Index of Titles Filed Under 'Hacking'

PublisherThe Equations Group2016
In the summer of 2016, a suite of hacking tools appeared for auction from a previously unknown group called “The Shadow Brokers”, who claimed to have hacked these tools from another secretive organization: “The Equations Group”. This folder of firewall tools (downloadable below) were released for free as proof of the hack’s overall legitimacy; The Shadow Brokers asked for one million Bitcoin (about 570 million dollars) for the rest of the tools. The free folder featured exploits (components of a larger attack that leverages security vulnerabilities), implants (covert software developed for targeted attacks on a particular device, usually for surveillance), ...
PublisherMikrotext2016
Good-bye, rational culture! Let Guatemalan writer Alan Mills welcome you to the philosophy of tricksters. Follow him on a tour through indigenous mythology, classical education, and the literary canon, thoroughly mixed with hacking theory and with popular culture—from Star Wars and Breaking Bad to familiar figures like Bugs Bunny and El Zorro. Get to know Michael Jackson and David Bowie, Guy Fawkes and the Popol Vuh, the sacred book of the Maya-K’iche’, through this fulminant essay on old and new strategies for resisting superpowers. Mills currently lives in Berlin and Vienna, and Hacking Coyote is an expanded and elaborated version of ...
The catalogue of the exhibition Networked Disruption: Rethinking Oppositions in Art, Hacktivism and Business curated by Tatiana Bazzichelli and presented in spring 2015 at Škuc Gallery in Ljubljana and the Museum of Modern and Contemporary Art in Rijeka. The exhibition involved actors who directly engage with hacktivism, art, civil liberties and social networking to expose the contradictions of capitalistic logics and power systems and operate at the convergence of business and art, becoming key to unleashing the paradoxes of the social networking phenomenon. In the business world, a disruption is an unexpected innovation that comes from within the market itself. In the ...
Nicolas Maigret is a critical media artist and curator. In the Pirate Cinema, he explores piracy and peer-to-peer file sharing of audio-visual contents: a monitoring machine shows P2P transfers in real time on networks using the BitTorrent protocol. The P2P Sharing protocol is based on small-sample file fragmentation: when all the “chunks” have been downloaded, the file can then be reconstructed sample by sample until completion, from chaotic scraps received from distinct users around the world. In this essay, Geoff Cox (Associate Professor at the Dept. of Aesthetics and Communication, Aarhus University, and Adjunct Faculty at Transart Institute) opens up ...
PublisherSarai, CSDS2001
A Sarai is an enclosed space in a city, or, beside a highway, where travellers and caravans can find shelter, sustenance and companionship; a tavern, a public house, a meeting place; a destination and a point of departure; a place to rest in the middle of a journey… The Sarai Reader (which is the first of what we hope will be more such collections) can be seen both as a navigation log of actual voyages and a map for possible journeys into a real and imagined territory that we have provisionally called the “Public Domain”. This republic without territory is a ...
Since the second half of the 90s, storytelling has become a central strategy in hacktivism and media art, whereas before, actions and performances aimed at creating disturbance, boycotts and resistance. To Inke Arns – theorist of media art and artistic director of Hartware MedienKunstVerein in Dortmund – media artists and performers such as Yes Men, Christoph Schlingensief, RTMark, Laibach and Ubermorgen have chosen the strategy of “over identification”, which uses narrative and storytelling, in many of their works.In the projects Voteauction (2000), Psych|OS (2002), EKMRZ-Trilogy(2005–2008), through narratives and counter-narratives, the artist duo Ubermorgen.com enable the audience to understand the complex structures that underlie the functioning ...

We use cookies to improve your experience on our site. Read our privacy policy to learn more. Accept

Join Our Mailing List