• About Us
  • Careers
Digital Cloak
  • Services
        • Technical
        • Solution Architecture
          • Digital Engineering
          • Virtual Infrastructure
          • Software Engineering
        • Cybersecurity Support
          • Threat Modeling
          • Intrusion Detection/Prevention
          • Security Assessments
          • Continuity of Operations Planning
          • Risk Management
        • Business
        • Program/Project Management
        • Business/Technical Writing
        • Training
        • Digital Communications
          • Web Design
          • Photo & Video
          • Digital Marketing
          • Social Media
          • PR & Digital News
        • Security & Intel
        • Mission Assurance
        • Threat Fusion
        • Geospatial Intelligence Services
        • Cyber Threat Intelligence
  • Contracts
  • Industries
  • About Us
  • Careers
  • Contact
Select Page
DEF CON 25 – Tess Schrodinger – Total Recall Implanting Passwords in Cognitive Memory

DEF CON 25 – Tess Schrodinger – Total Recall Implanting Passwords in Cognitive Memory

by dcadmin | Oct 26, 2022 | Community, Insights

What is cognitive memory? How can you “implant” a password into it? Is this truly secure? Curiosity around these questions prompted exploration of the research and concepts surrounding the idea of making the authentication process more secure by implanting...

Recent Posts

  • DEF CON 25 – Tess Schrodinger – Total Recall Implanting Passwords in Cognitive Memory
  • Winner of The Def Con 22 Artwork Contest!

Work With Us

Think we can help you? Send us a note!

Get Started

Digital Cloak

About Us

Join Our Team

Terms & Conditions

Privacy Policy (US)

Privacy Policy (CA)

Privacy Policy (EU)

Privacy Policy (UK)

Privacy Policy (AU)

Cookie Policy (US)

Cookie Policy (CA)

Cookie Policy (EU)

Cookie Policy (UK)

Cookie Policy (AU)

Accessibility Statement

Site Map

Technical

Digital Engineering

Virtual Infrastructure

Software Engineering

Cybersecurity Support

Business

Program/Project Management

Business/Technical Writing

Training

Digital Communications

Security & Intelligence

Mission Assurance

Threat Fusion

Geospatial Intelligence

Cyber Threat Intel

Industries Served

Defense

Homeland Security

Intelligence Community

Energy

Commercial

Corporate Office

800 Corporate Drive, Suite 421

Stafford, Virginia 22554

United States

Connect With Us

Tel: +01.540.288.4484

Email: [email protected]

  • Follow
© 2025 Digital Cloak, LLC
Manage Cookie Consent
We use technologies like cookies to store and/or access device information. We do this to improve browsing experience and to show personalized ads. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to optimize our website and your experience. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
  • Services
    • Solution Architecture
      • Digital Engineering
      • Virtual Infrastructure
      • Software Engineering
    • Cybersecurity Support
      • Threat Modeling
      • Intrusion Detection/Prevention
      • Security Assessments
      • Continuity of Operations Planning
      • Risk Management
    • Program/Project Management
    • Training
    • Business/Technical Writing
    • Digital Communications
      • Web Design
      • Photo & Video
      • Digital Marketing
      • Social Media
      • PR & Digital News
    • Mission Assurance
    • Threat Fusion
    • Geospatial Intelligence Services
    • Cyber Threat Intelligence
  • Contracts
  • Industries
  • About Us
  • Careers
  • Contact