<br />RHIZOME DIGEST: August 9, 2002<br /><br />Content:<br /><br />+opportunity+<br />1. Bernhard Rieder: Call for Entries -digitalBIEDERMEIER<br /><br />+work+ <br />2. giselle: teleintervention egoscopio<br />3. Simon Biggs: Tristero<br /><br />+report+<br />4. Katherine Moriwaki: The Future of Wearables<br /><br />+feature+ <br />5. are flagan: Read_Me- H2K2 HOPE Conference, Part 3 (of 3)<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />1.<br /><br />Date: 08.07.02<br />From: Bernhard Rieder (me@strider.at)<br />Subject: Call for Entries -digitalBIEDERMEIER<br /><br />/// digitalBIEDERMEIER: re/producing the private ///<br /><br />>From 27th November until 1st December 2002 [d]vision, the Vienna<br />Festival For Digital Culture presents once again a diverse cross section<br />of contemporary media culture. A conference, an exhibition and<br />filmscreenings are exploring new approaches to the topic of private and<br />public sphere in digital age.<br /><br />::Call For Proposals With digitalBIEDERMEIER, [d]vision launches for the<br />first time a call for entries for the conference part of the event. From<br />27.11.2002 to 1.12.2002 we will ask Scholars from various disciplines to<br />discuss, in English or German, some of the questions imposed by the<br />general topic. Please visit our website for more info:<br /><a rel="nofollow" href="http://2002.dvision.at">http://2002.dvision.at</a><br /><br />::Call For Entries - Film/Video/Multimedia [d]vision is looking for<br />artists, who provide digital film, video, CD-ROM or webprojects<br />focussing the topics of public privacy: private/public surveillance,<br />media-cocooning, intelligent houses and ambient technologies, new<br />frontiers in digital age, digital and analogous migration, etc.<br /><br />Documentaries, fictions and shorts are welcome. Amateurfilm is an<br />important topic, too. So don't hesitate to send your video diary.<br /><br />::[d]vision is an international forum for mediatheory, digital film,<br />video and expanded media such as CD-ROM, DVD and the Internet. [d]vision<br />is exploring the media void and is bringing up important issues for the<br />competent discourse in media society. [d]vision - Festival For Digital<br />Culture presents contemporary trends and issues in mediaculture in an<br />independent festival for young professionals and the creative class in<br />Vienna / Austria.<br /><br />check out our digitalBIEDERMEIER website<br />and download the application form:<br /><a rel="nofollow" href="http://2002.dvision.at">http://2002.dvision.at</a><br /><br />Concept and Organisation<br />/ Society for Mediatheory & Digital Culture<br />/ Verein fuer Medientheorie & digitale Kultur<br />Bernhard Rieder, Mirko Tobias Schaefer, Sanna Tobias<br /><br />[d]vision<br /><a rel="nofollow" href="http://www.dvision.at">http://www.dvision.at</a><br />Festival For Digital Culture<br />A-1170 Vienna, Joergerstrasse 35/8 | Tel: +43-1-409 70 15<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />+ad+<br /><br />Limited-time offer! Subscribe to Leonardo Electronic Almanac (LEA), the<br />leading electronic newsletter in its field, for $35 for 2002 and receive<br />as a bonus free electronic access to the on-line versions of Leonardo<br />and the Leonardo Music Journal. Subscribe now at:<br /><a rel="nofollow" href="http://mitpress2.mit.edu/e-journals/LEA/INFORMATION/subscribe.html">http://mitpress2.mit.edu/e-journals/LEA/INFORMATION/subscribe.html</a>.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />2.<br /><br />Date: 08.05.02<br />From: giselle (giselle@uol.com.br)<br />Subject: teleintervention egoscopio<br /><br />egoscope<br /><br />egoscope is a mediated by media character, composed of fragments<br />distributed in many web sites. egoscope does not have a name, age,<br />neither a specific gender. It is a disembodied post-subject that can not<br />recognize itself in any space that it is not a telecommunication<br />environment. You will choose egoscope multiple identities, by the web,<br />and they will be revealed on two electronic panels and their web cams.<br /><br />egoscope lives in the limit between art, propaganda and information,<br />promoting a permanent state of disorientation and hybridism of these<br />terms. In a phrase, egoscope is an inhabitant of the global city made of<br />processes of passivity and interaction, entropy and acceleration.<br /><br />Transmissioons hours from 10 a.m. to 3 p.m., Eastern Daylight Time, From<br />august 5 to august 20<br /><br />www.desvirtual.com/egoscopio<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />3.<br /><br />Date: 08.04.02<br />From: Simon Biggs (simon@littlepig.org.uk)<br />Subject: Tristero<br /><br />******************************************<br />TRISTERO<br />A Film and Video Umbrella online project<br />******************************************<br /><br /><a rel="nofollow" href="http://www.tristero.co.uk">http://www.tristero.co.uk</a><br /><br />A 'mail-art' project in which online artists-in-residence are creatively<br />'re-cycling' unwanted digital material deposited by subscribers to the<br />Tristero website.<br /><br />Thomas Pynchon's late-Sixties state-of-America novel 'The Crying of Lot<br />49' revolves around a phenomenon called the Tristero: a clandestine mail<br />system which operates under the radar of the US Postal Service, whose<br />initiates covertly inscribe and re-direct apparently innocent letters as<br />a way of sending coded messages to each other. The Tristero is a kind of<br />hacker underworld before the fact, a secret network of marginalised,<br />dissident elements who take pride in the creative re-purposing of<br />overlooked or discarded material, transforming dead-letters and junk<br />mail into multi-layered carriers of meaning.<br /><br />At a time when junk email is reaching epidemic proportions, this Film<br />and Video Umbrella online project attempts to put some of the Tristero's<br />ideas into practice.<br /><br />Marketing communications agency, The Big Group have developed a<br />customised digital image depository to which subscribers to the Tristero<br />website can donate waste material from their mailboxes or hard drives in<br />the hope that it will be transformed into ready-made, Merz-style<br />artworks by artists.<br /><br />The first artist-in-residence, Nick Crowe has been creating work<br />throughout July, and will be replaced by Simon Biggs on 5th August.<br /><br />Forthcoming artists include Jacqueline Donachie and Michael Landy.<br /><br />A direct link to Simon Biggs' version is at:<br /><a rel="nofollow" href="http://hosted.simonbiggs.easynet.co.uk/tristero/">http://hosted.simonbiggs.easynet.co.uk/tristero/</a><br /><br />Simon Biggs<br /><br />simon@littlepig.org.uk<br /><a rel="nofollow" href="http://www.littlepig.org.uk/">http://www.littlepig.org.uk/</a><br /><a rel="nofollow" href="http://www.greatwall.org.uk/">http://www.greatwall.org.uk/</a><br /><a rel="nofollow" href="http://www.babel.uk.net/">http://www.babel.uk.net/</a><br /><br />Research Professor<br />Art and Design Research Centre<br />Sheffield Hallam University, UK<br />s.biggs@shu.ac.uk<br /><a rel="nofollow" href="http://www.shu.ac.uk/">http://www.shu.ac.uk/</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />+ad+<br /><br />**MUTE MAGAZINE NO. 24 OUT NOW** 'Knocking Holes in Fortress Europe',<br />Florian Schneider on no-border activism in the EU; Brian Holmes on<br />resistance to networked individualism; Alvaro de los Angeles on<br />e-Valencia.org and Andrew Goffey on the politics of immunology. More @<br /><a rel="nofollow" href="http://www.metamute.com/">http://www.metamute.com/</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />4.<br /><br />Date: 08.02.02<br />From: Katherine Moriwaki (kaki@kakirine.com)<br />Subject: The Future of Wearables<br /><br />With all the hype surrounding wearable technology it's hard to<br />distinguish fiction from fact. Companies like Charmed Technologies and<br />Xybernaut would have you believe the market is already cornered. Their<br />systems, based on work by seminal researchers like Thad Starner and<br />Steve Mann, are fast becoming commercial reality. Meanwhile, pioneers<br />such as Maggie Orth of International Fashion Machines and Philips<br />Research's "soft electronics" have changed how we perceive electronics<br />on the body. But before people start heading to the nearest CompUSA to<br />place their orders, there are still radical interpretations of the<br />field's future left unexplored.<br /><br />In the art world, Stelarc and Krzysztof Wodiczko have produced<br />cautionary images of technology's body integration by ignoring the<br />expressive and aesthetic potential of wearable technology. Today, within<br />the interstices of fashion, technology, and art, artist/designer hybrids<br />are developing work that challenges disciplinary boundaries, blurs the<br />borders between virtual and physical, and seeks to expand our<br />communicative capabilities.<br /><br />Taking a cross-disciplinary approach to wearables, Claudia Güdel,<br />founder of Basel Switzerland's Co-Lab, sees collaboration as the key. "I<br />launch workshops and events in the context of art, fashion and new<br />technology in order to find inspiring distinctions between these<br />fields," explains Güdel. Co-Lab's latest project, "Fab: Filters and<br />Blockers" is a series of fashion and technology workshops focusing on<br />redefining protective clothing for contemporary society. As an art and<br />technology collective Co-Lab produces installations, clothing, and<br />wearable devices. Some examples are "Paul" a skirt with built in display<br />capabilities and "Magic Eye", a light object that reacts to movement and<br />sounds in space. Here, fashion and technology contribute to a<br />constellation of artistic activity and output.<br /><br />Working with fashion as a system for interaction, Elise Co investigates<br />the conceptual and aesthetic potential of computational clothing. "I am<br />interested in multiple-body garments or networks of garments behaving in<br />some related way even though they are worn by different people in<br />different places," explains Co, Professor of New Media at Basel School<br />of Art and Design in Switzerland. Focusing on the exertion of data<br />across corporeal mass, Co's thesis from the MIT Media Lab was titled,<br />"Computation and Technology as Expressive Elements in Fashion." Her<br />projects include "Perforation", which uses fiber optics to challenge the<br />materiality of the body, and "Halo", a system for reconfigurable and<br />programmable garments. "They are designed to provoke thinking," she<br />explains. With a background in architecture, Elise's work treats the<br />body and computational data as actors within relational structures. The<br />results are hauntingly beautiful mergers between physical and ethereal<br />selves.<br /><br />While Co prompts critical thinking, Despina Papadopolous, founder of<br />5050 limited, encourages action. A philosopher and technologist,<br />Papadopolous collaborates with fashion designers and researchers to<br />explore the "maximum radius possibilities" of fashion and technology.<br />Her projects include "Courtly Bags", in collaboration with NYC designers<br />As Four, and "M-Bracelet", funded by NCR Knowledge Lab. 5050's latest<br />project, "Moi" is based on the idea of "staple technology" that starts<br />with a simple bright light. Through it's simplicity, "Moi" encourages<br />individuals to "imagine and transform an experience on their own terms".<br />"[Moi is] the most basic element turned into the most complex device<br />once it is worn," explains Papadopolous. Human, not technological<br />interaction is the focus.<br /><br />So far wearable computers have failed to gain public acceptance. Nobody<br />wants to walk around looking like a character from Star Trek.<br />Institutions like Interaction Design Institute IVREA, Italy and Parsons<br />School of Design, in New York City are taking note. They now offer<br />courses which investigate the expressive potential of wearables. In the<br />artist's case, the best approach would be greater cross-disciplinary<br />communication through the hybridization between art, fashion,<br />technology, and design. With the upcoming launch of "Moi", Papadopoulus<br />bucks the current trends by trading technological hype for common sense<br />design. "The idea of a jacket with email projected on its sleeve, or a<br />t-shirt that reads all your vital signs is so radically foreign to our<br />perception of what it is to be a person, " she laments. "It is also<br />quite divorced from the aesthetics, social and political nuances of<br />clothing. If we get our way it will be about imagination,<br />self-expression, and most importantly, inspiration."<br /><br />-Katherine Moriwaki (kaki@kakirine.com)<br />Related Links:<br />Claudia Güdel <a rel="nofollow" href="http://www.co-lab.ch">http://www.co-lab.ch</a><br /><a rel="nofollow" href="http://www.co-lab.ch/fab">http://www.co-lab.ch/fab</a><br /><br />Elise Co <a rel="nofollow" href="http://acg.media.mit.edu/people/elise">http://acg.media.mit.edu/people/elise</a><br /><a rel="nofollow" href="http://www.unibas.ch/sfg/vis_com0102/beyond">http://www.unibas.ch/sfg/vis_com0102/beyond</a><br /><br />Despina Papadopoulos <a rel="nofollow" href="http://www.moinewyork.com/">http://www.moinewyork.com/</a><br /><a rel="nofollow" href="http://www.5050ltd.com/">http://www.5050ltd.com/</a><br /><br />Interaction Design Institute IVREA <a rel="nofollow" href="http://www.interaction-ivrea.it">http://www.interaction-ivrea.it</a><br /><a rel="nofollow" href="http://www.interaction-ivrea.it/en/learningresearch/events/featuredevent/200">http://www.interaction-ivrea.it/en/learningresearch/events/featuredevent/200</a><br />20508.asp<br /><br />Parsons School of Design <a rel="nofollow" href="http://www.parsons.edu">http://www.parsons.edu</a><br /><a rel="nofollow" href="http://a.parsons.edu/~fashiontech">http://a.parsons.edu/~fashiontech</a><br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />5.<br /><br />Date: 7.25.02<br />From: are flagan (areflagan@mac.com)<br />Subject: Read_Me: H2K2 HOPE Conference, Part 3 (of 3)<br /><br />Read_Me<br /><br />H2K2 ­ HOPE Conference, July 12-14, Hotel Pennsylvania, NYC, New York<br /><br />Sida Vaidhyanathan, a cultural historian and media scholar moonlighting<br />as a professor at New York University, called his keynote crack at this<br />equation ³Life in a Distributed Age.² After collecting the usual cheers<br />for lamenting the loss of free speech and progressive scholarship due to<br />copyright and technical anti-circumvention provisions, Vaidhyanathan<br />returned to the roots of western civilization in ancient Greece to<br />outline an alternative social model based on cynicism. Derived from the<br />philosophy of Diogenes, cynicism maintains that virtue is the only good<br />and its essence lies in self-control and independence. This freedom from<br />convention coupled with moral zeal would, according to Diogenes, allow<br />for a highly practical politics that finds its expression in a<br />borderless polis, a decentralized, self-regulating, informed and<br />competent political body-at-large. Our projected cyberspace fits this<br />revolutionary corpus, but its realization in the Internet has of course<br />led to limitations that force the negotiation of more modest goals than<br />those inspired by the cynical mold. Returning to what brought him the<br />first accolade, Vaidhyanathan quoted numerous sources that seek to limit<br />the vast hospitality of the Internet as a decentralized and responsible<br />space with demonizing rhetoric. The goal is to persuade the public that<br />the Internet, and technology in general, is dangerous unless it is used<br />with the proper level of supervision and control. Statements like: ³Our<br />enemies are prepared to use our technologies against us,² which was made<br />by Richard Clarke, President Bush¹s Office of Cyber Security Director<br />(also known for his ³electronic Pearl Harbor² analogy), in relation to<br />the 9/11 tragedy are both hopelessly vague and frighteningly<br />encompassing. They raise the usual questions of who ³we² are and how<br />³technologies² became ³our.² Furthermore, Vaidhyanathan contested, if<br />the Internet helped the terrorists buy airline tickets it was box<br />cutters that initially performed and aided their gruesome deed.<br />Legislation limiting sales of sharp or pointed utensils should according<br />to this logic be forthcoming, but it is of course more likely to<br />concentrate on areas that may limit the power and profits of the few,<br />such as open computing and democratic networks.<br /><br />A similar demonizing was noted by author Doug Rushkoff in his ³Human<br />Autonomous Zones: The Real Role of Hackers.² After the dot-com pyramid<br />schemes failed so miserably (for some) and the Internet mercifully<br />shrugged off business, corporations and mainstream media have<br />increasingly started to load it with negativity. Symptoms abound and<br />Rushkoff noted that as early as the Atlanta Olympics we were subjected<br />to what the media termed an ³Internet-style² bomb. Obviously quite<br />misleading from a technical point of view (the bomb was presumably not<br />modeled after the Internet but its construction may have been available<br />on the Internet, and no doubt elsewhere), the language and context<br />thrives on ignorance and lack of contestation to support the reporting<br />media¹s role in bringing ³accurate² and ³truthful² stories. Storytelling<br />consequently formed the locus of his talk. Stories compete for believers<br />and those that control the stories we live by essentially shape our<br />reality. Rushkoff quoted numerous examples of proprietary oral<br />traditions and Walter Cronkite¹s signature byline at the end of his<br />newscasts, ³that¹s the way it is,² summarizes most of them. Within this<br />closed and one-directional economy of exchanges, hackers emerged as<br />autonomous voices in a climate where independence was outlawed. By<br />breaking the spell of programming and feeding broadcasts into a feedback<br />loop, they demystified technology through shareware and made it<br />available for uses and contexts that were not supported by the<br />hierarchical structure whereby stories were, and still are,<br />disseminated. Current attempts at legislating the Internet and the<br />airwaves, and even hardware (see notes on the Microsoft Palladium<br />standard above), seek to restore the bullhorn mentality that hackers<br />passionately resist. As computer interfaces and operating systems have<br />become increasingly opaque to produce more end-users with entertainment<br />terminals rather than computing platforms, hackers have maintained<br />knowledge of computing and not lost sight of the broader social<br />interaction that encodes choices and spread information. Here rests the<br />autonomous zone that remains the real role and function of hackers.<br /><br />Another panel presenting the Indymedia network of Independent Media<br />Centers (IMC) brought some of this philosophy to a practical solution.<br />Indymedia was developed as a continuation and expansion of an online<br />newsroom offered during the pro-democracy protests in Seattle. It<br />revolves around an evolving open source code that is distributed by<br />participating Indymedia Web sites in many countries. The code supports<br />the upload of rich media content such as images, and the sites<br />consequently offer users the ability to post their own news stories with<br />a local and personal flavor. Some translation and cross-posting takes<br />place. Links to sites on the global IMC network are available at<br />www.indymedia.org.<br /><br />But pockets like the Indymedia network are unfortunately becoming<br />increasingly rare on the Internet as licensing restrictions and fees<br />limit Web casting and the forceful influx of corporate interests are<br />seeking to silence and dominate it. Several talks dwelled on these<br />developments and although the topics were different, the methods<br />encountered displayed a clear pattern where lawyers are replacing<br />individual policing of copyright and trademarks for federal legislation<br />intended to represent their interests. How a democratic body can become<br />the executive branch of select corporations has of course already been<br />answered by the recent revelations surrounding White House ties to<br />industry.<br /><br />The panel titled ³Bullies on the Net,² featuring Emmanuel Goldstein,<br />Eric Grimm and Uzi Nissan, first covered the 30 lawsuits brought by Ford<br />Motor Company against virtually every domain name that could in some way<br />be associated with any of its own or subsidiary car models or brand<br />names. A Swede selling used spare parts for classic Volvo vehicles (a<br />company part own by Ford) was consequently sued for pursuing a modest<br />and entrepreneurial livelihood under www.classicvolvo.com. Likewise,<br />fans of the endangered jaguar at www.jaguarcenter.com (currently<br />featuring a nice big-cat drawing by Amanda, age 13) were slapped with a<br />suit to avoid confusion between things that purr and things that rev.<br />Uzi Nissan, who by the merits of his own last name claimed Nissan.com in<br />1994 to advertise a computer business, Nissan Computers, which he<br />started in 1991, talked about his own collision with the car industry.<br />Five years later after his entry in the domain name root, Nissan Motor<br />Company, also known as Datsun (unlike Nissan who has always been known<br />as Nissan), sued him for 10 million dollars. The legal back and forth is<br />still ongoing and Nissan, the man, is 2.2 million dollars in the red as<br />a result. Due process in this type of litigation involves intimidation<br />followed by an attempt to exhaust the opponent¹s resources, and it has<br />obviously established precedents that have little to do with basic<br />fairness under the law.<br /><br />For those interested in subversive uses of media and still remain<br />somewhat puzzled by the contention last year that bin Laden was<br />inserting hidden messages in his video broadcasts (rather than<br />straightforward arguments that Americans should not hear), would have<br />enjoyed the talk Peter Wayner (www.wayner.org) gave on steganography,<br />which translates as the art and science of hiding information in digital<br />data. Although he was hard pressed to define ³hidden,² and was shrewdly<br />hiding his lack of a definition behind Goedel¹s theorem that prevents us<br />from being logical about detection, the methods outlined were<br />elucidating enough to bypass such premises. Generally, to hide data in<br />data means that it must be inserted in places where it will not be<br />detectable unless you know where and how to look for it. In some<br />respects (and just to confuse matters further), you essentially need to<br />know what has taken place to describe what has happened. The Catch-22<br />can look like this: in a standard image file data can be replaced up to<br />a threshold without affecting how the image appears to the viewer.<br />Examining the distribution of tones, however, may indicate certain<br />levels of suspicious patterns, but this is not a guarantee that<br />something secret or evil has been embedded; it may be the work of a<br />benign compression algorithm, for example. Of the methods covered, the<br />least technical from a non-computer science point of view was the<br />replacement of digital noise, or redundant information, with a message.<br />Wayner showed illustrations of how he had written algorithms to perform<br />such tasks for image files. It basically involves replacing the least<br />significant bit in the bit plane with one that belongs to the ³hidden²<br />message; i.e if a value of 255 is changed to 254 in a binary notation<br />the result goes from 11111111 to 11111110, where the last digit<br />signifies the alteration of data. Without direct references or a<br />comparative analysis that point to this manipulation, the conundrums of<br />detection discussed above are obviously haunting any claims about secret<br />transmissions (for example in relation to the aforementioned video<br />tapes).<br /><br />Interestingly, researchers looking to embed digital watermarks in<br />copyrighted content have embraced steganography to turn the copying of<br />digital files into an ally in their protection schemes. One<br />not-so-secret message here is that any unauthorized use of images, for<br />example, can be successfully contested in a court of law, as the<br />steganographic content, once unveiled, can be submitted as evidence that<br />the offending file is indeed controlled and owned by the prosecuting<br />party. Uses of the same science have essentially gone from being banned<br />to becoming highly desirable once the rights to secrecy are reversed.<br /><br />An emerging term that borrows from its hacker roots is hacktivism.<br />Broadly it covers activities that primarily use the Internet, although<br />it arguably covers technology in any form, to stage demonstrations.<br />Treating cyberspace as a public arena, activists turned hacktivists seek<br />to engage issues over the network, just like people have assembled and<br />marched in the streets to voice their opinions or misgivings. In a<br />presentation entitled ³Digital Demonstrations: DDoS attack or Cyber<br />Sit-in?,² Maximillian Dornseif offered a thoughtful and balanced<br />overview of this kind of action. The benefits of moving protest online,<br />as he presented them, were the increased visibility of the protest to a<br />larger number of people; the lack of a physical presence (anyone with<br />the inclination and an Internet connection can take part); increased<br />anonymity for those involved; and a reduced investment with regards to<br />time and money. Although ³demonstrators² are not easily counted online,<br />advertising the actions in advance can compensate for this shortcoming,<br />and consequently attract hungry-for-novelty media attention to these new<br />forms of protest. The agenda is inadvertently reported even if the<br />format feeds the story. Many online demonstrations have already taken<br />place. Dornseif gave technical beta on how demos have occurred in the<br />past (mainly through service overloads generated by reloading Web sites<br />repeatedly or seeking processing that quickly exhausts the system<br />resources), but he stressed that the future of online protests should<br />take other users into account and avoid denial of service attacks. The<br />point is to forcefully make a case, not to damage it. Of the technical<br />scenarios he offered, the prospects of ³communicating slowly² (as he<br />named the self-explanatory method) seemed the most promising. By<br />communicating with the server one character at a time, the system<br />resources are slowed to a painful crawl. Comparing the plan to one<br />where, for example, office workers ³strike² by doing their duties in<br />slow motion (the analogy is not applicable to certain bureaucracies, as<br />time will cease to exist), these protests could be explained legally<br />within already existing guidelines and in keeping with more traditional<br />forms of demonstration. Protesters would less likely become victims of<br />persecution and prosecution as a result.<br /><br />No hacker conference is of course complete without a set of<br />presentations dealing with the art and craft of hacking itself. These<br />were usually high on entertainment value and quite intriguing with<br />regards to the science, but they were outnumbered by talks addressing<br />social and political issues concerning the hacker community. A couple of<br />presentations dealing with computer viruses and the security of wireless<br />networks are worth mentioning to expose precisely how futile ant-virus<br />software can be and how networking through 802.11b can, almost, be<br />equated with public broadcasting.<br /><br />Robert Lupo, with the you-guessed-it handle of Virus, gave a PowerPoint<br />overview of what viruses are, i.e. self-replicating code that attaches<br />to a host, and how viruses may be defined, as malicious code that<br />executes on behalf of the user but without his or her knowledge or<br />approval. The number of viruses eventually accumulated in this talk and<br />their various methods of implementation (some spoken of with open<br />admiration) were enough to make any computer user feel like a<br />hypochondriac. Adding to the earliest virus discovered in 1981, there<br />are now about 71,000 known viruses (currently increasing with about 1000<br />³official² viruses per year), but only a handful have reached any kind<br />of notoriety in the wild. Working as an anti-virus programmer, Lupo<br />reported that the anti-virus companies receive about 400-800 viruses per<br />month that they have to neutralize. The offshoot of all this is that<br />your anti-virus software always works retroactively; it provides a cure<br />for an already known virus that rarely remains in circulation for very<br />long. Or in common cold terms: the epidemic has passed by the time you<br />have paid for and received your flu shot. Of course, stray strands may<br />still be around, but the risk of infection is dramatically reduced. The<br />most advanced anti-virus applications actually update their protection<br />files continually to reduce the risk of exposure. For common users, such<br />practices are of course impractical, but they are reflected in how<br />desktop software is starting to link their applications to servers that<br />update files of known viruses regularly. As for more drastic<br />improvements, Lupo discussed software that detects any hostile activity<br />in a system and alerts the user before it is able to execute. Unlike the<br />applications used today, this will provide more general security against<br />malicious code. The best protection of all, however, it to leave the<br />anonymous messages that say ³I love You² or ³How would you like a<br />million dollars?² alone before you remove them.<br /><br />As far as hands-on hacking without entry goes, the ³Fun with 802.11b²<br />panel was a live performance with plenty of part numbers and DIY<br />gadgets. Pointing a network sniffer in the general direction of Midtown<br />Manhattan, Dragorn, Porkchop and StAtIc FuSiOn projected the findings<br />behind them as a streaming backdrop of data packets from hundreds of<br />networks in the area. Only about half actually encrypted their traffic,<br />and quite incredulously a quarter had maintained the default factory<br />settings for access (the consequences of which were not explored but<br />remain clear). Fun and games were also at the presenting hackers own<br />expense, however, as the sniffer was picking up local traffic from the<br />conference network and this did, of course, not go unnoticed for long by<br />the equipped crowd. Soon messages communicating room numbers for<br />explicit purposes dominated the packets. But somewhere in the audience<br />someone brilliantly mixed up accepted file path syntax with language and<br />cleverly pitted it against the crazed paranoia of secrecy, monitored<br />networks and criminalized hacker activity by forwarding<br />usr/local/bin/laden. That action appropriately and succinctly sums up<br />HOPE.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />Rhizome.org is a 501©(3) nonprofit organization. If you value this<br />free publication, please consider making a contribution within your<br />means.<br /><br />We accept online credit card contributions at<br /><a rel="nofollow" href="http://rhizome.org/support">http://rhizome.org/support</a>. Checks may be sent to Rhizome.org, 115<br />Mercer Street, New York, NY 10012. Or call us at +1.212.625.3191.<br /><br />Contributors are gratefully acknowledged on our web site at<br /><a rel="nofollow" href="http://rhizome.org/info/10.php3">http://rhizome.org/info/10.php3</a>.<br /><br />Rhizome Digest is supported by grants from The Charles Engelhard<br />Foundation, The Rockefeller Foundation, The Andy Warhol Foundation for<br />the Visual Arts, and with public funds from the New York State Council<br />on the Arts, a state agency.<br /><br />+ + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +<br /><br />Rhizome Digest is filtered by Rachel Greene (rachel@rhizome.org).<br />ISSN: 1525-9110. Volume 7, number 32. Article submissions to<br />list@rhizome.org are encouraged. Submissions should relate to the theme<br />of new media art and be less than 1500 words. For information on<br />advertising in Rhizome Digest, please contact info@rhizome.org.<br /><br />To unsubscribe from this list, visit <a rel="nofollow" href="http://rhizome.org/subscribe.rhiz">http://rhizome.org/subscribe.rhiz</a>.<br /><br />Subscribers to Rhizome Digest are subject to the terms set out in the<br />Member Agreement available online at <a rel="nofollow" href="http://rhizome.org/info/29.php3">http://rhizome.org/info/29.php3</a>.<br />