The pixel is not absolute. In fact, it is a metaphor.
The same pixel can appear different, depending on context. It’s transformed by screen calibration, aspect ratio; it looks one way on a phone, another projected, and yet another way on a display. An image’s data is not the same as the light it produces, and so what we see is a version of a copy or a copy which has become an original. Pixels become lost in optimization and computational structure. Their texture, like the texture of a painting, decays with time.
The 1% is a series which attempts to balance complicity and critique of systematic structures, particularly as they are manifested in our financial and electronic worlds. Each piece in the series isolates a single, algorithmically defined point from the highest selling paintings of the last 100 years. This point is converted back into the original dimensions of the painting from which it was inherited. The titles are defined by the paintings’ most recent selling prices, in the millions.
By radically expanding these ultimately subjective points, the series attempts to visually express the elusiveness of art within the public domain. Within the same systems, open source and p2p culture have resisted control, even without conscious intent, their provocation is their distribution.
The paintings, which are the sources and subjects of The 1%, are held by private collectors or museums most outside the publics access and yet the visual representation of these works is ubiquitous online and off. The paintings’ auras have been rendered moot by accessibility, much as the mechanical reproduction of images revolutionized the experience of art in the early 20th century. The difficulty of this is that it is unclear if the value is material, cultural or both. Painting is a classification of medium, whereas Expressionism is a classification of culture. The one is based on materialism, and the other is based on contextual analysis. The 1% attempts to use both methodological avenues to work within a dual distribution model. The 1% will be on partial exhibition as prints at MU, opening Friday. The entire series will be shown next year as a solo exhibition. Torrents are available online for free.
Prism Break Barbie is a response and solution for girls who want to protect their data beyond just encryption. In less than 5 minutes, you can create a simple, discrete and TSA approved, non-threatening device to destroy hardware.
Prism Break Barbie is equipped with a 3-inch and .6 ounces concealed spring-loaded spike which can be activated by sitting the doll on any Smart phone, USB or hard drive or by a push/click of the hand. The spikes force when triggered will shatter the hardware.
1. Purchase Barbie or doll of your choice
2. Decide on a spike (I recommend a LifeHammer or ResQME)
3. Ductape or drill the the spike into place and you’re ready to engage.
General attempts to preserve privacy among activist and hackers often can feel inaccessible for those with do not have extensive computer literacy or a background in programming. Security, especially at the hardware level is often expensive, complex, and layered in additional standards which can make it feel unapproachable. In the wake of revelations about PRISM, many are left wondering what they can do immediately. Answers are often fogged by politics and complex code based solutions. Although fluency in programming is becoming an important requirement to survive in a read-only society it is also not an immediately attainable standard.
Privacy has become a luxury only for the initiated. More so, education around it is often distributed within networks of programmers. Programmers are more often than not majority male populations. In parallel terms, surveillance indirectly forms part of the larger system of exclusion towards minorities and women. Mainstream political debates on surveillance are fixated on personal liberties of highly literate users rather than quick approachable cheap solutions for many.
Prism Break Barbie is about starting a conversation and awareness around the palpable consequences of surveillance and presents a solution for security based on combative humor, speed projects and attainability. Although encryption is perhaps the most effective means of data protection, Prism Break Barbie hopes to serve as conversation and starting point.
GOLDiPhone is a completely functional iPhone 3-5 upgrade case using a 3d printer.
3d files are here.
BONUS: Prints in 4 pieces and so it works on any (crappy) 3d printer.
“I prefer white gold but I think the GOLDiPhone is tasteful because of how much more gold it is.” – Dylan Halliday
“Now I can update myself!” – Martha Stewart
“The most revolutionary thing to happen to Apple since Apple.” – Wired
It’s not 1988 so why live like it is?
Cafes, airports, hotels and Hell usually all have ‘free’ wifi for 30 minutes and then make you pay- this is a bug, not a feature.
Limited time = fffffat unlimited time.
wifi spots are easy to hack your way into fatty goodness:
You can maintain the constant 30 minute wifi sessions by doing a few tricks. When you try to load a page, the router will automatically redirect you to the login page: look at the URL, because from there you can see which system the airport is using and all of them are easy to hack:
– Change your IP
– Change your MAC address
– Delete your cookies
You can also spoof your MAC address, MacMakeup (Win) is a good place to start.
Edit: A good tutorial for Mac users can be found here
ProTip: Find a MAC addresses already using the paid wifi. Once you have located a few, you can copy the mac address as your own and enjoy.
Many routers have the ability to hide a wifi network by making their names invisible to other computers (airports use these often for gates). A nice GUI option is to use NetStumbler which locates and shows all hidden networks or you can do it via the terminal:
sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport
The above command must appear on a single line to work. Enter the admin password to create the symbolic link. Now you can use the airport command without th long ass path:
The ping will show all available wifi networks and their router name (SSID), the router address (BSSID), signal:
Happy Sniffing!! <3
The expressions published in this site are all in the public domain. You may enjoy, use, modify, snipe about and republish all F.A.T. media and technologies as you see fit.