear self-monitoring and self-sensing sensors (e.g. EEG, ECG) and wearableself-sensing sensors (e.g. EEG, ECG) and wearable computing to collect data.computing to collect data.
  • 11. Personal trainer 2.0Personal trainer 2.0  Ben Greenfield is a fitness coach who uses biohacking methods toBen Greenfield is a fitness coach who uses biohacking methods to take his and his clients’ health to the next level.take his and his clients’ health to the next level.  To boost performances he uses neurostimulation, which deliversTo boost performances he uses neurostimulation, which delivers low current to specific areas of the brain and can also be effectivelow current to specific areas of the brain and can also be effective against depression.against depression.  He coached topHe coached top tier triathlontier triathlon athletes toathletes to enhance theirenhance their bodies through abodies through a unique nutritionunique nutrition plan and coldplan and cold thermogenesis,thermogenesis, so they couldso they could achieve incredibleachieve incredible performances inperformances in short time.short time.
  • 13. Three-Dimensional Bio-printingThree-Dimensional Bio-printing  It is the utilization of 3D printing and 3DIt is the utilization of 3D printing and 3D printing–like techniques to combine cells,printing–like techniques to combine cells, growth factors, and biomaterials to fabricategrowth factors, and biomaterials to fabricate biomedical parts that maximally imitate naturalbiomedical parts that maximally imitate natural tissue characteristics.tissue characteristics.  It utilizes the layer-by-layer method to depositIt utilizes the layer-by-layer method to deposit materials known asmaterials known as BioinksBioinks to create tissue-to create tissue- like structures that are later used in medicallike structures that are later used in medical and tissue engineering fields.and tissue engineering fields.  Currently, bioprinting can be used to printCurrently, bioprinting can be used to print tissues and organs to help research drugs andtissues and organs to help research drugs and pills.pills.
  • 14. 3D Bio-printing follows 3 steps..3D Bio-printing follows 3 steps.. 1. Pre-bioprinting - Process1. Pre-bioprinting - Process of creating a 2D images ofof creating a 2D images of the model and are sent tothe model and are sent to the printer.the printer. 2. Bioprinting - The liquid2. Bioprinting - The liquid mixture of cells, matrix, andmixture of cells, matrix, and nutrients known as Bioinksnutrients known as Bioinks are placed in a printerare placed in a printer cartridge and depositedcartridge and deposited using the patients' medicalusing the patients' medical scans. These cells whichscans. These cells which are grown in the incubatorare grown in the incubator will mature into tissues.will mature into tissues. 3. Post-bioprinting – It is necessary to create a stable structure from3. Post-bioprinting – It is necessary to create a stable structure from the biological material by providing both mechanical and chemicalthe biological material by providing both mechanical and chemical stimulations such as nutrient transport, microgravity environments, orstimulations such as nutrient transport, microgravity environments, or changing the pressurechanging the pressure
  • 15. 3.3. DNA / RNA HackingDNA / RNA Hacking
  • 16. Gene editing / Genome editingGene editing / Genome editing  It is a group of technologies that give scientistsIt is a group of technologies that give scientists the ability to change an organism's DNA.the ability to change an organism's DNA.  This allows genetic material to be added,This allows genetic material to be added, removed, or altered at particular locations in theremoved, or altered at particular locations in the genome.genome.  A recent approach is known asA recent approach is known as CRISPR-Cas9CRISPR-Cas9,, which is short forwhich is short for CLUSTERED REGULARLYCLUSTERED REGULARLY INTERSPACED SHORT PALINDROMICINTERSPACED SHORT PALINDROMIC REPEATSREPEATS and CRISPR-associated protein 9.and CRISPR-associated protein 9.  This technique is faster, cheaper, moreThis technique is faster, cheaper, more accurate, and more efficient than other existingaccurate, and more efficient than other existing
  • 17.
  • 19. GrindersGrinders  Grinders are people who apply the hacker ethicGrinders are people who apply the hacker ethic to improve their own bodies with do-it-yourselfto improve their own bodies with do-it-yourself cybernetic devices.cybernetic devices.  Grinders practice functional extreme bodyGrinders practice functional extreme body modification in an effort to improve the humanmodification in an effort to improve the human condition.condition.  Grinders hack themselves with electronicGrinders hack themselves with electronic hardware to extend and improve humanhardware to extend and improve human capacities. Grinders believe in action, theircapacities. Grinders believe in action, their bodies the experiment.bodies the experiment.
  • 20. Sixth SenseSixth Sense  A group of biohackers haveA group of biohackers have implanted small magnets inimplanted small magnets in their fingers’ nerves so thattheir fingers’ nerves so that they could feel thingsthey could feel things completely invisible to most.completely invisible to most.  The brain processes theThe brain processes the new information as a sixthnew information as a sixth sense and allows them tosense and allows them to feel electric and magneticfeel electric and magnetic fields.fields.  They are able to feel the liveThey are able to feel the live wires versus the dead wires andwires versus the dead wires and they can also feel the securitythey can also feel the security gates and they pass through ingates and they pass through in stores or at the airport.stores or at the airport.
  • 21. Some cool Biohack projects you should knowSome cool Biohack projects you should know about....about....
  • 22. NightvisionNightvision  A group of biohackers have developed eye drops with a substanceA group of biohackers have developed eye drops with a substance found in deep-sea called Ce6found in deep-sea called Ce6  This substance is used in cancer treatment and to treat night blindnessThis substance is used in cancer treatment and to treat night blindness in people with degenerative eye diseases.in people with degenerative eye diseases.  Gabriel Licina injected it in his eyes to acheive night vision and he canGabriel Licina injected it in his eyes to acheive night vision and he can now see objects 160ft (50 m) away in dark field.now see objects 160ft (50 m) away in dark field.
  • 23. Bullet proofBullet proof  Dave Asprey has sentDave Asprey has sent over $300,000 over theover $300,000 over the past 15 years hacking hispast 15 years hacking his own biology to lose 100own biology to lose 100 pounds and improve hispounds and improve his IQ score.IQ score.  He is most famous for his ‘Bullet proof’He is most famous for his ‘Bullet proof’ coffee a toxin-free coffee which, mixedcoffee a toxin-free coffee which, mixed with butter and MCT oil, can boostwith butter and MCT oil, can boost your performance.your performance.  He also runs an annual biohackingHe also runs an annual biohacking conference at an entrance fee $1,599conference at an entrance fee $1,599 to present his newest experiments,to present his newest experiments, including methods to lower biologicalincluding methods to lower biological age.age.
  • 24. Circadia 1.0Circadia 1.0  Transhumanist TimTranshumanist Tim Cannon is the firstCannon is the first known human toknown human to implant a chipimplant a chip transmittingtransmitting biometrical data tobiometrical data to an android device.an android device.  The large chip was implantedThe large chip was implanted without anesthesia and is chargedwithout anesthesia and is charged wirelessly. Texts from your phonewirelessly. Texts from your phone can be displayed via LED throughcan be displayed via LED through your skin.your skin.  Text messages are sent if the bodyText messages are sent if the body reaches 100* F ( 38*C) and medicalreaches 100* F ( 38*C) and medical data is stored in the device allowingdata is stored in the device allowing Cannon to track his health with hisCannon to track his health with his phone.phone.
  • 25. Age killingAge killing  Dr. Aubrey De Grey believes theDr. Aubrey De Grey believes the first person who will live to befirst person who will live to be 1,000 is already alive today, as1,000 is already alive today, as we are on the cusp of a biologicalwe are on the cusp of a biological revolution.revolution.  His model of gerentology is builtHis model of gerentology is built on the principle that everyon the principle that every metabolic reaction can bemetabolic reaction can be described within just sevendescribed within just seven categories.categories.  These ‘seven deadly things’These ‘seven deadly things’ constitute all pathological effectsconstitute all pathological effects of aging and scientists are nowof aging and scientists are now able to control and repair each ofable to control and repair each of these different types of damage.these different types of damage.  The therapy can take peopleThe therapy can take people aged 60 and rejuvinate themaged 60 and rejuvinate them thorougly enough so they won’tthorougly enough so they won’t be biologically 60 again until theybe biologically 60 again until they are chronologically 90.are chronologically 90.
  • 26. Upload your ConsciousnessUpload your Consciousness  In 2013, physicist StephanIn 2013, physicist Stephan Hawking explained the brain isHawking explained the brain is like a program in the mind,like a program in the mind, which is like a computer. So it’swhich is like a computer. So it’s theoretically possible to copytheoretically possible to copy the brain onto a computer andthe brain onto a computer and so provide a form of life afterso provide a form of life after death.death.  Many biohackers claim thatMany biohackers claim that with quantum computers it’swith quantum computers it’s possible to have a map of allpossible to have a map of all neurons and their connectionsneurons and their connections and then artificially activateand then artificially activate groups of neurons to basicallygroups of neurons to basically have the copy of a person’shave the copy of a person’s brain thus maybe transfer it tobrain thus maybe transfer it to another body.another body.
  • 27. Human EnergyHuman Energy  Industrial designer Naomi Kizhner has developed aIndustrial designer Naomi Kizhner has developed a concept for a jewellery collection that converts kineticconcept for a jewellery collection that converts kinetic energy from the body into electricity.energy from the body into electricity.  In response to the world’s energy crysis, she explored theIn response to the world’s energy crysis, she explored the post-humanistic approach that sees the human body aspost-humanistic approach that sees the human body as resource.resource.  This piece can harvest energy from blood flow and fromThis piece can harvest energy from blood flow and from the electric pulses sent by the neurological system throughthe electric pulses sent by the neurological system through the wearer’s spine.the wearer’s spine.  Other physiologicalOther physiological functions can also be usedfunctions can also be used to produce energy, whichto produce energy, which would be infinite as long aswould be infinite as long as we live meaning thatwe live meaning that reaching a form ofreaching a form of immortality would alsoimmortality would also provide infinite renewableprovide infinite renewable energy for our needs if theenergy for our needs if the concept is developed.concept is developed.
  • 28. Aftermath of BiohackingAftermath of Biohacking Biohacking Body/MindBody/Mind HackingHacking 3D Bio-printing3D Bio-printing DNA/RNADNA/RNA HackingHacking DIY GrindingDIY Grinding QS /QS / Quantified-Quantified- SelfSelf Life enhancement & LifeLife enhancement & Life extensionextension TheThe SingularitySingularity TranshumanismTranshumanism
  • 29. Potential issues & concernsPotential issues & concerns  Fear of terrorism with Biowarfare.Fear of terrorism with Biowarfare.  DIY Biohackers may decrease the demand forDIY Biohackers may decrease the demand for professional scientistsprofessional scientists  Add to consumerism and capitalismAdd to consumerism and capitalism  As more scientific materials and resourcesAs more scientific materials and resources become available as open-source, individualsbecome available as open-source, individuals willl be able to create toxins, agents andwilll be able to create toxins, agents and bioweopons.bioweopons.
  • 30. How you can become aHow you can become a ‘Biohacker’‘Biohacker’ ??