Elon Musk’s company implanted chip into monkey’s brain – now he ‘plays video games using his mind’

Elon Musk’s company Neuralink has already implanted a chip into a monkey’s brain that enables it to “play video games using his mind.”Musk claimed as much in a wide-ranging interview conducted on Clubhouse on Sunday nightNeuralink is focused on human-computer interfaces for artificial intelligence in people.

Elon Musk’s human-computer interface company, Neuralink, is seemingly off to a strong start.

“We’ve already got a monkey with a wireless implant in their skull, and the tiny wires, who can play video games using his mind,” Musk said in a new interview.

“One of the things we’re trying to figure out is can we have the monkeys play mind ‘Pong’ with each other,” he told the hosts of the Good Time Show, a Clubhouse-hosted talk show. “That would be pretty cool.”

Neuralink has been testing neural interfaces on animals for years at this point. In a video released last year, Neuralink demonstrated its work on a pig named Gertrude.

The Neuralink device in Gertrude’s brain transmitted data live during the demo as she snuffled around. Neuralink/YouTube

In that video, Neuralink demonstrated its ability to record and potentially predict actions based on a wired chip implanted in Gertrude’s brain.

But according to Musk, the video game-playing monkey was implanted with a wireless chip that enabled it to control an electronic interface with its mind only.

“He’s not uncomfortable and he doesn’t look weird,” Musk said, “And you can’t even see where the neural implant went in.”

The wireless bit is particularly important, as it could eliminate the potential for infection that comes with wires protruding from organic material.

“If you can do experiments with something that doesn’t involve wires coming through the skin, that’s going to improve the welfare of animals,” neuroscience Professor Andrew Jackson of the University of Newcastle told Insider last year.

Hot this week

The Myth of Perfect Security

Perfect security is a myth, and focusing on resilience rather than prevention can better protect your organization from inevitable breaches.

Why Traditional Passwords Are Failing Us

Password fatigue from complex rules often causes more security breaches than weak passwords, requiring a shift toward user-friendly tools and behaviors.

Why Your Employees Are Your Best Security Defense

Empowering employees with security awareness training often provides better protection than stacking more technology, turning human factors from a weakness into your strongest defense.

Why Most Security Awareness Training Fails and What to Do About It

Security awareness training often fails because it focuses on knowledge rather than behavior, but shifting to a behavior-based approach can lead to better outcomes and fewer incidents.

The Myth of Multifactor Authentication Security

Multifactor authentication enhances security but is not foolproof, as it can be bypassed through social engineering and technical exploits. Understanding its limitations and adopting stronger methods is essential for effective protection.

Topics

The Myth of Perfect Security

Perfect security is a myth, and focusing on resilience rather than prevention can better protect your organization from inevitable breaches.

Why Traditional Passwords Are Failing Us

Password fatigue from complex rules often causes more security breaches than weak passwords, requiring a shift toward user-friendly tools and behaviors.

Why Your Employees Are Your Best Security Defense

Empowering employees with security awareness training often provides better protection than stacking more technology, turning human factors from a weakness into your strongest defense.

Why Most Security Awareness Training Fails and What to Do About It

Security awareness training often fails because it focuses on knowledge rather than behavior, but shifting to a behavior-based approach can lead to better outcomes and fewer incidents.

The Myth of Multifactor Authentication Security

Multifactor authentication enhances security but is not foolproof, as it can be bypassed through social engineering and technical exploits. Understanding its limitations and adopting stronger methods is essential for effective protection.

Why MFA Is Not Enough Anymore

Multi-factor authentication is no longer a silver bullet for security as attackers develop new bypass methods, requiring a layered defense approach with phishing-resistant tools and continuous monitoring.

Why Phishing Still Works and What to Do About It

Phishing remains a top threat because it exploits human psychology, not just technical gaps. Shifting focus to employee awareness and habits can build stronger defenses than relying solely on technology.

Rethinking Password Security

Complex password rules often increase risk by encouraging poor habits. Learn how password managers and multi-factor authentication offer more practical protection for organizations of all sizes.
spot_img

Related Articles

Popular Categories