Editor’s note: This article was written by Rita Ren, who is part of the organizing team of the Geekpwn AI/Robotics Cybersecurity Contest. A self-professed robotics geek, you’ll probably find her in a workshop rather than a shopping mall.
This article was supported by GeekPwn. We believe in transparency in our publishing and monetization model. Read more here.
Imagine a laboratory sieged by secret agents. It seems an unlikely target, but our protagonists are searching for weaknesses that would grant them entry. They can creep in through ventilation shafts, dodge laser alarms, block surveillance cameras, and open safes. This scene seems to be a well-designed operation reserved for something out of a spy film.
Start your free trial now.
Get instant access to all our premium content, archives, newsletters, and online community.
Monthly Membership
Yearly Membership
What you get
Full access to all premium content and our full archives
Members'-only newsletters
Preferential access and discounts to all TechNode events
Direct access to the TechNode newsroom
Start your free trial now.
Get instant access to all our premium content, archives, newsletters, and online community.