Editor’s note: This article was written by Rita Ren, who is part of the organizing team of the Geekpwn AI/Robotics Cybersecurity Contest. A self-professed robotics geek, you’ll probably find her in a workshop rather than a shopping mall.

This article was supported by GeekPwn. We believe in transparency in our publishing and monetization model. Read more here.

Imagine a laboratory sieged by secret agents. It seems an unlikely target, but our protagonists are searching for weaknesses that would grant them entry. They can creep in through ventilation shafts, dodge laser alarms, block surveillance cameras, and open safes. This scene seems to be a well-designed operation reserved for something out of a spy film.

Start your free trial now.

Get instant access to all our premium content, archives, newsletters, and online community.

Monthly Membership

Yearly Membership

What you get

Full access to all premium content and our full archives

Members'-only newsletters

Preferential access and discounts to all TechNode events

Direct access to the TechNode newsroom

Start your free trial now.

Get instant access to all our premium content, archives, newsletters, and online community.

Monthly Membership

Yearly Membership

Guest Editor

TechNode Guest Editors represent the best our community has to offer: insight and perspective on how technology is affecting business and culture in China