Google Glass: Operating Room
The history books are quickly filling up with Google Glass firsts — everything from skydives,showers and, now, surgeries.
You read that right — Dr. Rafael Grossman, also a TEDx speaker and Google Glass Explorer, has used the wearable device to live-stream a surgery. The operation involved endoscopically inserting a feeding tube for a patient and, though he captured footage of the procedure, Grossman said he kept the patient's confidentiality intact.
In a post on his website entitled "OK Glass: Hand Me the Scalpel, Please," Grossman wrote:
“Not only I obtained informed consent about what we were going to attempt (and documented it), but most importantly, made sure that no recording or transmission of any identifying information was done.”
Recorded from Grossman's point of view, the surgical footage (now demarcated as "private" on YouTube) was transmitted to a Google hangout. Grossman said that his goal with the procedure was to show how the device and its platform could be used as intuitive, inexpensive tools to aid in surgical maneuvering and mentoring.
His conclusion? "Google Glass streaming during live surgery by a Glass Explorer surgeon is possible."
Google Glass cost $1,500 when the developer version was released earlier this year; the consumer version is expected to cost less. Watch the video above to learn more, and let us know what you think about the latest Glass endeavor in the comments below.
BONUS: A Look at Google Glass
Is It the Dawn of the Encryption App?
We might live in an age of persistent and pervasive surveillance. The recent revelations about the secret National Security Agency programs aimed at collecting vast amounts of data on Americans and foreigners seemingly confirm what tinfoil-wearing netizens have feared for years: They're watching us; technology has turned against its users.
Amidst prying eyes, a small but growing group of hackers and programmers is working on applications that use cryptography — the science of creating techniques to hide data and render it readable only to intended recipients — to fight surveillance and give regular citizens access to what was once only reserved to computer experts.
It's a battle of geek-made encryption apps against their uniformed snooping foes.
And the spying agencies of the world are getting more adversaries every day. In fact, there are so many apps it's almost impossible to list them all: Silent Circle, Cryptocat, Redphone,Text Secure, Wickr (which Mashable has previously reported on), Ostel, Gibberbot. The list goes on and on.
"These encryption apps could well be the first wave in an entirely new revolution — one that makes truly private communication a reality," writes Matthew Green, a cryptography researcher and professors at Johns Hopkins University Information Security Institute.
Both new and old faces are riding this new wave of crytpo.
One of the apps that has gathered more attention, Silent Circle, has a familiar face at the helm: longtime cryptographer Phillip Zimmermann, who created the popular email and data encryption software Pretty Good Privacy — better known as PGP — in the early 1990s.
Zimmermann and some of his closest collaborators from the PGP years launched Silent Circle last year. It's not just an app; it's a subscription service that comprises a suite of programs that replaces one's regular apps to make calls, send texts, emails and even do videoconferencing, for $10 a month. The apps use end-to-end encryption to ensure that the communication between two Silent Circle users is secure and impossible to read, except by their intended recipients.
The service biggest strength is that it's supposed to be easy to use, and since day one, its creators have had in mind the lessons of the past. While PGP is the gold standard to encrypt data, even after 20 years, it's still very hard to use for regular computer users. Now the idea is to make privacy-enhancing tools easy for everybody to use.
"Not everyone is a crypto geek, and so there is a need to curate the experience," says Zimmermann.
"Not everyone is a crypto geek, and so there is a need to curate the experience," says Zimmermann. "You know howSteve Jobs talks about curated computing? Well, this is curated crypto."
Vinnie Moscaritolo, Silent Circle's "distinguished member of technical staff," echoes the same concept, saying that they "intentionally make [Silent Circle] look like regular apps you use." Because the idea is that "you just sit down and you use it."
Its other big strength is that the keys, used to encrypt and decrypt the communications, aren't managed by Silent Circle itself. So technically, not even the company can know what two users are telling or writing each other. Silent Circle uses the so-called Public Key cryptography, a scheme that allows two people to swap keys and communicate securely, preventing a snooper from interceptinging their communications. (To know more about how this works, watch the below video.)