Brannon Dorsey

2019 β€’ works

Exploring the Invisible Commons

The electromagnetic spectrum is where we communicate. It's radio, it's wifi, it's cellular. While regulation is crucial to making it all work, priority is being given to powerful companies over public use. The small areas available for experimentation and play are being squeezed, but it's hard to fight for a commons that is invisible.

2015 β€’ works

Moment

Dolby Laboratories commissioned Studio Studio to create an experiential installation for their new HQ in San Francisco. We wanted to create an experience that evoked awareness of the present moment through visualizing real time motion within a volumetric display. The sculpture represents sound and visualizes motion through light.

2018 β€’ works

Messages from the Mines

Messages from the Mines is an interactive art installation that excavates and archives hidden messages embedded in the Bitcoin blockchain.

🎀🏨🎨

artWare Hackers Art Show

2018 β€’ words

We threw an art show at a hacker conference to try and bridge the gap between the creative work in cybersecurity and contemporary art.

2016 β€’ works

Holypager

Holypager is a system that intercepts all POCSAG pager messages in the city it resides and forwards them to one (holy) pager. The installation anonymizes all messages and forwards them randomly to one of three pagers on display. Each message is also printed on a contiguous role of receipt paper amassing a large pile of captured pages for gallery goers to peruse.

2018 β€’ works

WiFi Data Safari

An interactive installation and digital literacy workshop that visualizes nearby WiFi data as a virtual environment. This project is a revamp of the Probe Kit project.

πŸ“–πŸ•›πŸ€–

A Journey Towards General Purpose Algorithms

2017 β€’ words

Something radical is happening right now with Artificial Intelligence. It appears that we may now be on the verge of an unprecedented paradigm shift in how we think about and employ computers. For decades, we’ve been writing programs in the form of line-by-line instructions. We are now beginning to move away from these limitations, instead teaching machines to learn on their own.

πŸ•΅πŸ—£πŸ‘₯

Going Public Fast; Thoughts on Disclosure Policy

2018 β€’ words

With the discovery of security vulnerabilities that affect millions of users, comes a great responsibility. How do you share this information that with the parties that it most affects and with the public?

2015 β€’ works

Probe Kit

Probe Kit is a critical software art project that puts a fragment of the network surveillance and collection capabilities available to larger entities in the hands of "hobbyist network data collectors."

πŸ†”πŸ“±πŸ˜­

The Perils of Probe Requests

2017 β€’ words

All of the Wi-Fi devices you own are constantly broadcasting the name of every networks they’ve ever connected to. Turn them off. You know how your phone automagically connects to any Wi-Fi network its seen before? Ever wondered how that works? It’s blatantly stupid. Whenever your phone’s Wi-Fi is turned on, but not connected to a network, it openly broadcasts the SSIDs (network names) of all previously-associated networks in an attempt to connect to one of them.

πŸ”—πŸ”‹πŸ“ˆ

Browser as Botnet

2018 β€’ words

What if websites borrowed compute resources from their visitor’s devices while they browsed as a means of distributed computing?

2014 β€’ works

Zetamaze

Zetamaze was an experimental collaborative web game that allowed visitors to edit, draw on, and explore a virtual 3D maze. It briefly became popular on on several internet image boards during the Winter of 2014 and thousands of users anonymously created artworks and shared files with one another through the game.

2016 β€’ works

WebRoutes

WebRoutes is a critical artware project that provides viewers with a window into the Internet infrastructure and geopolitical network topology that is inherently invisible to them as they browse the web.

πŸ”“πŸ‘πŸŒ

Reaping the Walled Garden

2018 β€’ words

Attacking private networks from the Internet with DNS rebinding. TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home thermostats and more.

πŸ–₯🎹🎡

Using Machine Learning to Create New Melodies

2017 β€’ words

Music is storytelling. Melodies are memories. We create them from the musical experiences, conscious and unconscious, that we are exposed to throughout our lifetimes. Passed down through time in a kind of oral tradition, the music that we make today carries with it embeddings of the culture and people of times long past. Musical motifs are not the product of an individual artist, but rather a reinterpretation of the musical ideas that have been presented to them, for them to reinterpret and pass along to others. In this way, writing music can be thought of as less of a process of authorship and instead a practice of remix.

ML 4 Music Workshop

2017 β€’ wares

Machine learning for music and sound synthesis workshop

πŸ€–πŸŽΆπŸ«

πŸ”’πŸ”¨πŸ”“

WiFi Cracking

2017 β€’ words

This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network's security or break into one nearby. The attack outlined is entirely passive (listening only, nothing is broadcast from your computer) and it is impossible to detect provided that you don't actually use the passwords that you crack.

2014 β€’ works

Between the Two of These

Between the Two of These is a public Media Art installation that was presented at the Digital Arts Entertainment Lab (DAEL) in Atlanta, GA.

Man-In-the-Middle Router

2017 β€’ wares

Man-in-the-middle wireless access point inside a docker container.

πŸ’»πŸ˜ˆπŸ’»

Pastebin-mirror

2017 β€’ wares

Mirror Pastebin.com to a local SQLite database or flat text files. Archives all new and trending pastes in real-time.

πŸ“ƒπŸ“₯πŸ—„

πŸ–₯πŸ”¨πŸ”₯

DΜΆDoS Apache Servers From a Single Machine

2017 β€’ words

Distributed denial-of-service (DDoS) attacks are dependable, age-old, methods of bringing down remote computers and the services they provide. Attacks come in many shapes and sizes and have been seemingly more frequent and damaging recently. DDoS is effective because it leverages the bandwidth and throughput of thousands of computers, all under a single attacker’s control as a botnet, to target a machine or network. Sure, botnets can be purchased through forums and marketplaces on the darknet, but what if you wanted to DoS a server using only a single machine from the comfort of your own home.

2013 β€’ works

Traffic Box

A replica of a traffic controller box that doubles as a portable audio and video surveillance bunker.

Chattervox

2018 β€’ wares

An AX.25 packet radio chat protocol with support for digital signatures and compression. Like IRC over radio waves.

πŸ”‰βˆΏπŸ“‘

Naive-hashcat

2017 β€’ wares

Password cracking for n00bs.

πŸ‘¦#🐈

Whonow

2018 β€’ wares

A malicious DNS server for executing DNS Rebinding attacks on the fly.

πŸ™‹β“πŸ“›

Keras-weight-animator

2017 β€’ wares

Save keras weight matrices as short animated videos during model training

β¬œβ¬›πŸŽ₯

Letterpress

2017 β€’ wares

A nefarious keylogger for Ubuntu.

πŸ‘‰βŒ¨πŸ’Ύ

Sniff-probes

2017 β€’ wares

Plug-and-play BASH script for sniffing 802.11 Probe Requests.

πŸ“±πŸ“£πŸ‘ƒ