{"id":11060,"date":"2013-02-08T10:47:06","date_gmt":"2013-02-08T15:47:06","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/dna-data-security-and-you\/"},"modified":"2013-02-08T10:47:06","modified_gmt":"2013-02-08T15:47:06","slug":"dna-data-security-and-you","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/dna-data-security-and-you\/","title":{"rendered":"DNA Data, Security, and You"},"content":{"rendered":"<p><p>    One day youll be handed an electronic copy of your sequenced    genome on a flash drive, maybe a phone app. Youll need to know    how to keep it safe.  <\/p>\n<p>    Were hurtling towards a future in which our DNA data will be    cheaply generated and routinely summoned. Preparing for that, a    UC Irvine team has created an app that can store a digital copy    of a fully sequenced genome on a smartphone.  <\/p>\n<p>    This Android app,GeneDroid, can spit out the results of a    paternity test in under a second, Fierce Mobile Health Care    reported recently. (You can download a    version of that app, called Father Finder, from the Google Play store.)    Say you were on a first date, Gene Tsudik, one of the apps    architects has explained, You and the other person could hold up    your phones, exchange tiny amounts of encrypted information and    be able to determine how much common ancestry you have.  <\/p>\n<p>    GeneDroid could also be used in regular clinical settings: to    develop a genetically targeted treatment routine, or screen for    how likely you are to develop a disease. But GeneDroids    creators have found a way to encrypt the sensitive data so    genomic factoids can be securely accessed on-the-fly. When its    used for a certain kind of test, only a small amount of    relevant data is pulled up, decrypted and used for comparison,    New Scientist explains. The app itself    doesnt reveal any informationonly the results of the test.      <\/p>\n<p>    In this version of the future where were swapping genome    histories over coffee,its likely that questions about    privacy and security as applied to genetic data will leak into    the discussion.People who arent experts in genetics or    security will be curious about how their personal data stored    and kept secure: Who has access to their personal genome? What    can they do to keep it safe? Could you choose to share personal    genetic data with just your doctor but not others?(Of    course, researchers have beentackling the subjectfor years.)   <\/p>\n<p>    Many of us continue to ask similar questions of services like    Facebook, which also deals in a kind of personal data. Though    Facebook is easy to use, wading through its privacy and    security policies is harder. (Though, Facebook is trying to    make such information more accessible, through a redesign of its Help Center, by designating    a page for policy updates, and rolling out a    new feature called Ask Our CPO.)  <\/p>\n<p>    When we get to the point where we can store and swap genetic    data in as much time as it takes to snap and share a photo on    Instagram, well need security backup from tools like the    GeneDroid. Alongside that, well also need clear explanations    of how those safety measures operate and the limits to which    theyll protect our data. We carry around credit cards and use    them everywhere, even though theyre physical links to    sensitive and private financial informationbut most of us know    not to share our security code.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.technologyreview.com\/view\/510746\/dna-data-security-and-you\/\" title=\"DNA Data, Security, and You\">DNA Data, Security, and You<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> One day youll be handed an electronic copy of your sequenced genome on a flash drive, maybe a phone app. Youll need to know how to keep it safe <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/dna-data-security-and-you\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-11060","post","type-post","status-publish","format-standard","hentry","category-dna"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/11060"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=11060"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/11060\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=11060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=11060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=11060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}