Skip to main content
Suzu Logo
  • Home
  • Product
  • Our Solutions
    • AI Advisory
    • AI Assessment
    • AI Integration
    • Cybersecurity Services
  • About
    • About Us
    • FAQ's
  • Resources
    • Blog
    • In The Media
    • Podcasts
    • All Resources
Contact Us
Back to Blog
Generative AI LLM Biohacking DigitalHealth mRNA

The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?

Hannah Perez April 01, 2026 4 min read
Table of Contents

    In late 2024, Sydney tech entrepreneur Paul Conyngham was told his rescue dog, Rosie, had months to live. She was battling a tennis ball-sized mast cell tumor that had resisted surgery and chemotherapy. For most, this is where the story ends in heartbreak. But Conyngham, a data analyst with 17 years of experience in machine learning, and zero background in biology, decided to treat the cancer not as a medical death sentence, but as a data problem.

    What followed is being called a "world first": a personalized mRNA cancer vaccine designed by a non-scientist using a stack of off-the-shelf AI tools.

    The "N-of-1" Workflow: From Tissue to Data

    The core of the "Rosie Protocol" was turning biological tissue into actionable code. Conyngham paid to have Rosie’s healthy DNA and her tumor DNA sequenced at the University of New South Wales (UNSW). This resulted in a massive 300GB raw sequencing file.

    In traditional medicine, interpreting this data to find "neoantigens", which are the specific mutations the immune system can target, takes a team of bioinformaticians months. Conyngham did it by leveraging a specific AI tech stack:

    • ChatGPT: Acted as the "Chief of Staff," helping Conyngham navigate the complex biological landscape, suggest treatment strategies (like immunotherapy), and draft the technical pipelines.
    • AlphaFold (Google DeepMind): Used to model the 3D structures of the mutated proteins. This allowed Conyngham to see exactly which mutations were "visible" enough for an immune response to latch onto.
    • Custom ML & Grok: Conyngham used his own algorithms to filter the mutations and reportedly used tools like Grok to cross-reference latest research and validate the logic of his vaccine construct.

    The result? That 300GB of data was compressed into a half-page mRNA formula.

    The "Print-on-Demand" Vaccine

    Conyngham took his AI-generated "recipe" to Professor Páll Thordarson at the UNSW RNA Institute. While the AI provided the blueprint, the human experts provided the "foundry." They synthesized the mRNA and packaged it into lipid nanoparticles, the same tech used in COVID-19 vaccines.

    By December 2025, Rosie received her first injection. By January 2026, the primary tumor had shrunk by nearly 50%. Within weeks, a dog that could barely walk was jumping fences to chase rabbits.

    The Regulatory Gap vs. The Speed of Light

    The most provocative part of Rosie’s story isn't just the science, it’s the bureaucracy. Conyngham spent months fighting for "compassionate use" and navigating an ethics approval process that moved at a snail’s pace compared to his AI. While he secured approval for Rosie by mid-2025, the broader "ethics framework" for this kind of citizen led medicine is still catching up.

    As we move through 2026, we are seeing a massive Regulatory Gap. The technology to sequence, model, and print a personalized cure now exists in the hands of talented individuals. However, our legal systems are still built for the era of mass-produced, one-size-fits-all blockbusters.

    A New Era of "Citizen Science"

    Paul Conyngham is now looking to turn this workflow into a scalable model. This isn't just about saving one dog; it’s about the democratization of medicine. If a data engineer can design a vaccine for a dog in his home office, how long until we see "Print-on-Demand" cancer clinics for humans?

    The Rosie Protocol proves that the future of medicine might not be found in a lab, but in a sequence of prompts.

     

    Sources:

    1. UNSW Newsroom: "Meet the man who designed a cancer vaccine for his dog" (Published March 17, 2026). This is the definitive source for the collaboration between Conyngham and the University of New South Wales.

    2. The Jerusalem Post: "ChatGPT helps owner craft cancer vaccine for dog Rosie" (Published March 16, 2026). This report provides details on the 50-75% tumor reduction and the timeline of the treatment.

    3. Bioplatforms Australia: "AI and genomics combine to create personalised cancer vaccine for dog" (Published March 19, 2026). This source details the specific facilities used for the sequencing and analysis.

    4. NBC News: Interview with Gadi Schwartz (March 2026).

    5. CBS News 24/7: Joint interview with Paul Conyngham and Professor Páll Thordarson (March 18, 2026).



    Share
    Tags: Generative AI LLM Biohacking DigitalHealth mRNA
    Hannah Perez
    Hannah Perez

    Hannah Perez is the Director of Marketing at Suzu Labs, where she focuses on translating complex cybersecurity and AI concepts into clear, compelling stories that resonate with real people. With a background rooted in engineering and operations, Hannah brings a rare blend of technical curiosity and creative strategy to her work, bridging the gap between highly technical teams and the audiences they serve.

    ← Previous While TSA Made Headlines, CISA Went Dark

    Latest Posts

    View All
    The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
    Generative AI
    Apr 01, 2026 Hannah Perez

    The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?

    In late 2024, Sydney tech entrepreneur Paul Conyngham was told his rescue dog, Rosie, had months to live. She was ...

    Read More: The Rosie Protocol: Is AI-Driven Personalized Medicine Finally Here?
    While TSA Made Headlines, CISA Went Dark
    Critical Infrastructure
    Mar 30, 2026 Jacob Krell

    While TSA Made Headlines, CISA Went Dark

    The Department of Homeland Security has been partially shut down for over 45 days. In that time, 460 TSA officers have ...

    Read More: While TSA Made Headlines, CISA Went Dark
    Claude Mythos and the Cybersecurity Risk That Was Already Here
    Threat Intelligence
    Mar 27, 2026 Jacob Krell

    Claude Mythos and the Cybersecurity Risk That Was Already Here

    On March 26, Anthropic confirmed the existence of Claude Mythos, an unreleased AI model described internally as "a step ...

    Read More: Claude Mythos and the Cybersecurity Risk That Was Already Here
    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Critical Infrastructure
    Mar 26, 2026 Mike Bell

    BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It

    Rapid7's research reveals China-linked kernel implants deep inside telecom signaling infrastructure. Here's what ...

    Read More: BPFdoor in Telecom Networks: The FCC Is Securing the Edge, but China's Hackers Are Already Past It
    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    Cybersecurity
    Mar 23, 2026 Hannah Perez

    Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026

    We are incredibly proud to announce a monumental achievement. At this year’s Global InfoSec Awards 2026, hosted by ...

    Read More: Securing the AI Frontier: Suzu Labs Sweeps 4 Global InfoSec Awards 2026
    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    Cybersecurity
    Mar 16, 2026 Phillip Wylie

    Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss

    The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss In this episode of Simply Offensive, ...

    Read More: Simply Offensive Podcast: The Future of Pentesting: AI, Automation, and Better Reporting with Dan DeCloss
    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Critical Infrastructure
    Mar 13, 2026 Denis Calderone

    From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time

    On March 12, medical technology giant Stryker confirmed a cyberattack that wiped devices across 79 countries. The ...

    Read More: From Silence to Strike: Tracking Iran's Cyber Escalation in Real Time
    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    Social Engineering
    Mar 09, 2026 Suzu Labs Intelligence

    Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation

    Executive Summary Even Realities markets its G2 smart glasses as the privacy-conscious alternative to Meta Ray-Bans. ...

    Read More: Internal Analysis: Even Realities G2 Smart Glasses Security & Privacy Investigation
    The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    Threat Intelligence
    Mar 06, 2026 Mike Bell

    The Company Reviewing Your Meta Glasses Footage Has a Security Problem

    Last week, Swedish journalists revealed that Meta sends video footage from Meta Ray-Ban smart glasses to human data ...

    Read More: The Company Reviewing Your Meta Glasses Footage Has a Security Problem
    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    CTF
    Mar 03, 2026 Jacob Krell

    The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking

    View White Paper Abstract: Agentic AI systems are compressing competitive hacking timelines faster than the ...

    Read More: The Death of the CTF: How Agentic AI Is Reshaping Competitive Hacking
    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Cybersecurity
    Mar 03, 2026 Phillip Wylie

    Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell

    In this thought-provoking episode of Simply Offensive, host Philip Wylie sits down with Jacob Krell, a penetration ...

    Read More: Simply Offensive Podcast: AI Killed the CTF Star with Jacob Krell
    Anthropic and Claude: 2026 AI Powerhouse
    Supply Chain Security
    Feb 26, 2026 Hannah Perez

    Anthropic and Claude: 2026 AI Powerhouse

    In early 2026, the image of Anthropic as a cautious, safety-oriented "research lab" has effectively been replaced by ...

    Read More: Anthropic and Claude: 2026 AI Powerhouse
    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Cybersecurity
    Feb 24, 2026 Phillip Wylie

    Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle

    In this episode of Simply Offensive, host Philip Wylie welcomes Darius Houle, an Application Security (AppSec) and ...

    Read More: Simply Offensive Podcast: Navigating AI's Challenges in Problem Solving with Darius Houle
    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Cybersecurity
    Feb 17, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown

    In the latest episode of the Simply Offensive podcast, host Philip Wylie sat down with Matt Brown, a renowned hardware ...

    Read More: Simply Offensive Podcast: Exploring the World of Hardware Hacking with Matt Brown
    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Cybersecurity
    Feb 12, 2026 Phillip Wylie

    Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs

    In today’s rapidly evolving technological landscape, the convergence of artificial intelligence (AI) and cybersecurity ...

    Read More: Simply Offensive Podcast: Exploring AI Vulnerabilities in Cybersecurity with Mike Bell of Suzu Labs
    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Threat Intelligence
    Feb 10, 2026 Phillip Wylie

    Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss

    Beyond the Pentest: Why Adversarial Emulation is the Future of Defensive Training Many organizations operate under the ...

    Read More: Simply Offensive Podcast: Emulated Cyber Crime with Dahvid Schloss
    Under Armour Breach: What The Forum Data Actually Shows
    Threat Intelligence
    Jan 30, 2026 Mike Bell

    Under Armour Breach: What The Forum Data Actually Shows

    On January 18, 2026, the Everest ransomware group made good on their threat and released Under Armour customer data to ...

    Read More: Under Armour Breach: What The Forum Data Actually Shows
    Brightspeed Breach: Crimson Collective and the Infostealer Problem
    Threat Intelligence
    Jan 20, 2026 Mike Bell

    Brightspeed Breach: Crimson Collective and the Infostealer Problem

    Recently Crimson Collective claimed they breached Brightspeed and grabbed 1 million+ customer records. The list of data ...

    Read More: Brightspeed Breach: Crimson Collective and the Infostealer Problem
    When Grid Data Goes Dark Web
    Power Grid
    Jan 19, 2026 Mike Bell

    When Grid Data Goes Dark Web

    Inside a threat actor's critical infrastructure targeting In January 2026, 139 gigabytes of engineering data from a ...

    Read More: When Grid Data Goes Dark Web
    The $150,000 Password
    Critical Infrastructure
    Jan 19, 2026 Mike Bell

    The $150,000 Password

    How one threat actor turned stolen credentials into a global breach portfolio Between December 2025 and January 2026, a ...

    Read More: The $150,000 Password
    Logo copy 3-1

    Fortified Security. Intelligent Innovation.

    +1 (702) 766-6257
    P.O. Box 750111
    Las Vegas, Nevada 89136

    Follow Us

    About

    • About Us
    • Contact
    • FAQ's

    Solutions

    • Products
    • AI Advisory
    • AI Assessment
    • Cybersecurity

    Resources

    • Insights
    • In The Media
    • Podcasts
    © 2026 All rights reserved.
    • Privacy Policy
    • Terms & Conditions