/?s=security
Displaying search results
38 ResultsThis online exhibition lets you discover the intricate strata of code and network that operate to deliver the content of an online search. Drift reveals how these strata continuously evolve, even behind what seems a very well known, stable, familiar web site.
Crystallography is the process of shining a light through a crystalline material to reveal the qualities of its inner structure through its diffraction pattern. By sonifying diffraction data from a piece of quartz – a key substance within the electronics industry since the 1930s – Crystalline Unclear creates a temporal experience of something that usually…
Created by Marta Revuelta, AI Facial Profiling, Levels of Paranoia is a project exploring the potential and implication of AI technologies by proposing a machine that recognises the ability of an individual to handle firearms and predicts their potential to cause harm from a biometric analysis of their face.
Developed at Strelka during the ‘The New Normal Program’ in 2017, ‘SHIFT’ (Arthur Röing Baer, Christian Lavista, Dmitry Alferov, Liza Dorrer) is a project that engages with stages of automation of the trucking industry in Russia, working with the socio-political, physical, and spatial particulars of logistics in the country’s vast territory.
Created by London-based musical duo the Network Ensemble, Selected Network Studies is a series of audiovisual pieces created using network data collected from a number of locations across London, Berlin and Rome. It is released as limited edition UV-printed, vacuum-sealed mylar package containing a 2GB SD Card with one hour of video material and 45 minutes of sound material.
Latest in the series of critical design projects by Shanghai design and research studio Automato, TraiNNing Cards is a set of 5000 training images, physically printed and handpicked by humans to train any of your machines to recognise first and favorite item in a house: a dog.
Low cost and open source, Rob Seward’s Z1FFER is Hardware Random Number Generator that harnesses thermal noise to provide a high quality random bitstream for research and experimentation. Available at the CAN shop now!
Created by Quadrature and first shown at this years’ Ars Electronica festival in Linz, MASSES installation includes two stones lying on top of a balanced steel plate and a machine with aim to create a perfect equilibrium state by moving the stones to the appropriate positions.
Julian Oliver’s latest hardware provocation is a fake cellular tower masquerading as an HP laserjet printer. The device evokes ubiquitous ‘StingRay’ surveillance technology and the real (fake) cell towers that pepper urban landscape.
Created by Saurabh Datta (automato), Poetic Router is a project that investigates the potential of the everyday manufactured IoT platforms beyond what is commonly discussed. Whereas most concerns of IoT are focused on security since every “Chip-‘ed” device is hackable and can be jacked and modded remotely. Poetic Router explores network transmission as a way to generate poetry by scraping the data found on the server links.
Created by Emilie Pillet at ECAL, HTTPrint is a Google Chrome extension which generates a webpage that captures your navigation on the Web such as the time you spend on each page, the url, images and texts, in order to give a visual output. You can capture and save the result by printing it at home or ordering a print-on-demand newspaper.
Seen is a project that deals with interception and filtering of our communications by the NSA, GCHQ and other security agencies. It is a typeface with a preloaded set of “trigger words” when written, the font immediately crosses them out.
This past December a dozen artists, activists, and researchers converged at the STUDIO for Creative Inquiry for a book sprint. Led by Addie Wagenknecht, the all-women cadre convened under the collective moniker Deep Lab, and examined how privacy, security, surveillance, and large-scale data aggregation are problematized in the arts, culture and society.
Created by Francesco Tacchini, SPOOK-I is a hypothetical but operative US National Security Agency inspired machine. It mimics two surveillance techniques available to the NSA Tailored Access Operations unit, in order to expose the technology employed by state surveillance for the ‘weaponization of everyday’.
Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. • Archive: Access thousands of projects, scores of essays, interviews and reviews.• Publish: Post your projects, events, announcements.• Discuss: Join our Discord for events, open calls and even more projects.• Education: Tutorials (beginners and advanced) with code examples and downloads.•…
Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. • Archive: Access thousands of projects, scores of essays, interviews and reviews.• Publish: Post your projects, events, announcements.• Discuss: Join our Discord for events, open calls and even more projects.• Education: Tutorials (beginners and advanced) with code examples and downloads.•…
AIT (“Social Hacking”), taught for the first time this semester by Lauren McCarthy and Kyle McDonald at NYU’s ITP, explored the structures and systems of social interactions, identity, and self representation as mediated by technology.
The school has completed the The First Class and presented projects, work in progress and collaborations at the Eyebeam Art and Technology Center. CAN selects and presents 5 great projects that have drawn our attention.
Landscape Futures is a recent book edited by Geoff Manaugh that unpacks the wildest intersections of landscape architecture, technology and perception. CAN interviewed Manaugh about the book last week to provide a window into this ambitious curatorial (and now editorial) project.
Choosing the right type of camera for your interactive installation is one of the most important technical choices you can make in your initial planning phases. Making the incorrect choice can really impact how well your installation reacts to its victims and it can also impact its ability to perform robustly in a large amount of environments.
Sorry, this is Members Only content. Please Log-in. Join us today by becoming a Member. • Archive: Access thousands of projects, scores of essays, interviews and reviews.• Publish: Post your projects, events, announcements.• Discuss: Join our Discord for events, open calls and even more projects.• Education: Tutorials (beginners and advanced) with code examples and downloads.•…