Bridging Space and Medicine: Biohacking Village
This talk presents the implementation of holographic telepresence technology for remote medical support on the International Space Station. The speaker details the technical challenges of high-latency, low-bandwidth satellite communication and the use of volumetric video to enable real-time interaction between ground-based surgeons and astronauts. The presentation highlights the practical application of holographic telepresence in isolated environments and the development of device-agnostic, multi-user communication platforms.
The Security Reality of Holographic Telepresence in High-Latency Environments
TLDR: Holographic telepresence on the International Space Station relies on volumetric video streaming over extremely constrained, high-latency satellite links. This research demonstrates that while these systems enable remote medical procedures, they introduce significant attack surfaces through proprietary communication protocols and potential interception of sensitive medical data. Security researchers must treat these emerging telepresence platforms as critical endpoints that require rigorous authentication and encryption to prevent unauthorized access to remote surgical environments.
Real-time remote surgery is no longer a concept confined to science fiction. As organizations push the boundaries of remote medical support, the integration of holographic telepresence into isolated, high-stakes environments like the International Space Station has become a reality. This technology, which relies on capturing and transmitting volumetric video, allows ground-based surgeons to interact with astronauts as if they were physically present in the same room. However, for those of us in the security community, this leap in capability introduces a complex set of risks that go beyond standard network security.
The Mechanics of Volumetric Telepresence
At its core, holographic telepresence functions similarly to 3D printing, but for video data. Instead of a single flat video stream, the system captures thousands of layers of volumetric data to reconstruct a 3D representation of a person. This process requires significant bandwidth and low latency to maintain the illusion of presence. In the context of the International Space Station, the environment is anything but ideal. The system must operate over satellite links that are subject to constant hand-overs, high radiation, and severe bandwidth limitations, often operating at speeds as low as 5 Mbps.
These constraints force developers to make trade-offs that often prioritize availability and performance over security. When you are dealing with a 90-minute orbital period, the communication window is constantly shifting, requiring the system to dynamically adjust to different satellite hand-overs. This creates a volatile network environment where traditional, static security controls often fail. If a session is interrupted, the system must be able to resume without re-authenticating, which is a potential point of failure for session hijacking or man-in-the-middle attacks.
Technical Vulnerabilities in Remote Medical Streams
The primary risk in these systems is the interception and manipulation of the volumetric stream. If an attacker can gain access to the communication channel, they could potentially inject malicious data into the holographic feed. Imagine a surgeon receiving a distorted or manipulated view of an incision site during a critical procedure. The impact of such an attack is immediate and life-threatening.
Furthermore, the reliance on proprietary hardware like the Microsoft HoloLens or similar augmented reality devices means that the security of the entire system is tied to the vendor's implementation of encryption and authentication. If these devices do not enforce strict mutual authentication, an attacker could spoof the identity of the ground-based surgeon or the remote astronaut.
For those performing penetration tests on these systems, the focus should be on the communication protocols used to transmit the volumetric data. Often, these protocols are custom-built to handle the specific requirements of high-latency satellite links and may lack the robust security features found in standard protocols like TLS. Testing should involve:
- Analyzing the traffic for cleartext transmission of sensitive medical telemetry.
- Attempting to intercept and replay the volumetric video stream.
- Testing the authentication mechanisms for session persistence and token reuse.
Real-World Implications for Security Testing
While most of us will not be testing systems on the International Space Station, the underlying technology is rapidly moving into the commercial sector. Companies are already deploying similar telepresence solutions for remote industrial maintenance, training, and telemedicine. As these systems become more common, they will inevitably become targets for attackers looking to disrupt critical infrastructure or steal sensitive intellectual property.
When you encounter these systems in a corporate environment, do not assume they are secure just because they are "enterprise-grade." Many of these platforms are built on top of existing WebRTC or similar real-time communication frameworks, which are notoriously difficult to secure correctly. A misconfiguration in the signaling server or a weak implementation of DTLS can expose the entire stream to interception.
Securing the Future of Telepresence
Defending these systems requires a shift in how we approach endpoint security. Because these devices are often used in isolated or mobile environments, they cannot rely on a traditional perimeter. Instead, security must be baked into the application layer. This means implementing end-to-end encryption for the volumetric stream, enforcing strict device identity verification, and ensuring that all communication is authenticated at every hop.
If you are tasked with securing a telepresence platform, start by auditing the signaling process. Ensure that the exchange of cryptographic keys is protected against interception and that the system is resilient against common attacks like replay or session hijacking. The goal is to ensure that the data being transmitted is not only private but also authentic. As we continue to bridge the gap between remote locations, the security of these connections will become just as important as the medical procedures they support. Keep testing, keep breaking, and ensure that the future of remote interaction is built on a foundation of security rather than just convenience.
Tools Used
Target Technologies
Up Next From This Conference

Breaking Secure Web Gateways for Fun and Profit

Listen to the Whispers: Web Timing Attacks That Actually Work

Abusing Windows Hello Without a Severed Hand
Similar Talks

Millions of Patient Records at Risk: The Perils of Legacy Protocols

Hey Bro, You got a Lighter? I need to do some Electroporation

