{"id":29917,"date":"2015-03-20T13:41:00","date_gmt":"2015-03-20T17:41:00","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/5-unsettling-works-of-encryption-art.php"},"modified":"2015-03-20T13:41:00","modified_gmt":"2015-03-20T17:41:00","slug":"5-unsettling-works-of-encryption-art","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/5-unsettling-works-of-encryption-art.php","title":{"rendered":"5 Unsettling Works of Encryption Art"},"content":{"rendered":"<p><p>    Encryption is the process of encoding a message, and today we    have incredibly sophisticated software and algorithms that make    our encrypted messages almost impossible to decode. But how    does it work? These art projects answer that question by    exploring how encryption has become part of daily lives.  <\/p>\n<p>    Once the domain of spies and engineers, encryption is now    part of the art world. Artists are co-opting crypto tools to    build installations, objects and sculptures that explore    anonymity and digital surveillance.  <\/p>\n<p>    Often the hardware and network infrastructure of    encryption is invisible to us. These artists aim to change that    by showing us what it really looks like, and how it really    worksand in the process prove just how critical crypto really    is.  <\/p>\n<p>    In 2013, Der Spiegel published a long catalog of    tools that the NSA uses to carry out digital    surveillance. That leak served as a blueprint for artist    Francesco Tacchini, who decided to reverse    engineer two of those tools.  <\/p>\n<\/p>\n<p>    One, called CANDYGRAM, is used by the NSA to create a    fake cell towerhelpful for tracking surveillance targets via    their phones. Another, SPOOK-I, uses frequencies that humans    can't hearbut that any gadget with a microphone can pick up.    It \"surreptitiously switches a target device's traffic from a    cellular network's area of influence onto a surveilled radio    frequency,\" according to the NSA's documents.  <\/p>\n<p>    Tacchini describes his piece, SPOOK-I, as a joint \"wireless jammer and sniffer.\"    When you walk into the gallery, it jams your phone's Wi-Fi    signal and throws your name up on a nearby wall. Soon, you'll    receive an email from an @nsa.gov email reading \"this    device is now under surveillance: you have been added onto a    radio frequency controlled by the US National Security Agency.\"    Things only get weirder from there. Read more here, or over on Creative Applications.  <\/p>\n<p>    If you've seen an aerial shot of the NSA headquarters recently,    you probably have Trevor Paglen to thank. The artist (who you    might better know from his work The Last Pictures), has spent the last few years    focused on the agencies that surveil us, including     renting a helicopter to take unprecedented aerial photos of    the banal suburban headquarters of the NSA, the National    Reconnaissance Office, and the National Geospatial-Intelligence    Agency.  <\/p>\n<p>    In his latest gallery show at Altman Siegel in San Francisco, Paglen is    showing off something called an Autonomy Cube.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Go here to read the rest:<br \/>\n<a target=\"_blank\" href=\"http:\/\/gizmodo.com\/5-unsettling-works-of-encryption-art-1692368461\/RK=0\/RS=5jLPhTkwkCSnu8Irn9GS.BHGSJE-\" title=\"5 Unsettling Works of Encryption Art\">5 Unsettling Works of Encryption Art<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Encryption is the process of encoding a message, and today we have incredibly sophisticated software and algorithms that make our encrypted messages almost impossible to decode. But how does it work? These art projects answer that question by exploring how encryption has become part of daily lives. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-29917","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29917"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=29917"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/29917\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=29917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=29917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=29917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}