Skip to main content

Can microchips in your body be used to track you?

The short answer: No. 

The long answer: The microchips you're familiar with cannot have a range long enough to track someone. To be close enough to be in range, you'd be in physical up-close range of a few feet. Unless you have noticed strangers invading your personal space to get within less than 3 feet of you and scanning a particular part of your body, I wouldn't worry about it. 

Let's talk about those chips, except now since it's in a body; implants. Typically they are NFC or RFID frequencies. I'd like to reference you to a hobbyist manufacturer Dangerous Things who have summed up nicely why one would want to use these frequencies in body. 

The chips that are used in the human body use the frequencies because they are short range, and do not require any power to be read. The reader which scans the chip powers the chip enough to read it, and it does not require any power itself or any charging. The antennas in the chips cannot send or receive signal unless they are receiving the power. Thus, you'd have to have your hand on or within inches of a reader for the chip to function at all. 

Common applications of RFID cards are access cards for buildings and hotels, which are the same type used in the implants explained above. These are either 143.2kHz or 13.56MHz and have a range of 4 inches to 3 feet respectively. These ranges are if the implant is not interferred with in anyway, which is not the case once it's in the human body. Frequently for the implants to scan, they need to be within inches. 

If you're looking for RFID that can track people, you're looking for Active RFID, which is 433 MHz and can be read over 800 meters away. There's also 5.7GHz and 2.4 GHz RFID frequencies, but these only get about 20 meters away. In order for these to work, they must be actively powered. The antennas in the tag need enough power to broadcast that far, and thus need a built in battery pack in order to operate. They cannot be placed in the human body and are often too large to be placed on someone without noticing. However, they are used to track consenting people; patients in a health care facilities. These tags are badges that can be worn on lanyards, and easily removed. They are temporary objects, like a key, and can be dropped at anytime. 

Even if for some reason you believe you have microchips inside of you placed there without your consent, the ability for those to be used without you noticing is incredibly small. Critically address the usability of the conspiracy of being microchipped against your will. Some people choice to integrate technology into their bodies, and just because it is misunderstood does not make it evil or a complex theory of domination - it's just someone's door key. 


Popular posts from this blog

Can I re-magnetize my sensory magnets?

Magnets. I've had sensory magnets installed since November 2016. I bought the magnets and had them installed by Steve Haworth. As of July 2020, you can now buy his magnets for installation elsewhere. Since then I have been able to notice some key differences, and in 2018 started to notice sensory loss. I have a very large magnet at home, which before was impossible to touch, and now I can rest my right magnet on it.  While this is a brief post, I am posting my intention to remagnetise the magnets. I've attempted and gave this up previously, because the process is uncomfortable. However, I must do it in order to keep the magnetic sense.  I'm using different sized magnets to move the sensory magnets in my finger to strengthen them and break down some of the scar tissue in my finger to let them move freely.  Reps.  This  is the big magnet I'm using. I found there's two different things I'm trying 1. Running my fin

Can you hack a security checkpoint metal detector? Yeah, we already did.

To get straight to the point - walkthrough metal detectors are a security technology to attempt to detect and thus remove weapons and dangerous items from individuals to make a safe space. What if they were much more fallible than expected?  I'm not here to fear-monger either - these problems are preventable with proper use and changed in guidelines. Like many security controls, their exploitation is commonly due to those who implement and monitor them. However, in order to create these changes, more proof-of-concepts and solutions need to be tested. We already have a few to start.  The walkthrough metal detector (WTMD) research was not my original idea. It started out of research projects from  PHSI  and another Garrett 6500i was donated to our lab. This machine was not ours and we did not have permission to modify or conduct digital attacks on the detector. We were supposed to use physical modifications to hide or modify the results of the screening.  One colleague in particular

Don't use that APK site!

  A whileback, Brock and I were impatiently waiting for WiGLE's beta app update. It was was WiGLE just added bluetooth to their platform and it was a big move for us (was that like, 2 years ago?). I went to get the app from WiGLE, but Brock simply google'd the app and downloaded it. I was unsure how this page was already a google result, and he showed me he downloaded it from another apk site. When I objected, he didn't understand. I explained the dangers Rogue Apps present, but also, I then downloaded it anyway to see if my concerns were justified on an old-lab-phone.  Rogue applications are those which are not created and published by the developer. In general, rogue apps are an Android centered issues (and FireOS - ketchup; fancy ketchup). Back in 2018, RSA published a white paper in which 28% of online fraud were rogue apps , and has seen a 300% surge in 2019.  Before discussing what's wrong with rogue apps, let's use an example: Instagram's legitimate And