In the last 14 years since the human genome was first sequenced, DNA sequencing technology has advanced by leaps and bounds, both regarding increased speed and decreased costs. Previously, a sizeable biological sample (e.g. freshly-drawn blood) was required for good quality sequencing results. These days, companies like 23andme return result within weeks, using nothing more than a vial of human saliva.
Such easy access to biological data has encouraged the expansion of DNA sequencing applications beyond the traditional medical sectors, into predictive healthcare, and even cosmetics and personal wellness. This also means that data privacy concerns are now a challenge for both consumer and corporation alike.
Now, researchers at the University of Washington have successfully encoded malware into a DNA sequence, permitting a hostile compromise of the computer used to analyse the data. Their strategy used the nucleotide building blocks of DNA – A, T, C and G – to represent the 1s and 0s of computer programming language. The infected computer can then be controlled extrinsically, putting the data, and network itself, at risk.
By the researchers’ own admission, the hack itself is a relatively low risk as compared to other security concerns of the information age. However, it serves as an important proof of concept that everyday devices are one more portal through which our information may be stolen. This is food for thought in this highly connected IOT era. What do you think?
Link to the article may be found here: