The electromagnetic spectrum is where we communicate. It's radio, it's wifi, it's cellular. While regulation is crucial to making it all work, priority is being given to powerful companies over public use. The small areas available for experimentation and play are being squeezed, but it's hard to fight for a commons that is invisible.
Dolby Laboratories commissioned Studio Studio to create an experiential installation for their new HQ in San Francisco. We wanted to create an experience that evoked awareness of the present moment through visualizing real time motion within a volumetric display. The sculpture represents sound and visualizes motion through light.
Messages from the Mines is an interactive art installation that excavates and archives hidden messages embedded in the Bitcoin blockchain.
We threw an art show at a hacker conference to try and bridge the gap between the creative work in cybersecurity and contemporary art.
Holypager is a system that intercepts all POCSAG pager messages in the city it resides and forwards them to one (holy) pager. The installation anonymizes all messages and forwards them randomly to one of three pagers on display. Each message is also printed on a contiguous role of receipt paper amassing a large pile of captured pages for gallery goers to peruse.
An interactive installation and digital literacy workshop that visualizes nearby WiFi data as a virtual environment. This project is a revamp of the Probe Kit project.
Something radical is happening right now with Artificial Intelligence. It appears that we may now be on the verge of an unprecedented paradigm shift in how we think about and employ computers. For decades, weβve been writing programs in the form of line-by-line instructions. We are now beginning to move away from these limitations, instead teaching machines to learn on their own.
With the discovery of security vulnerabilities that affect millions of users, comes a great responsibility. How do you share this information that with the parties that it most affects and with the public?
Probe Kit is a critical software art project that puts a fragment of the network surveillance and collection capabilities available to larger entities in the hands of "hobbyist network data collectors."
All of the Wi-Fi devices you own are constantly broadcasting the name of every networks theyβve ever connected to. Turn them off. You know how your phone automagically connects to any Wi-Fi network its seen before? Ever wondered how that works? Itβs blatantly stupid. Whenever your phoneβs Wi-Fi is turned on, but not connected to a network, it openly broadcasts the SSIDs (network names) of all previously-associated networks in an attempt to connect to one of them.
What if websites borrowed compute resources from their visitorβs devices while they browsed as a means of distributed computing?
Zetamaze was an experimental collaborative web game that allowed visitors to edit, draw on, and explore a virtual 3D maze. It briefly became popular on on several internet image boards during the Winter of 2014 and thousands of users anonymously created artworks and shared files with one another through the game.
WebRoutes is a critical artware project that provides viewers with a window into the Internet infrastructure and geopolitical network topology that is inherently invisible to them as they browse the web.
Attacking private networks from the Internet with DNS rebinding. TL;DR Following the wrong link could allow remote attackers to control your WiFi router, Google Home, Roku, Sonos speakers, home thermostats and more.
Music is storytelling. Melodies are memories. We create them from the musical experiences, conscious and unconscious, that we are exposed to throughout our lifetimes. Passed down through time in a kind of oral tradition, the music that we make today carries with it embeddings of the culture and people of times long past. Musical motifs are not the product of an individual artist, but rather a reinterpretation of the musical ideas that have been presented to them, for them to reinterpret and pass along to others. In this way, writing music can be thought of as less of a process of authorship and instead a practice of remix.
This is a brief walk-through tutorial that illustrates how to crack Wi-Fi networks that are secured using weak passwords. It is not exhaustive, but it should be enough information for you to test your own network's security or break into one nearby. The attack outlined is entirely passive (listening only, nothing is broadcast from your computer) and it is impossible to detect provided that you don't actually use the passwords that you crack.
Between the Two of These is a public Media Art installation that was presented at the Digital Arts Entertainment Lab (DAEL) in Atlanta, GA.
Distributed denial-of-service (DDoS) attacks are dependable, age-old, methods of bringing down remote computers and the services they provide. Attacks come in many shapes and sizes and have been seemingly more frequent and damaging recently. DDoS is effective because it leverages the bandwidth and throughput of thousands of computers, all under a single attackerβs control as a botnet, to target a machine or network. Sure, botnets can be purchased through forums and marketplaces on the darknet, but what if you wanted to DoS a server using only a single machine from the comfort of your own home.
A replica of a traffic controller box that doubles as a portable audio and video surveillance bunker.