Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Bionic Ears

Type
Audio
Tags
science
Authors
Helga Velroyen
Event
Chaos Communication Congress 28th (28C3) 2011
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/28C3/mp3-audio-only/28c3-4669-en-bionic_ears.mp3
File name
28c3-4669-en-bionic_ears.mp3
File size
28.3 MB
MD5
695591a721f1a4cb25fef777769c2074
SHA1
85c205cb31999e92feede4615ab97a83f6441a81

In many social situations being hearing impaired is a serious handicap, not only for elderly people. Today's hearing aids are tiny computers that do a decent job in signal processing. During the last years, the progress in this technology was significant, amongst other things by switching from analog to digital devices. Since this field becomes more and more related to computer technology, there is even more improvement to be expected. In particular, it turns into a more and more interesting playground for hackers. Unfortunately, we are still quite far away from what was promised as the future in that 70es TV series "The Bionic Woman" [1]. Starting with a brief introduction about audiology, I will present current technical solutions (and political non-solutions) for hearing aids. Besides the hearing aids themselves, there exist a couple of interesting peripheral solutions for specific situations such as using the phone, listening to concerts and talks, or just consuming music with an mp3 player. All these not only enhance the user's life, they also open the door for creative hacks. Although the hearing-aid hacking community is still rather small, I will present some current projects and ideas for future ones.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !