{"id":2306,"date":"2026-05-04T23:19:22","date_gmt":"2026-05-05T02:19:22","guid":{"rendered":"https:\/\/securitybsides.com.br\/2026\/?page_id=2306"},"modified":"2026-05-05T08:28:33","modified_gmt":"2026-05-05T11:28:33","slug":"biohacking-village","status":"publish","type":"page","link":"https:\/\/securitybsides.com.br\/2026\/biohacking-village\/","title":{"rendered":"Biohacking Village"},"content":{"rendered":"\n<table id=\"tablepress-42\" class=\"tablepress tablepress-id-42 tbody-has-connected-cells\">\n<thead>\n<tr class=\"row-1\">\n\t<th class=\"column-1\"><center><strong>Hor\u00e1rio<\/strong><\/center><\/th><th class=\"column-2\"><center><strong>T\u00edtulo<\/strong><\/center><\/th><th class=\"column-3\"><center><strong>Descri\u00e7\u00e3o<\/strong><\/center><\/th><th class=\"column-4\"><center><strong>Palestrante<\/strong><\/center><\/th>\n<\/tr>\n<\/thead>\n<tbody class=\"row-striping row-hover\">\n<tr class=\"row-2\">\n\t<td class=\"column-1\"><center><strong>10:45<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Abertura<\/center><\/strong><\/td>\n<\/tr>\n<tr class=\"row-3\">\n\t<td class=\"column-1\"><center><strong>11:00<\/strong><\/center><\/td><td class=\"column-2\">Biohackers: Onde vivem? O que comem? Como se reproduzem? Domingo, na BSidesSP.<\/td><td class=\"column-3\">Biohacking como hobby e tamb\u00e9m objeto de estudo, suas principais vertentes, algumas possibilidades dentro do campo e desmistificar quest\u00f5es a respeito do assunto.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.instagram.com\/biohackingsp\" target=\"_blank\">Salom\u00e3o Santiago<\/a><\/td>\n<\/tr>\n<tr class=\"row-4\">\n\t<td class=\"column-1\"><center><strong>11:45<\/strong><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-5\">\n\t<td class=\"column-1\"><center><strong>12:25<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Almo\u00e7o<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-6\">\n\t<td class=\"column-1\"><center><strong>13:40<\/strong><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-7\">\n\t<td class=\"column-1\"><center><strong>14:25<\/strong><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-8\">\n\t<td class=\"column-1\"><center><strong>15:10<\/strong><\/center><\/td><td class=\"column-2\">Ozempic: um playground para scammers e data brokers<\/td><td class=\"column-3\">A popularidade de canetas emagrecedoras como Ozempic e Mounjaro explodiu nos \u00faltimos anos. Um mercado gigante surgiu ao redor dessa poss\u00edvel solu\u00e7\u00e3o para perda de peso, mas trouxe tamb\u00e9m um terreno f\u00e9rtil para fraudes digitais e marketing predat\u00f3rio.<br \/>\nAn\u00fancios falsos, campanhas de phishing e cl\u00ednicas fantasmas comp\u00f5e esquemas de coleta de dados m\u00e9dicos e identidades das v\u00edtimas.<br \/>\nEssa palestra apresenta an\u00e1lises de golpes sofridos por pacientes e pessoas que buscaram tais medicamentos, juntamente com a coleta de dados abusiva e estrat\u00e9gias utilizadas por grandes empresas para inferir compradores e seus comportamentos.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.instagram.com\/mattgtralli\" target=\"_blank\">Matheus &#8216;h4sh3r&#8217; Gaboardi<\/a><\/td>\n<\/tr>\n<tr class=\"row-9\">\n\t<td class=\"column-1\"><center><strong>15:50<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Intervalo<\/strong><\/center><\/td>\n<\/tr>\n<tr class=\"row-10\">\n\t<td class=\"column-1\"><center><strong>16:20<\/strong><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-11\">\n\t<td class=\"column-1\"><center><strong>17:05<\/strong><\/center><\/td><td class=\"column-2\">Tecnologia Inclusiva<\/td><td class=\"column-3\">Minha proposta \u00e9  falar sobre uso de gadgets NFC e uso de acess\u00f3rios para ajudar na identifica\u00e7\u00e3o de pessoas com necessidades especiais e idosos.  Farei demonstra\u00e7\u00f5es de uso de pulseiras, tags para leitura e orienta\u00e7\u00f5es uso de medicamentos, nfc para acessibilidade, conforto para pais e cuidadores.<\/td><td class=\"column-4\"><a href=\"https:\/\/www.linkedin.com\/in\/viviane-ramos-da-cruz\/\" target=\"_blank\">Vivi Cruz<\/a><\/td>\n<\/tr>\n<tr class=\"row-12\">\n\t<td class=\"column-1\"><center><strong>17:50<\/strong><\/center><\/td><td class=\"column-2\"><\/td><td class=\"column-3\"><\/td><td class=\"column-4\"><\/td>\n<\/tr>\n<tr class=\"row-13\">\n\t<td class=\"column-1\"><center><strong>18:30<\/strong><\/center><\/td><td colspan=\"3\" class=\"column-2\"><center><strong>Encerramento e sorteios<\/strong><\/center><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<!-- #tablepress-42 from cache -->","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"class_list":["post-2306","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/comments?post=2306"}],"version-history":[{"count":2,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2306\/revisions"}],"predecessor-version":[{"id":2373,"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/pages\/2306\/revisions\/2373"}],"wp:attachment":[{"href":"https:\/\/securitybsides.com.br\/2026\/wp-json\/wp\/v2\/media?parent=2306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}