Toggle light / dark theme

Jamie Metzl: Lab Leak Theory | Lex Fridman Podcast #247

Jamie Metzl is an author specializing in topics of genetic engineering, biotechnology, and geopolitics. Please support this podcast by checking out our sponsors:
- Mizzen+Main: https://mizzenandmain.com and use code LEX to get $35 off.
- NI: https://www.ni.com/perspectives.
- GiveDirectly: https://givedirectly.org/lex to get gift matched up to $300
- Indeed: https://indeed.com/lex to get $75 credit.
- Blinkist: https://blinkist.com/lex and use code LEX to get 25% off premium.

EPISODE LINKS:
Jamie’s Twitter: https://twitter.com/JamieMetzl.
Jamie’s Website: https://jamiemetzl.com/
Jamie’s lab leak blog post: https://jamiemetzl.com/origins-of-sars-cov-2/
Hacking Darwin (book): https://amzn.to/3lLqLsM

PODCAST INFO:
Podcast website: https://lexfridman.com/podcast.
Apple Podcasts: https://apple.co/2lwqZIr.
Spotify: https://spoti.fi/2nEwCF8
RSS: https://lexfridman.com/feed/podcast/
Full episodes playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOdP_8GztsuKi9nrraNbKKp4
Clips playlist: https://www.youtube.com/playlist?list=PLrAXtmErZgOeciFP3CBCIEElOJeitOr41

OUTLINE:
0:00 — Introduction.
1:27 — Lab leak.
1:00:01 — Gain-of-function research.
1:09:32 — Anthony Fauci.
1:19:14 — Francis Collins.
1:23:56 — Joe Rogan, Brett Weinstein, and Sam Harris.
1:53:53 — Xi Jinping.
2:08:24 — Patient Zero.
2:21:38 — WHO
2:45:28 — Government transparency.
3:07:28 — Likelihood of a cover-up.
3:09:16 — Future of reproduction.
3:44:55 — Jon Stewart.
3:50:14 — Joe Rogan and Sanjay Gupta.
4:15:19 — Ultramarathons.
4:25:21 — Chocolate.
4:33:34 — One Shared World.
4:48:37 — Hope for the future.

SOCIAL:
- Twitter: https://twitter.com/lexfridman.
- LinkedIn: https://www.linkedin.com/in/lexfridman.
- Facebook: https://www.facebook.com/lexfridman.
- Instagram: https://www.instagram.com/lexfridman.
- Medium: https://medium.com/@lexfridman.
- Reddit: https://reddit.com/r/lexfridman.
- Support on Patreon: https://www.patreon.com/lexfridman

Researchers Uncover New Coexistence Attacks On Wi-Fi and Bluetooth Chips

Cybersecurity researchers have demonstrated a new attack technique that makes it possible to leverage a device’s Bluetooth component to directly extract network passwords and manipulate traffic on a Wi-Fi chip, putting billions of electronic devices at risk of stealthy attacks.

The novel attacks work against the so-called “combo chips,” which are specialized chips that are equipped to handle different types of radio wave-based wireless communications, such as Wi-Fi, Bluetooth, and LTE.

“We provide empirical evidence that coexistence, i.e., the coordination of cross-technology wireless transmissions, is an unexplored attack surface,” a group of researchers from the Technical University of Darmstadt’s Secure Mobile Networking Lab and the University of Brescia said in a new paper.

Neural networks can hide malware, and scientists are worried

This article is part of our reviews of AI research papers, a series of posts that explore the latest findings in artificial intelligence.

With their millions and billions of numerical parameters, deep learning models can do many things: detect objects in photos, recognize speech, generate text—and hide malware. Neural networks can embed malicious payloads without triggering anti-malware software, researchers at the University of California, San Diego, and the University of Illinois have found.

Their malware-hiding technique, EvilModel, sheds light on the security concerns of deep learning, which has become a hot topic of discussion in machine learning and cybersecurity conferences. As deep learning becomes ingrained in applications we use every day, the security community needs to think about new ways to protect users against their emerging threats.

New Cyber Protections Against Stealthy “Logic Bombs” Targeting 3D Printed Drones, Prostheses and Medical Devices

Cyber attackers could target 3D printed objects in health care, aerospace, and other fields.

Cybersecurity researchers at Rutgers University-New Brunswick and the Georgia Institute of Technology have proposed new ways to protect 3D printed objects such as drones, prostheses, and medical devices from stealthy “logic bombs.”

The researchers will present their paper, titled “Physical Logic Bombs in 3D Printers via Emerging 4D Techniques,” at the 2021 Annual Computer Security Applications Conference on December 10, 2021.

/* */