<br />RHIZOME DIGEST: August 2, 2002<br /><br />Content:<br /><br />+work+ <br />1. Mark Tribe: Are Friends Electric?<br />2. Pall Thayer: New Project Online<br />3. Christiane Paul: Keith+Mendi Obadike - The Interaction of Coloreds<br />4. Christina McPhee: WIRED RUINS<br /><br />+report+<br />5. are flagan: Read_Me - H2K2 HOPE Conference, Part 2<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />1.<br /><br />Date: 07.27.02<br />From: Mark Tribe (mt@rhizome.org)<br />Subject: Are Friends Electric?<br /><br />from <a rel="nofollow" href="http://www.arefriendselectric.com">http://www.arefriendselectric.com</a><br /><br />Hi. Starting today, Friday July 26, 2002, approximately four dozen<br />artists, writers, and musicians are posting online personal ads,<br />confronting the commercialization of personal relationships, exploring<br />the idea of online identities, and maybe trying to pick someone up. We<br />picked Nerve.com (<a rel="nofollow" href="http://personals.nerve.com">http://personals.nerve.com</a>) because of their overt<br />focus on a hipper, artier clientelle (not coincidentally a much-covetted<br />marketing demographic). You can find the ads by doing a search for<br />³afe_². Considering that we are not affiliated with Nerve.com, there is<br />the possibility that the ads will be taken down, so we plan to archive<br />them here in the next few days.<br /><br />You can try to sign in to Nerve using name: afe_guest Password:<br />gastropod<br /><br />If you have any comments, please be sure to join the discussion in the<br />message board.<br /><br />Your ?friends¹,<br /><br />Giovanni Garcia-Fenech and Jody Hughes<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />2.<br /><br />Date: 07.31.02<br />From: Pall Thayer (pall@fa.is)<br />Subject: New Project Online<br /><br />The Intercontinental Spontaneous Jam Session is a new project by Pall<br />Thayer. The project explores abstract imagery via a multi-user musical<br />web interface. It was first presented (half finished) at the Atlantic<br />Cultural Space conference in Canada in May. Thanks to the kind efforts<br />of <a rel="nofollow" href="http://www.this.is">http://www.this.is</a> and the Icelandic Academy of the Arts, it is now<br />accessible online at <a rel="nofollow" href="http://www.this.is/pallit/isjs">http://www.this.is/pallit/isjs</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />3.<br /><br />Date: 08.01.02<br />From: Christiane Paul (Christiane_Paul@whitney.org)<br />Subject: Keith+Mendi Obadike - The Interaction of Coloreds<br /><br />The Interaction of Coloreds<br />Keith+Mendi Obadike<br /><br />artport gate page August 02<br /><a rel="nofollow" href="http://artport.whitney.org">http://artport.whitney.org</a><br /><br />PROTECT YOUR PORTAL!<br />Websafe colors aren't just for webmasters. Register with the IOC Color<br />Check System® and protect your online community from unwanted visitors.<br /><br />IOC Color Check System®<br /><br />Hyper-Race® Based Solutions for the Discriminating e-Business<br /><br />What smart consumers and savvy e-businesses know but few can afford to<br />admit is that there is still a link between skin color and money. It has<br />become increasingly difficult for businesses to track color. The<br />problems increase exponentially when we enter the shifty and sometimes<br />dark world of e-commerce.<br /><br />In the good old days we had methods like the tried and true brown paper<br />bag test. But in this fast-paced, ever-changing world of e-commerce and<br />online communities, who can afford the time and embarrassment of taking<br />or administering a brown paper bag test in public? The Interaction of<br />Coloreds Color Check System® is your answer!<br /><br />APPLY NOW<br /><a rel="nofollow" href="http://artport.whitney.org">http://artport.whitney.org</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />+ad+<br /><br />**MUTE MAGAZINE NO. 24 OUT NOW** 'Knocking Holes in Fortress Europe',<br />Florian Schneider on no-border activism in the EU; Brian Holmes on<br />resistance to networked individualism; Alvaro de los Angeles on<br />e-Valencia.org and Andrew Goffey on the politics of immunology. More @<br /><a rel="nofollow" href="http://www.metamute.com/">http://www.metamute.com/</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />4.<br /><br />Date: 08.02.02<br />From: Christina McPhee (christina112@earthlink.net)<br />Subject: WIRED RUINS<br /><br />please forward<br />apologies for cross posting…….<br /><br />Wired Ruins: Digital Terror and Ethnic Paranoia (Issue 3)<br />URL: <a rel="nofollow" href="http://ctheorymultimedia.cornell.edu">http://ctheorymultimedia.cornell.edu</a><br /><br />Reacting to the complex horrors of terrorism while resisting the<br />surveillance regimes of the disciplinary state, "Wired Ruins" invites<br />its users to intermix critically with net.art projects in three<br />interactive databases: "Digital Terror: Ghosting 9-11," "Ethnic<br />Paranoia, before and beyond," and "Rewiring the Ruins." Resisting the<br />repression of the new age of censorship, "Wired Ruins" presents digital<br />and viral networks of ethnic identities that emit faint signals for<br />recognition among the overlapping diffusions of cultural angst and<br />digital terror.<br /><br />Exhibiting artists: YOUNG-HAE CHANG HEAVY INDUSTRIES, Horit<br />Herman-Peled, Tracey Benson, Jay Murphy & Isabelle Sigal, xiix, Lewis<br />LaCook, Davin Heckman, Robert Hunter & Guilermo Aritza, Dror Eyal &<br />Stacy Hardy, David Golumbia, Jason Nelson, Dirk J. Platzek & Han Gene<br />Paik, Tobias van Ween & Alex Bell, Andrew Hieronymi & Tirdad Zolghadr,<br />Christina McPhee, and Jason Nelson.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />+ad+<br /><br />Leonardo Electronic Almanac (LEA) publishes monthly issues exploring the<br />work of contemporary artists, scientists, developers of new media<br />resources, and other practitioners working at the intersection of<br />art,science and technology. Subscribe now<br />at:<a rel="nofollow" href="http://mitpress2.mit.edu/e-journals/LEA/INFORMATION/subscribe.html">http://mitpress2.mit.edu/e-journals/LEA/INFORMATION/subscribe.html</a>.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />5.<br /><br />Date: 7.25.02<br />From: are flagan (areflagan@mac.com)<br />Subject: Read_Me: H2K2 HOPE Conference, Part 2<br /><br />Read_Me, Part 2<br /><br />H2K2 ­ HOPE Conference, July 12-14, Hotel Pennsylvania, NYC, New York<br /><br />One of the most vocal sessions came in the form of ³Crypto for the<br />Masses,² a panel compiled of Matt Blaze, Greg Newby, Anatole Shaw and a<br />fourth unknown party who declined the honors of putting HOPE on the<br />resume. It sought to investigate methods whereby personal identity,<br />anonymity and the right to privacy may be preserved in a network<br />environment, and furthermore to discuss the hurdles faced by crypto and<br />its adopters. After covering the tried and tested, but somewhat hard to<br />implement for the less computer literate, PGP (Pretty Good Privacy)<br />schemes that are in the process of disappearing, the encryption built<br />into Web browsers became a topic. Primarily developed to satisfy a<br />consumer demand for secure credit card processing, it was deemed<br />laughable from a security point of view. More show than tell, it is<br />primarily there to lend an appearance of security, and the panelists<br />unanimously agreed that it is, perhaps unbeknownst to most computer<br />users, rather pointless to embed security into an otherwise insecure<br />environment, such as, to quote the favorite hacker example, the Windows<br />operating system. Metaphorically and simplistically speaking it amounts<br />to installing a steel door in a paper building.<br /><br />Privacy, however, loves company and the question is if encryption is<br />really needed or desired for the vast majority of byte transactions that<br />take place over the Internet daily. It is a public space and most people<br />want to be seen and heard while browsing and expressing themselves in<br />its passages. While few disagree with this sentiment, it becomes<br />problematic when encryption is by design denied some, like regular<br />computer users, and made available to others, like government. Failed<br />government schemes like Key Escrow, which was outlined by Matt Blaze in<br />the session ³Educating Lawmakers: Is it Possible?,² speaks of an<br />authoritarian paranoia that is afraid of encryption on the grounds that<br />it will deny (it) access to information. Key Escrow involved the<br />prototype production of a Clipper chip with a proprietary encoding<br />algorithm embedded that moreover demanded all encryption keys to be<br />passed on to the NSA through a backdoor.<br /><br />In the ³Crypto for the Masses² panel Blaze had already made a strong<br />case for why widely available encryption might be a good thing all<br />around. Recognizing that the Internet will always be the subject of<br />surveillance, he suggested that encryption would only slightly diminish<br />surveying powers by crucially demanding that agents take an extra step<br />to access this type of information. On the flipside, and to the benefit<br />of those collecting what in their view amounts to evidence, more<br />sensitive information will arguably be passed along encrypted channels<br />over the Internet, which will make it open to a subpoena.<br /><br />But if it is at all possible to educate lawmakers about such pros and<br />cons was perhaps inadvertently answered by fellow panelist and<br />journalist Declan McCullagh (www.politechbot.com) with his hilarious,<br />and equally shocking, anecdotes about ignorance in D. C. How about the<br />legislative body of Dianne Feinstein, a Democrat from California, that<br />let out a squeamish scream when the word mouse crept into the technology<br />dialog and was mistaken for a stray rodent? And as Lamar Smith, a<br />Republican from Texas and the sponsor of the Cyber Security Enhancement<br />Act passed by the House of Representatives on July 15 (the CSEA imposes<br />the possibility of life sentences for ³reckless² hackers), commented<br />earlier this year: "Until we secure our cyber infrastructure, a few<br />keystrokes and an Internet connection is all one needs to disable the<br />economy and endanger lives?A mouse can be just as dangerous as a bullet<br />or a bomb." Somehow, and perhaps not so surprisingly, the<br />instrumentality of knowledge and education has been replaced by a<br />somewhat irrational fear of plastic pointing devices (that are easily<br />confused with furry animals, or weapons of mass destruction).<br /><br />A heated-to-the-point-of-boiling discussion that crept across both<br />security-related panels was the forthcoming introduction of the<br />Microsoft Palladium standard. Essentially an updated version of the<br />principles employed by the failed Key Escrow plan, it involves, through<br />an already ongoing collaboration with the chip manufacturer Intel, the<br />implementation of hardware controls under what has been billed as a<br />³trusted² computing platform. Problem is that you may as well pay a lot<br />less and get a nice color TV that remains similar in scope and is less<br />hostile to its owner. Microsoft and its cohorts will essentially decide<br />what you may or may not do with your machine, and it is not even a<br />qualified guess to suggest that built-in monitoring and digital rights<br />management will fit the bills that support the unilateral trust being<br />built here. While the science of the project was described as retarded<br />by those in the know, it will of course adversely affect how the<br />majority of users experiences computers in the not so distant future.<br />Put succinctly, the Microsoft advertising slogan of ³Where do you want<br />to go today?² becomes even more of a dumb rhetorical question. A<br />contention was offered, however, that owners would hate their dictating<br />machines with such vigor that widespread tinkering with the control<br />mechanisms will turn the end-user population as a whole into ³hackers²<br />and launch a new, open collectivity in computing. Similar concerns were<br />expressed with regards to privacy. If there were a serious spill of some<br />proportion, consumers would demand cryptography applications to protect<br />their identities and communications, if and when desired. Both<br />projections resound as feasible, but it would certainly be preferable to<br />bypass potential bankruptcy or disaster and go straight to the decent<br />and desirable products that respectfully take their owners and users<br />into account.<br /><br />Hackers have always believed that computers and technology have a vast<br />potential to make people¹s lives better. But rather than dwelling on<br />cyberpunk utopias and futuristic projections of the lofty metaphysical<br />kind, hackers have developed the skills to actually approach this<br />fundamental premise from a very pragmatic angle. Hacking is not, at its<br />philosophical and practical core, a destructive enterprise, but rather a<br />directed quest for the improvement of existing systems. Given how<br />central the cause is for the application of knowledge and skills, there<br />were a number of talks that addressed, as already noted, the current<br />network environment in analogous relation to society at large.<br /><br />END OF PART 2<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />Rhizome.org is a 501©(3) nonprofit organization. If you value this<br />free publication, please consider making a contribution within your<br />means.<br /><br />We accept online credit card contributions at<br /><a rel="nofollow" href="http://rhizome.org/support">http://rhizome.org/support</a>. Checks may be sent to Rhizome.org, 115<br />Mercer Street, New York, NY 10012. Or call us at +1.212.625.3191.<br /><br />Contributors are gratefully acknowledged on our web site at<br /><a rel="nofollow" href="http://rhizome.org/info/10.php3">http://rhizome.org/info/10.php3</a>.<br /><br />Rhizome Digest is supported by grants from The Charles Engelhard<br />Foundation, The Rockefeller Foundation, The Andy Warhol Foundation for<br />the Visual Arts, and with public funds from the New York State Council<br />on the Arts, a state agency.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />Rhizome Digest is filtered by Rachel Greene (rachel@rhizome.org).<br />ISSN: 1525-9110. Volume 7, number 31. Article submissions to<br />list@rhizome.org are encouraged. Submissions should relate to the theme<br />of new media art and be less than 1500 words. For information on<br />advertising in Rhizome Digest, please contact info@rhizome.org.<br /><br />To unsubscribe from this list, visit <a rel="nofollow" href="http://rhizome.org/subscribe.rhiz">http://rhizome.org/subscribe.rhiz</a>.<br /><br />Subscribers to Rhizome Digest are subject to the terms set out in the<br />Member Agreement available online at <a rel="nofollow" href="http://rhizome.org/info/29.php3">http://rhizome.org/info/29.php3</a>.<br />