Released by  

The pixel is not absolute. In fact, it is a metaphor.

The same pixel can appear different, depending on context. It’s transformed by screen calibration, aspect ratio; it looks one way on a phone, another projected, and yet another way on a display. An image’s data is not the same as the light it produces, and so what we see is a version of a copy or a copy which has become an original. Pixels become lost in optimization and computational structure. Their texture, like the texture of a painting, decays with time.

versioned imagesSearch results for The Scream 

The 1% is a series which attempts to balance complicity and critique of systematic structures, particularly as they are manifested in our financial and electronic worlds. Each piece in the series isolates a single, algorithmically defined point from the highest selling paintings of the last 100 years. This point is converted back into the original dimensions of the painting from which it was inherited. The titles are defined by the paintings’ most recent selling prices, in the millions.

sidebyside_revereLe Rêve by Pablo Picasso, 130 × 97 cm                    155.9, by Addie Wagenknecht 130 × 97 cm

By radically expanding these ultimately subjective points, the series attempts to visually express the elusiveness of art within the public domain. Within the same systems, open source and p2p culture have resisted control, even without conscious intent, their provocation is their distribution.

sidebyside_garconGarçon à la Pipe by Pablo Picasso, 100 × 81 cm          129 by Addie Wagenknecht, 100 x 81cm

 

The paintings, which are the sources and subjects of The 1%, are held by private collectors or museums most outside the publics access and yet the visual representation of these works is ubiquitous online and off. The paintings’ auras have been rendered moot by accessibility, much as the mechanical reproduction of images revolutionized the experience of art in the early 20th century. The difficulty of this is that it is unclear if the value is material, cultural or both. Painting is a classification of medium, whereas Expressionism is a classification of culture. The one is based on materialism, and the other is based on contextual analysis. The 1% attempts to use both methodological avenues to work within a dual distribution model. The 1% will be on partial exhibition as prints at MU, opening Friday. The entire series will be shown next year as a solo exhibition. Torrents are available online for free.

 

Released by  

Prism Break Barbie is a response and solution for girls who want to protect their data beyond just encryption. In less than 5 minutes, you can create a simple, discrete and TSA approved, non-threatening device to destroy hardware.

side by side

side by side

profile without coverage in place

profile without coverage in place

 

Prism Break Barbie is equipped with a 3-inch and .6 ounces concealed spring-loaded spike which can be activated by sitting the doll on any Smart phone, USB or hard drive or by a push/click of the hand. The spikes force when triggered will shatter the hardware.

 

 

How to Make Your Own Prism Break Barbie in 5 minutes or less:

1. Purchase Barbie or doll of your choice

2. Decide on a spike (I recommend a LifeHammer or ResQME)

3. Ductape or drill the the spike into place and you’re ready to engage.

 

The Result:

5

Why?

General attempts to preserve privacy among activist and hackers often can feel inaccessible for those with do not have extensive computer literacy or a background in programming. Security, especially at the hardware level is often expensive, complex, and layered in additional standards which can make it feel unapproachable. In the wake of revelations about PRISM, many are left wondering what they can do immediately. Answers are often fogged by politics and complex code based solutions. Although fluency in programming is becoming an important requirement to survive in a read-only society it is also not an immediately attainable standard.

Privacy has become a luxury only for the initiated. More so, education around it is often distributed within networks of programmers. Programmers are more often than not majority male populations. In parallel terms, surveillance indirectly forms part of the larger system of exclusion towards minorities and women. Mainstream political debates on surveillance are fixated on personal liberties of highly literate users rather than quick approachable cheap solutions for many.

Prism Break Barbie is about starting a conversation and awareness around the palpable consequences of surveillance and presents a solution for security based on combative humor, speed projects and attainability. Although encryption is perhaps the most effective means of data protection, Prism Break Barbie hopes to serve as conversation and starting point.

 

Where:

Prism Break Barbie will be on exhibition at PRISM BreakUp. Opening tonight, October 4th, at Eyebeam NYC.

 

 

Released by  

FUCK APPLE

GOLDiPhone is a completely functional iPhone 3-5 upgrade case using a 3d printer.

Gold iPhone

Gold iPhone

3d files are here.

BONUS: Prints in 4 pieces and so it works on any (crappy) 3d printer.

What users are saying:

“I prefer white gold but I think the GOLDiPhone is tasteful because of how much more gold it is.” – Dylan Halliday

Now I can update myself!” – Martha Stewart

“The most revolutionary thing to happen to Apple since Apple.” – Wired

3d files are here. GOLDiPhone is licensed under a Creative Commons ShareAlike 3.0

Posted on September 17, 2013

by

Released by  

It’s not 1988 so why live like it is?

FREE INTERNET FOREVER!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

Cafes, airports, hotels and Hell usually all have ‘free’ wifi for 30 minutes and then make you pay- this is a bug, not a feature.

Limited time = fffffat unlimited time.

wifi spots are easy to hack your way into fatty goodness:

Option 1:

You can maintain the constant 30 minute wifi sessions by doing a few tricks. When you try to load a page, the router will automatically redirect you to the login page: look at the URL, because from there you can see which system the airport is using and all of them are easy to hack:

Change your IP

Change your MAC address

Delete your cookies

Option 2:

You can also spoof your MAC address, MacMakeup (Win) is a good place to start.

Edit: A good tutorial for Mac users can be found here

ProTip: Find a MAC addresses already using the paid wifi. Once you have located a few, you can copy the mac address as your own and enjoy.

Option Lazy Motherfucker:

Many routers have the ability to hide a wifi network by making their names invisible to other computers (airports use these often for gates). A nice GUI option is to use NetStumbler which locates and shows all hidden networks or you can do it via the terminal:

sudo ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/sbin/airport

The above command must appear on a single line to work. Enter the admin password to create the symbolic link. Now you can use the airport command without th long ass path:

airport -s

The ping will show all available wifi networks and their router name (SSID), the router address (BSSID), signal:

list-wireless-networks

 

Happy Sniffing!! <3

 

Tags: , , , ,

Posted on August 29, 2013

by

1 2 3 4 5

The expressions published in this site are all in the public domain. You may enjoy, use, modify, snipe about and republish all F.A.T. media and technologies as you see fit.