Shishir -- HTGAA 2026 Profile
About me
I like Dinosaurs
I like Dinosaurs
Week 1 HW: Principles and Practices
BIO QR CODES My Synthetic Biology proposal is to create Biological QR codes that update based on the body's internal signals. (Think Biomarkers). They act as unique IDs. This is based on the dermal abyss study done by researchers at MIT and Harvard, back in 2017. "Living" tattoos take in the body's metabolic signals as inputs. (This image is from Fluxey, Deviant art: link)
Week 2 HW: DNA Read, Write & Edit
Professor Jacobson: The error rate of DNA polymerase differs in organisms and also because there are different types of polymerase enzymes. Usually this accuracy is 1 in 100,000 bp before proof reading and error correction. (I used an AI prompt to confirm, the prompt: What is the error rate of polymerase? How does this compare to the length of the human genome. How does biology deal with that discrepancy?). The length of the human genome is around 3.2 billion bp. To compare, without error correction, this would cause around 32,000 errors if the entire genome is replicated .To correct for this, biology employs DNA repair mechanisms and proof reading that massively reduce the error rate.

(This image is from Fluxey, Deviant art: link)
There are many goals to keep in mind to avoid or atleast minimize these risks. Some of them are listed below.
Goal: To ensure this organism does not cause physical harm to its users and the ecosystem.
Method : One such method is to enclose the organism in a hydrogel matrix and also make the organism a synthetic Auxotroph. This matrix maintains the shape of the QR, prevents spread, overlap and supplies the nutrients for growth and maintenance. If the organism escapes the matrix, it cannot survive. (Think Lysine Contingency from Jurassic Park.).
Governance Action: One way to enforce the method is to ensure large regulatory bodies (even labs and policy makers) follow strict guidelines, a ‘Death-on-escape’ standard where the survival rate of the organism is lesser than a set probability.
Goal: Providing users an easy option to opt out of this system, in case of distrust or other disadvantages. This gives the users a choice to stay away from potential constant monitoring and/or fears of data leaks.
Method : Users must have a way to remove the tattoo or deactivate it. The storage system should ensure complete data removal after the deactivation of the tattoo. This removal should not lead to restricted access to healthcare and other services.
Governance Action : Reliable methods to remove the tattoos should be provided when this is being supplied. Common OTCs or software methods of deactivation for temporary cases. Laws should prevent institutions from punishing induviduals who opt out of this system and ndependent audits can ensure that opting out truly removes users from data collection and tracking.
Goal: To prevent access to personal information from unauthorised personnel.
Method: Rather than making the QR code provide information directly, the QR code acts a pointer in a database. This allows a tiered access to information. For example, healthcare workers can access information about the patient’s medical history, blood type or medical insurance but an average civilian can only get limited information, this is left up to the user. Additional safeguards include access logging, authentication, and automatic alerts for unusual activity to prevent silent abuse.
Governance Action: Federal Health Agencies must mandate that any Bio-ID system intergrates with existing National Provider Identifier databases to verify the identity of healthcare workers
Purpose : Currently, Medical reports are protected by laws like HIPAA but this falls into a gray area. This proposal mandates that the QR codes follow a standardised API portocol.
Design: Regulators must define a “Manifest File” for the ID. Developers must implement a Zero-Knowledge Proof handshake. For example, when scanned, the system should only tell you “This person has insurance” rather than handing out the insurance provider’s details unless the scanner has high-level credentials.
Assumptions: This assumes that federal agenecies have the expertise and trust the technology to keep up with it.
Risk of Failure: A “Bio-Data Breach” where a single hack links a person’s digital ID to their permanent biological tattoo, making the leak “un eraseable.”
Success: if successful, medical bracelets become obsolete. There is no risk of loss of ID. An uninteded consqeuence would be a class-divide, people without the tattoo would have slower access to healthcare and other services.
Purpose A Physical Deleteion Requirement where every Bio-ID must be paired with a “Deactivator”
Design: The bacteria should be engineered to a specific chemical that for example, could tigger a lysis circuit and kill the bacteria. This could range from really specific to really broad.
Assumption: This chemical would not be accidentally applied, usually from an unrealted agent (like soap or lotion) and that it is 100% effective at killing all cells.
Risk of Failure : If too broad, a malicious agent could spray the deactivator and erase the ID’s of many people. If too specific, it would be hard to erase the ID.
Success: Complete user autonomy. It ensures that no one is “permanently tracked” and gives people a way to “log out” of the biological world.
Purpose: Many optical sensors (like pulse oximeters) have historically failed for induviduals with different skin tones. For this, a mandatory Inclusion Standard for biological pigments should be introduced.
Design: Before the ID can be supplied, a test on the Fitzpactrick Skin Type scale must be performed and must be certified. Also the ID should be exposed to various environmental conditions for testing.
Assumptions: Assumes that a single set of pigments can be engineered to be high-contrast for everyone and can withstand various conditions.
Risk of Failure: The certification is expensive and makes it accessible to only large corporations which might lead to a centralised system.
Success The code becomes readable by everyone and wouldn’t discriminate.
Purpose: Prevent Bio-IDs from being repurposed for surveillance, policing, advertising, or social control.
Design: Legally restrict Bio-ID usage to clearly defined domains (e.g., emergency healthcare, patient identification, Transactions). Any expansion requires public review and legislative approval.
Assumptions:Assumes lawmakers can adapt quickly to technological change.
Risk of Failure:Governments or corporations may attempt to bypass limits in emergencies.
Success:Stops dystopian “function creep” where helpful tools become control systems.
| Does the option: | National Bio-digital standard | The right to deletion | Optical Scannability Certification | Purpose Limitation Law |
|---|---|---|---|---|
| Enhance Biosecurity | ||||
| • By preventing incidents | 1 | 1 | n/a | 1 |
| • By helping respond | 1 | 1 | n/a | 3 |
| Foster Lab Safety | ||||
| • By preventing incident | 3 | 1 | 3 | n/a |
| • By helping respond | 3 | 1 | n/a | n/a |
| Protect the environment | ||||
| • By preventing incidents | 2 | 1 | 3 | n/a |
| • By helping respond | 2 | 1 | n/a | n/a |
| Other considerations | ||||
| • Minimizing costs and burdens to stakeholders | 2 | 1 | 3 | 1 |
| • Feasibility? | 2 | 2 | 1 | 1 |
| • Not impede research | 3 | 1 | 3 | 1 |
| • Promote constructive applications | 1 | 2 | 1 | 1 |
Based on Everything, I would choose a combination of option 1, 2 and 4 as priority with 3 as an addon later for fairness and accessibility. National Bio-digital Standard provides a technical and legal backbone by enforcing least-privilege access, identity verification and privacy preservation. Wihtout this, the system becomes liable to misuse and leaks.
The Right to Deletion is the best framework for lab and environmental safety, by creating a way to opt out of this system, it supports ethical governance and protects users from long term tracking and limits harm if the system fails. This is essntial for human trust and prevents a dystopian outcome.
Purpose Limitation Law This block the function creep where a healthcare tool becomes a surveillance, policing or commerical control system. This limits the area which the system can creep into, crucial for long-term ethical stability.
Option 1 and Option 3 reduce innovation by prioritising secrurity.
Option 2 greatly enchnaces freedom and autonomy by providing a way to opt out based on the induvidual’s choice. This is an acceptable tradeoff to stability.
Obtaining certifications and audits are expensive, however not being inclusive cause public backlash and becomes far more disadvantageous in the long term. If cost is prioritised, there is an non-economic divide, if inclusiveness is a priority, costs might increase, causing an economic divide.
Technical and Biologcial competence by the public and Federal agencies.
Ethical legitmacy is as important as technical performance.
The public is well informed and receptive to invasive procedures for long term ease and benefit.
Whether Synthetic Biology advances enough to reliably prevent mutations and reverse any global effects or any other effects.
Whether all nations would agree to use this technology in the same way and adhere to the same laws.
How quickly attackers adapt to security systems.
The error rate of DNA polymerase differs in organisms and also because there are different types of polymerase enzymes. Usually this accuracy is 1 in 100,000 bp before proof reading and error correction. (I used an AI prompt to confirm, the prompt: What is the error rate of polymerase? How does this compare to the length of the human genome. How does biology deal with that discrepancy?).
The length of the human genome is around 3.2 billion bp. To compare, without error correction, this would cause around 32,000 errors if the entire genome is replicated .To correct for this, biology employs DNA repair mechanisms and proof reading that massively reduce the error rate.
An average protein in humans is around 375 aa long (Brocchieri, 2005). Each of those aa can be 1 of 20 types. Each of those Amino acids are coded by 3 codons on average. Codons are 3 nucleotide sequences that code for an amino acid and there are 64 of them. So, for an average protein 20375 different aa chains of length 375 . The number of different DNA encodings are 3375.
In practice most codons don’t code due to lack of specific tRNAs in the cell. These tRNAs match specific codons to specific amino acids before sending them to the ribosome for assembly. As a result if tRNAs do not recognise the specific codon, it stalls protein synthesis. (AI prompt: what are some of the reasons that all of these different codes don’t work to code for the protein of interest?).
Proteins also follow strict structural rules and if the amino acids change, the structure become unstable leading to protein destruction.
Solid phase phosphoramidite synthesis.
As the of an oligonucleotide increase, the coupling efficiency affects the base pair added, even with a 99.9% coupling efficiency after 200nt the probability of the correct bp being added is around 37% and this decreases further as the length increases. At longer lengths, purification becomes difficult. (Gene Synthesis: Methods and Applications, 2011) (AI prompt : what is coupling efficiency).
As mentioned due to coupling efficiency, long lengths of 2000bp would have a lot of errors and may even prevent the stabilisation of the nucleotide.
Brocchieri, L. (2005). Protein length in eukaryotic and prokaryotic proteomes. Nucleic Acids Research, 33(10), pp.3390–3400. doi:https://doi.org/10.1093/nar/gki615.
Gene Synthesis: Methods and Applications. (2011). Methods in Enzymology, [online] 498, pp.277–309. doi:https://doi.org/10.1016/B978-0-12-385120-8.00012-7.
Lopez, M.J. and Mohiuddin, S.S. (2024). Biochemistry, Essential Amino Acids. [online] PubMed. Available at: https://www.ncbi.nlm.nih.gov/books/NBK557845/.
AI used: OpenAI’s ChatGPT 4.1