Digital #MediaArt(s) Numérique(s)
203.6K views | +0 today
Follow
Digital #MediaArt(s) Numérique(s)
Media Arts Watch Lab - www.arts-numeriques.info - laboratoire de veille Arts Numériques - twitter @arts_numeriques - @processing_org - @DigitalArt_be - by @jacquesurbanska @_Transcultures
Your new post is loading...
Your new post is loading...
Scooped by Jacques Urbanska
Scoop.it!

Digital Contagions : A Media Archaeology of Computer Viruses by Jussi Parikka (2007) // #security

Digital Contagions : A Media Archaeology of Computer Viruses by Jussi Parikka (2007) // #security | Digital #MediaArt(s) Numérique(s) | Scoop.it
Now in its second edition, Digital Contagions is the first book to offer a comprehensive and critical analysis of the culture and history of the computer virus.


At a time when our networks arguably feel more insecure than ever, the book provides an overview of how our fears about networks are part of a more complex story of the development of digital culture. It writes a media archaeology of computer and network accidents that are endemic to the computational media ecology. Viruses, worms, and other software objects are not seen merely from the perspective of anti-virus research or practical security concerns, but as cultural and historical expressions that traverse a non-linear field from fiction to technical media, from net art to politics of software.


Mapping the anomalies of network culture from the angles of security concerns, the biopolitics of computer systems, and the aspirations for artificial life in software, this second edition also pays attention to the emergence of recent issues of cybersecurity and new forms of digital insecurity. A new preface by Sean Cubitt is also provided.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Dynamic IP Address and Cyber Attacks - A Game of Cat and Mouse

Dynamic IP Address and Cyber Attacks - A Game of Cat and Mouse | Digital #MediaArt(s) Numérique(s) | Scoop.it

In recent years, cyber attackers have adopted a new, more surreptitious operational mandate; one that employs a set of strategies and technologies that dramatically complicates the detection process. At the forefront of these roguelike tactics: serving up dynamic IP addresses.

 

Dynamic IP addresses are an effective way to defeat IP-based defense systems: launch application-level attacks that originate from real—but dynamic—IP addresses. This paper outlines some of the most common variations of dynamic IP attacks, explores challenges in defending against them, and points to best practices for thwarting these attacks.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Le monde selon Telegram par Jef Mathiot

Le monde selon Telegram par Jef Mathiot | Digital #MediaArt(s) Numérique(s) | Scoop.it

Telegram est souvent présentée comme l’alpha et l’oméga du terrorisme de la messagerie cryptée. Nombreux sont ceux qui voient son utilisation par des djihadistes comme la conséquence logique des ses supposées qualités cryptographiques, de la personnalité libertarienne de son fondateur, Pavel Durov, ou encore de la nature insaisissable de son infrastructure juridique et technique.

 

Un intéressant article du Monde décortique l’architecture fiscale et juridique de l’organisation. L’un des développeurs de Telegram y explique, parlant de son infrastructure technique, qu’elle serait «répartie sur plusieurs points de la planète, pour des raisons de vitesse et de sécurité »...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Now You Can Hide Your Smart Home on the #Darknet by Andy Greenberg

Now You Can Hide Your Smart Home on the #Darknet by Andy Greenberg | Digital #MediaArt(s) Numérique(s) | Scoop.it

THE PRIVACY SOFTWARE Tor has aided everything from drug dealing marketplaces to whistleblowing websites in evading surveillance on the darknet. Now that same software can be applied to a far more personal form of security: keeping hackers out of your toaster.

 

On Wednesday, the privacy-focused non-profit Guardian Project, a partner of the Tor Project that maintains and develops the Tor anonymity network, announced a new technique it’s developed to apply Tor’s layers of encryption and network stealth to protecting so-called “Internet of things” or “smart home” devices. That growing class of gadgets, ranging from refrigerators to lightbulbs to security cameras, are connected to the Internet to make possible new forms of remote management and automation. They also, as the security research community has repeatedly demonstrated, enable a new breed of over-the-Internet attacks, such as the rash of hackers harassing infants via baby monitors or the potential for hackers to steal your Gmail password from your fridge.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Cyberconflict & #Hacktivism in a Contemporary Context - by Athina Karatzogianni

Cyberconflict & #Hacktivism in a Contemporary Context - by Athina Karatzogianni | Digital #MediaArt(s) Numérique(s) | Scoop.it

Currently the terms 'hacktivism', 'digital activism' and 'cyber activism' are frequently used by the various global media outlets, especially in connection with the social media-enabled protests taking place in the Middle East, Europe and elsewhere around the world. Understanding the nuances of these terms, their relationship to cyberconflict, and the difficulties for governments and the international community in responding to any type of cyberconflict incident are well worth exploring at this point in time.

 

Hacktivism is a term that combines the words hacker and activism. It refers to the art of manipulating code and using computers for political purposes. These include mobilizing supporters, creating software that helps bypass censorship or bridge digital inequality, and supporting specific campaigns, organizations, and protests around the world using electronic disobedience or social mobilization. Hacktivism in its purest form is an information-age ideology which, depending on the political spectrum, can support: peer production as an alternative mode to capitalism, copyleft or open source software, direct or participatory democracy, and transparent government...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

#Darknet 101: An Introduction to The Darkest Places Online by Daniel Smith on Radware

#Darknet 101: An Introduction to The Darkest Places Online by Daniel Smith on Radware | Digital #MediaArt(s) Numérique(s) | Scoop.it

In my last blog, I talked a little about the general principles of the cyberattack marketplace.  Today, we will take a closer look at the Darknet. There is so much talk these days about the Darknet. It’s the stuff of crime novels – a hotbed of criminal activity where anything can be bought and sold.

 

While that is true, the Darknet also provides an anonymizing layer to journalists and activists around the world who fight for the freedom of information and privacy. It is often a place where they can securely and anonymously communicate with their contacts. ...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

27.03 > 29.05.2016 - Design my #Privacy - exhibition | @ z33 house for contemporary art // #mediaart

27.03 > 29.05.2016 - Design my #Privacy - exhibition | @ z33 house for contemporary art // #mediaart | Digital #MediaArt(s) Numérique(s) | Scoop.it

Nowadays, we continually share data: a message via WhatsApp, a picture on Instagram, an update on Facebook or an e-mail through Gmail. With whom do we really share this data? And how can we make sure that our personal data stay strictly personal?

 

This exhibition addresses issues of online privacy and digital surveillance. Next to several historical examples of encrypting, ‘Design my Privacy’ also shows some surprising contemporary strategies by more than 35 young designers and artists to maintain control over our data.

 

With work by Roel Roscam Abbing, Zineb Benassarou & Jorick De Quaasteniet, Josh Begley, Dennis de Bel, Caitlin Berner & Jana Blom, Heath Bunting, F.A.T., Giada Fiorindi, Front 404, Roos Groothuizen, Arantxa Gonlag & Eva Maria Martinez Rey, Monika Grūzīte, Rafaël Henneberke, Jan Huijben, Daniel C. Howe & Helen Nissenbaum & Vincent Toubiana, Rosa Menkman, Owen Mundy, Naomi Naus, Joyce Overheul, Ruben Pater, Wim Popelier, Freek Rutkens, Vera van de Seyp, Mark Sheppard, Dimitri Tokmetzis & Yuri Veerman, Janne Van Hooff & Christina Yarashevich, Michaele Lakova, Jasper van Loenen, Jeroen van Loon, Esther Weltevrede & Sabine Niederer, Leanne Wijnsma & Froukje Tan, Joeri Woudstra, Sander Veenhof and Simone Niquille.

 

An exhibition by MOTI, Museum of the Image in Breda (NL)

Opening Saturday 26.03 at 19h30.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Anti-Drone Rifle Lets Police Take Control of UAVs With Radio Pulses

The new DroneDefender uses radio pulses to disable a hostile drone within a 400-meter radius. These pulses interrupt the communications system of the drone, making it think it is out of range. The drone’s safety protocols then kick in, forcing it to either hover, return to its point of origin, or descend slowly as it prepares to land. Because the weapon jams communication with the nearby operator, the DroneDefender also can prevent detonation and other remote functions.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

La Blockchain, cette technologie qui pourrait changer nos vies... Par Lara Charmeil

La Blockchain, cette technologie qui pourrait changer nos vies... Par Lara Charmeil | Digital #MediaArt(s) Numérique(s) | Scoop.it

Connaissez-vous la blockchain, cette nouvelle technologie de stockage et de transmission de données à coût minime, décentralisée, et totalement sécurisée ? Passionnés d'innovation, trois étudiants de l'école de management ESCP Europe nous expliquent les enjeux de cette révolution annoncée, dont ils suivent l'actualité sur leur blog, Blockchain France

Consacrée en septembre “Méga-Trend” par le World Economic Forum, la blockchain est un sujet crucial qu’il est urgent de s’approprier. "Nous croyons au potentiel de rupture de la Blockchain". C’est par ces mots que Pierre Louette, directeur général adjoint d’Orange, a annoncé mi-septembre un investissement à hauteur de plusieurs millions d’euros dans Chain, l’une des start-ups les plus prometteuses en matière de blockchain. Une technologie révolutionnaire, méconnue en France, qui promet pourtant de bouleverser nos modes de vie. ...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Projet de loi relatif au Renseignement : agissons contre la surveillance de masse ! French Surveillace State

Projet de loi relatif au Renseignement : agissons contre la surveillance de masse ! French Surveillace State | Digital #MediaArt(s) Numérique(s) | Scoop.it

Projet de loi relatif au Renseignement, loi Renseignement, Surveillance de masse des citoyens, Légalisation de pratiques illégales, Pas de contrôle des services de renseignement...


Le projet de loi Renseignement contient deux articles qui permettent une interception de l'ensemble des données de tous les citoyens français en temps réel sur Internet, dans le but de faire tourner dessus des outils de détection des comportements déviants. Cette surveillance massive de l'ensemble de la population est inadmissible : c'est une pratique dangereuse pour la démocratie et les libertés d'expression, de réunion, de pensée, d'action.

Nous ne voulons pas d'une copie de la NSA en France !

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Vers un art de l’hypercontrôle - L’Eveil de l’artiste - Retour conférence menée par Bernard Stiegler

Vers un art de l’hypercontrôle - L’Eveil de l’artiste - Retour conférence menée par Bernard Stiegler | Digital #MediaArt(s) Numérique(s) | Scoop.it
L'Eveil de l'artiste A la Cité du livre près de la bibliothèque Méjanes d’Aix-en-Provence, une conférence menée par Bernard Stiegler, s’est déroulée le 16 décembre 2014 sur la thématique d’un hypercontrôle de l’art. Cet évènement a été réalisé par Alphabetville, l’Ecole supérieure d’art d’Aix-en-Provence et Ars industrialis. Une étudiante de l'Ecole de Journalisme et de Communication…
No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Cyberfeminists Go Deep on Big Data, Privacy, and Surveillance by Ben Valentine - #feminism

Cyberfeminists Go Deep on Big Data, Privacy, and Surveillance by Ben Valentine - #feminism | Digital #MediaArt(s) Numérique(s) | Scoop.it

In mid-December, 12 hackers, artists, coders, and activists gathered to tackle issues of privacy, surveillance, anonymity, and big data as they manifest in our society. Over the course of one week, 10 presentations unfolded, a short documentary film was shot, and in a frenzy of production, an entire book was made. This was Deep Lab, a group of female cyberfeminists organized by artist Addie Wagenknecht at the Studio for Creative Inquiry in Pittsburgh, Pennsylvania. ...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

The All-Women #Hacker Collective Making Art About the Post-#Snowden Age

The All-Women #Hacker Collective Making Art About the Post-#Snowden Age | Digital #MediaArt(s) Numérique(s) | Scoop.it


“There is something about the internet that isn’t working anymore,” is the line that opens filmmaker Jonathan Minard’s short documentary on Deep Lab—a group of women hackers, artists, and theorists who gathered at Carnegie Mellon University in December to answer the question of what, exactly, that disquieting “something” is. The film premieres on Motherboard today.


What Deep Lab represents is just as hard to pin down as the “something” invoked in the opening minutes of Minard’s short film. Is it a book, a lecture series, or Minard’s documentary—all of which were put together in under a month? Is it an ethos? Is it feminist? Is Deep Lab a charrette, a dugnad, or a “congress,” as its participants called it?

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Des attaques informatiques utilisant la physique - par interstices.info

Des attaques informatiques utilisant la physique - par interstices.info | Digital #MediaArt(s) Numérique(s) | Scoop.it

Quand on parle de sécurité informatique, la plupart des gens pensent aux mathématiques et à la cryptographie au sens logique théorique, mais peu pensent à la physique. Or dans la physique se cachent actuellement de nombreuses failles de sécurité, extrêmement difficiles à anticiper.

 

Commençons par une simple énigme. Une pièce contient une ampoule éteinte, vous êtes à l'extérieur de cette pièce avec trois interrupteurs sur position « off ». Vous pouvez manipuler comme vous le souhaitez les interrupteurs mais vous ne pouvez entrer qu'une seule fois dans la pièce. Comment déterminer quel interrupteur allume l'ampoule ?

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

AppleCronPrank by Jerome Saint-Clair :)

Prank your friends ... or a whole AppleStore
Take control of Macs through cron jobs + remote app/website
Source code : github.com/01010101/AppleCronPrank

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Quelqu'un se prépare à détruire Internet dixit Bruce Schneier the spécialiste de la cybersécurité

Quelqu'un se prépare à détruire Internet dixit Bruce Schneier the spécialiste de la cybersécurité | Digital #MediaArt(s) Numérique(s) | Scoop.it

Le spécialiste de la cybersécurité Bruce Schneier a posté un article alarmiste sur son blog, des menaces pèseraient sur les structures de l'internet. C’est très sérieux. C’est LE grand expert de la cybersécurité Bruce Schneier qui l’a écrit sur son blog hier “quelqu’un est en train d’apprendre à détruire Internet” ce sont ses mots. Quand Bruce Schneier dit quelque chose comme ça, il faut mieux y prêter attention….

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

'State of Surveillance' with Edward #Snowden and Shane Smith

When NSA whistleblower Edward Snowden leaked details of massive government surveillance programs in 2013, he ignited a raging debate over digital privacy and security. That debate came to a head this year, when Apple refused an FBI court order to access the iPhone of alleged San Bernardino Terrorist Syed Farook. Meanwhile, journalists and activists are under increasing attack from foreign agents. To find out the government's real capabilities, and whether any of us can truly protect our sensitive information, VICE founder Shane Smith heads to Moscow to meet the man who started the conversation, Edward Snowden.

VICE on HBO Season 1: http://bit.ly/1BAQdq5
VICE on HBO Season 2:http://bit.ly/1LBL8y6
VICE on HBO Season 3:http://bit.ly/1XaNpct

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

UK firms develop #drone-freezing ray

UK firms develop #drone-freezing ray | Digital #MediaArt(s) Numérique(s) | Scoop.it
Three British companies have created a device to deter drones from entering sensitive areas by freezing them mid-flight

 

The Anti-UAV Defense System (Auds) works by covertly jamming a drone's signal, making it unresponsive.

After this disruption, the operator is likely to retrieve the drone believing that it has malfunctioned.

 

The system joins a host of recently announced technologies which can blast larger drones out of the sky.

 

A drone flying in sensitive airspace can be detected by the Auds radar and then sighted via a camera equipped with thermal imaging capabilities so that it can be targeted visually.

Then, a high-powered radio signal can be focused on the drone - essentially overriding the connection to whoever is operating it.

The whole process takes as little as 25 seconds, according to the manufacturers.

.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Jaywalking, interactive installation by Dries Depoorter /// #mediaart #security #privacy

Jaywalking, interactive installation by Dries Depoorter /// #mediaart #security #privacy | Digital #MediaArt(s) Numérique(s) | Scoop.it

JayWalking gives us an opportunity to watch traffic webcams and decide on the fate of pedestrians recklessly crossing the road. Old security monitors display live webcam footage of intersections in different countries. A counter at the bottom of the screen shows how much the fines are for the offense, depending on the country where it’s being committed.

 

Depoorter then presents us with a dilemma: will we report the unsuspecting jaywalker? A single click of a mouse can send a screenshot of the violation to the nearest police station.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Computer viruses deserve a museum: they're an art form of their own

Computer viruses deserve a museum: they're an art form of their own | Digital #MediaArt(s) Numérique(s) | Scoop.it

From Frodo to Skynet – the new Malware Museum shows how viruses reflect our culture and our fears.


Computer viruses now have their own museum. The recently opened online Malware Museum exhibits samples of early viruses that often include amusing graphics or popular culture references. But the significance of viruses goes beyond funny curiosities from the 1980s and 1990s.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Backslash: a toolkit for protesters facing hyper-militarized, surveillance-heavy police // #hactivism

Backslash: a toolkit for protesters facing hyper-militarized, surveillance-heavy police // #hactivism | Digital #MediaArt(s) Numérique(s) | Scoop.it

Backslash -- an "art/design" project from NYU Interactive Technology Program researchers Xuedi Chen and Pedro G. C. Oliveira -- is a set of high-tech tools for protesters facing down a "hyper-militarized," surviellance-heavy state adversary, including a device to help protesters keep clear of police kettles; a jammer to foil Stingray mobile-phone surveillance; a mesh-networking router; a "personal cloud" that tries to mirror photos and videos from a protest to an offsite location; and tools for covertly signalling situational reports to other protesters.


The kit was inspired by the experiences of protesters at the Gezi Park demonstrations in Turkey; the Hong Kong Umbrella Revolution; and Brazil's Vinegar Revolt. The designers don't plan on making the kit available; instead, it's designed as a "provocation" to stimulate discussion about the nature of protest in the 21st century.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

'Clone Zone' by Slava Balasanov​ & ​Analisa Teachworth (4Real creative studio) - #netart #hacktivism #fake

'Clone Zone' by Slava Balasanov​ & ​Analisa Teachworth (4Real creative studio) - #netart #hacktivism #fake | Digital #MediaArt(s) Numérique(s) | Scoop.it
A new tool just made every website on the internet instantly and totally customizable. Now what?


Introduce into this environment of perpetual factual ambiguity Clone Zone, a new tool that makes it easy to edit any web page on the internet. Pick your canvas of choice—it’s as simple as entering a URL. Clone Zone immediately creates an editable copy. Upload your own images, drop in your own text, and share. With Clone Zone, anyone can treat themselves to a New York Times byline or the announcement of a lucrative round of funding on TechCrunch. With this tool, the whole internet is instantly and totally customizable. ...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet | WIRED

Suite of Sophisticated Nation-State Attack Tools Found With Connection to Stuxnet | WIRED | Digital #MediaArt(s) Numérique(s) | Scoop.it

The last two years have been filled with revelations about NSA surveillance activities and the sophisticated spy tools the agency uses to take control of everything from individual systems to entire networks. Now it looks like researchers at Kaspersky Lab may have uncovered some of these NSA tools in the wild on customer machines, providing an extensive new look at the spy agency’s technical capabilities. Among the tools uncovered is a worm that appears to have direct connections to Stuxnet, the digital weapon that was launched repeatedly against centrifuges in Iran beginning in late 2007 in order to sabotage them. In fact, researchers say the newly uncovered worm may have served as a kind of test run for Stuxnet, allowing the attackers to map a way to targeted machines in Iran that were air-gapped from the internet.

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Meet the seven people who hold the keys to worldwide internet #security

Meet the seven people who hold the keys to worldwide internet #security | Digital #MediaArt(s) Numérique(s) | Scoop.it

This sounds like something out of a Dan Brown book, but it isn't: The whole Internet is controlled by seven actual, physical keys. The Guardian's James Ball was recently allowed to observe the highly secure ritual known as a key ceremony


The people conducting the ceremony are part of an organization called the Internet Corporation for Assigned Names and Numbers (ICANN). ICANN is responsible for assigning numerical Internet addresses to websites and computers and translating them into the normal web addresses that people type into their browsers...

No comment yet.
Scooped by Jacques Urbanska
Scoop.it!

Guide d'autodéfense numériques - Tome 2 — en ligne

Guide d'autodéfense numériques - Tome 2 — en ligne | Digital #MediaArt(s) Numérique(s) | Scoop.it
C'est l'objet principal de ce second tome que de permettre à tout un chacun de comprendre quels sont les risques et les limites associés à l'utilisation d'Internet [et] de se donner les moyens de faire des choix éclairés quant à nos usages de l'Internet.


Aussi :

Le Guide d'autodéfense numérique était jusqu'ici disponible uniquement en version électronique. La sortie du second tome est l'occasion d'une édition papier. Un livre incluant les deux tomes ainsi que de nouvelles illustrations vient donc de sortir aux éditions Tahin Party.


Même si le format papier rend complexe les mises à jours (n'oubliez pas de vous tenir au courant des nouvelles éditions sur http://guide.boum.org/ de temps en temps), il se révélera, nous l'espérons, un support plus facile à appréhender par certaines personnes que le format PDF.


Pour en finir avec les illusions et les demi-solutions, apprenons et diffusons des pratiques d’autodéfense numérique avec un vrai livre en papier !

No comment yet.