Hacking

Cover art
PublisherThe New Inquiry2018
For his lecture for the Center for Experimental Lectures (at Interstate Projects, 2017) Devin Kenny illustrated how the physical infrastructure of the network, supposedly developed in the 20th century, actually developed much earlier. Drawing from a variety of sources and traditions, Kenny’s alternative genealogy understands routes of the African diaspora and practices developed during and after the Middle Passage as the origin of network technologies. BailBloc, a computer application he also helped conceive, takes the seemingly apolitical and highly dubious culture of cryptocurrency and bends its networking potential towards an abolitionist politics. Developed by The New Inquiry’s “Dark Inquiry” lab, ...
Cover art
PublisherDarkwallet2015
Decentralised Information Black Market ================================================================== "Darkleaks: Decentralised Cryptographic Information Black Market" Scheme by Peter Todd Code by Amir Taaki *Trustless provably fair information marketplace ############################### # WORK IN PROGRESS # ############################### * Distribute an encrypted file to the world. * Reveal some random section of the contents to prove the legitimacy of its contents using an algorithm for provably fair random selection to all parties. * People bid on the remaining parts. * Leaker redeeming funds automatically releases the ...
Cover art
Deep Lab is a collaborative group of researchers, artists, writers, engineers, and cultural producers interested in privacy, surveillance, code, art, social hacking, and anonymity. Members of Deep Lab are engaged in ongoing critical assessments of contemporary digital culture and exploit the hidden potential for creative inquiry lying dormant within the deep web. Deep Lab supports its members’ ability to output anonymously via proxy tools; in this way, our research can remain fluid via multi-pseodonymous identity. Deep Lab promotes creative research and development that challenges traditional forms of representation and distribution, evaluating these practices alongside typical traffic analysis identification. This process ...
Cover art
PublisherThe Shadow Brokers2016
In the summer of 2016, a suite of hacking tools appeared for auction from a previously unknown group called “The Shadow Brokers,” who claimed to have hacked these tools from another secretive organization: the “Equation Group.” This folder of firewall tools (downloadable below) were released for free as proof of the hack’s overall legitimacy; The Shadow Brokers asked for one million Bitcoin (about 570 million dollars) for the rest of the tools. The free folder featured exploits (components of a larger attack that leverages security vulnerabilities), implants (covert software developed for targeted attacks on a particular device, usually for surveillance), ...
Cover art
PublisherBenjamin Grosser2017
In the words of its designer, artist Benjamin Grosser, Go Rando “is a browser extension that obfuscates your feelings on Facebook. Every time you click ‘Like’, Go Rando randomly chooses one of the six ‘reactions’ for you. Over time, you appear to Facebook’s algorithms as someone whose feelings are emotionally ‘balanced’ “ — that is, your profile becomes obscured by false emotional noise, rendered less useful to Facebook’s algorithms. Grosser notes that Facebook’s “reactions” capacity enables and abets its expanding role in surveillance, government profiling, micro-targeting of advertisements, and emotional manipulation across the platform. Short of leaving the service entirely, ...
Cover art
2005
We generate money by serving Google text advertisments on a network of hidden Websites. With this money we automatically buy Google shares. We buy Google via their own advertisment! Google eats itself – but in the end “we” own it! By establishing this autocannibalistic model we deconstruct the new global advertisment mechanisms by rendering them into a surreal click-based economic model. After this process we hand over the common ownership of “our” Google Shares to the GTTP Ltd. [Google To The People Public Company] which distributes them back to the users (clickers) / public.
Cover art
PublisherMeson Press2017
How to intervene? Interventions are in vogue in digital cultures as forms of critique or political actions into public spheres. By engaging in social, political, and economic contexts, interventions attempt to interrupt and change situations—often with artistic means. This volume maps methods of interventions under the specific conditions of the digital. How are interventions shaped by these conditions? And how can they contribute to altering them? In essays and interviews, this book interrogates modes of intervening in and through art, infrastructures, techno-ecological environments, bio-technology, and political protests to highlight their potentials as well as their ambivalences.
Cover art
Tactical Media employ the ‘tactics of the weak’ to operate on the terrain of strategic power by means of ‘any media necessary’. Once the rather exclusive practice of politically engaged artists and activists, the tactical appropriations of media tools and distribution infrastructures by the disenfranchised and the disgruntled have moved from the margins to centre stage. The explosive growth of mass participation in self-mediation in countless blogs, video sharing platforms, micro-blogging, social networking has created an unprecedented complexity in the info-sphere. While this frenzy of media activity has been heralded as the catalyst of the new democratisation movements in North-Africa and ...
Cover art
Reality Leigh Winner, a 25-year old Georgia federal contractor who had top secret clearance, will become the first American charged for leaking documents under the Espionage Act during the Trump administration. Winner anonymously sent an NSA document to The Intercept which appeared to prove that Russian state-sponsored hackers had engaged in spearphishing efforts to disrupt American voting systems, aiming to dupe local precinct officials and the employees of companies who make voting software. The report doesn’t prove these efforts were successful, just that they happened. Tracked by the microscopic dot pattern left by her company’s color laser printer, Winner, who ...
Cover art
PublisherAdam Harvey2016
SKYLIFT is a geolocation emulator that virtually relocates visitors to Julian Assange’s residence at the Ecuadorian Embassy in London. The device was made for !Mediengruppe Bitnik’s Assange room (held at Zoo Galerie) and works by broadcasting WiFi signals that exploit a smartphone’s reliance on using nearby MAC addresses for location services. SKYLIFT works without connecting to any WiFi network. The only requirements are that you have WiFi turned on and location services enabled. There is no IP spoofing, no GPS signal spoofing, no VPN, and no 3rd party app involved. SKYLIFT will adjust your smartphone’s location to 3 Hans Crescent Knightsbridge, London SW1X 0LS (The Ecuadorian Embassy in ...
Cover art
How can we co-opt digital tools to build a more beautiful future? In the spring of 2020—amidst a global pandemic, economic depression, and transformational movement for racial equity—we talked to artists and activists about tech’s potential to help reinvent our shared realities. Published by Pioneer Works Press in collaboration with The Creative Independent and Are.na, Software for Artists Book: Building Better Realities is edited by Willa Köerner, and features contributions from Salome Asega, Stephanie Dinkins, Grayson Earle, ann haeyoung, Rindon Johnson, Ryan Kuo, and Tsige Tafesse—plus 47 Digital Diary entries from our community. This item is publicly available as part of ...

We use cookies to improve your experience on our site. Read our privacy policy to learn more. Accept

Join Our Mailing List