technology

let's Cryptoparty again

Cryptoparty sticker

Mittwoch, 30. April 2014
ab 18.00 Uhr bis ca. 21.00 Uhr Workshops und freies Rumhängen

Cryptopartys sind eine globale DIY-Initiative zur Emanzipation aus der technologischen Unmündigkeit.

Wir meinen, das Thema der digitalen Rundum-Überwachung sollte gerade auch an der Kunsthochschule für Medien kritisch beleuchtet werden. Deshalb freuen wir uns besonders, bereits die zweite Cryptoparty zu veranstalten.

Wieder geht es um die Rückeroberung der Datenhoheit. In entspannter Atmosphäre wird konkretes Wissen rund um Verschlüsselungstechniken und die digitale Selbstverteidigung vermittelt. Bitte Laptop, Notebook oder Vergleichbares mitbringen, um gleich vor Ort loslegen zu können.

Eine Initiative des Surveillant Architectures Seminars mit Jürgen Fricke.

GLASMOOG, Kunsthochschule für Medien Köln

p.s.
wer sich vorbereiten will oder morgen keine Zeit hat:
(auf deutsch): https://digitalcourage.de/support/digitale-selbstverteidigung
(English): Eff’s Surveillance Self-Defense site: https://ssd.eff.org/

Ich bringe diese hier mit

meanwhile, deep in the uncanny valley…

Freakishly realistic telemarketing robots are denying they’re robots

Recently, Time Washington Bureau Chief Michael Scherer received a phone call from an apparently bright and engaging woman asking him if he wanted a deal on his health insurance. But he soon got the feeling something wasn’t quite right.

After asking the telemarketer point blank if she was a real person or a computer-operated robot, she chuckled charmingly and insisted she was real. Looking to press the issue, Scherer asked her a series of questions, which she promptly failed. Such as, “What vegetable is found in tomato soup?” To which she responded by saying she didn’t understand the question. When asked what day of the week it was yesterday, she complained of a bad connection (ah, the oldest trick in the book).

Here, listen for yourself:

Several Time reporters called her back.

Her name, she said, was “Samantha West.” More from Time:

If you want, you can call her too. Her number is (484) 589-5611. This number, if you Google it, is the subject of much discussion online as other recipients of Samantha West calls complain on chat boards about the mysteriously persistent lady who keeps calling them. “A friendly sounded woman on the other end claimed I requested health insurance information,” writes one mark. “She doggedly refused to deviate from her script.”

Let’s call her next time we do the seminar!

http://xkcd.com/632/

Futurelab Ars Electronica

On Dec. 3rd, Futurelab has gone Open Source.
http://www.aec.at/aeblog/en/2013/12/03/opensource/
About Ars Electronica Futurelab- “Ars Electronica Futurelab focuses on the future at the nexus of art, technology and society. We consider our works as sketches of possible future scenarios in art-based, experimental forms. In this way, we are aiming at developing contributions through methods and strategies of applied science, the results of which reveal new knowledge and experiences of societal relevance in art and science. The lab’s team bases its work commitment upon transdisciplinary research and work which results in a variety of different disciplines at the lab. Having Artists and Researchers from all over the globe collaborating with – and taking residencies at – the Ars Electronica Futurelab, is fundamental to this Atelier/Laboratory. Our range of services concentrates on expertise developed throughout the years in fields such as media art, architecture, design, interactive exhibitions, virtual reality and real-time graphics.”

new developments

New Internet Monitor report: “Measuring Internet Activity”
Internet Monitor is delighted to announce the publication of “Measuring Internet Activity: A (Selective) Review of Methods and Metrics,” the second in a series of special reports that focus on key events and new developments in Internet freedom, incorporating technical, legal, social, and political analyses.

“Measuring Internet Activity,” authored by Robert Faris and Rebekah Heacock, explores current efforts to measure digital activity within three areas: infrastructure and access, control, and content and communities.
From Internet Monitor, “New Internet Monitor report: ‘Measuring Internet Activity: A (Selective) Review of Methods and Metrics'”
About Internet Monitor | @thenetmonitor

physical and virtual

In the words of Eric Schmidt, executive chairman at Google (paraphrased, I can’t find the original quote):

“Identity will change from something that originates in the physical world and is being projected into the virtual world, to Identity that is created in the virtual and experienced in the physical world.”

Coincidentally, there is this news story about how US officials set up tents in hotel rooms where they fear surveillance. Shielding from video cameras, defeating audio bugs with a white noise generator, and even protecting against electromagnetic snooping. It took some work to find out what they look like from the outside. They appear very physical indeed. A psychoanalytic’s dream.

tenda-gonfiabile-010

tent-ready

http://www.solianiemc.com/

F.tenda-TIS-rm

F.tenda-ingresso-CIMA-apertura

Can we get one please?

what paranoid networking physically looks like (and sounds like)

From a discussion about protecting yourself against most ‘black bag’ and ‘evil maid’ attacks.

put distinctive scratches into all your peripherals, take a photo, and regularly check that the scratches are identical to the photo. This is how weapons inspectors ensure the seals protecting weapons caches have not been tampered with. The seals are scratched in a distinctive way that can’t be forged, then check periodically. Use tamper evident tape on your devices to slow down a burglar that wants to plant a keylogger in your keyboard.

The computer in question is an ‘air gapped’ machine, which means it is not connected to any network. You’d use it for extreme operational security (i.e. working with leaked NSA documents).

If you have a desktop [computer], put super glue in all the USB interfaces so they aren’t functional. Do the same to any interface on the mother boards that could attach removable media. Try to make the case impossible to open (bonus points for encasing it in cement except for the fan, CD tray, cables for keyboard/mouse, power cable and power button).

Turns out that really isolating a computer that you work on is a very hard thing to do. The latest threat seems to be some kind of super-malware that can bridge air gaps by communicating via a computer’s built-in speaker and mic. Allegedly it ‘talks’ at around 18kHz which is a frequency most people cannot hear.

a restaurant’s walk-in freezer is the poor man’s faraday cage

Emotion Detection

emotion detection emotient
A still from the video below. The amazing bit about this is not that it’s there, and apparently working, but how incredibly crude it looks. The analysis meta-data drawing (if that’s what you can call the lines drawn onto the faces) look like a child’s drawing of a face, unable to display any empathy, individuality, attitude. It works very well with the actors trying to do a blank Buster Keaton face. I wonder why, and what this tells me.