let's Cryptoparty again

Mittwoch, 30. April 2014 ab 18.00 Uhr bis ca. 21.00 Uhr Workshops und freies Rumhängen Cryptopartys sind eine globale DIY-Initiative zur Emanzipation aus der technologischen Unmündigkeit. Wir meinen, das Thema der digitalen Rundum-Überwachung sollte gerade auch an der Kunsthochschule für Medien kritisch beleuchtet werden. Deshalb freuen wir uns besonders, bereits die zweite Cryptoparty zu veranstalten. […]

Privacy and Surveillance Conference, UC Berkeley

The conference is hosted by the Data and Democracy Initiative at University of California at Berkeley.  Do let me know if you would like your work included as part of the dialogue. Event: Pan Optics: Perspectives on Digital Privacy & Surveillance March 6, 2014 11am-4:30pm Banatao Auditorium, Sutardja Dai Hall Presented by CITRIS, CITRIS Data […]

physical and virtual

In the words of Eric Schmidt, executive chairman at Google (paraphrased, I can’t find the original quote): “Identity will change from something that originates in the physical world and is being projected into the virtual world, to Identity that is created in the virtual and experienced in the physical world.” Coincidentally, there is this news […]

what paranoid networking physically looks like (and sounds like)

From a discussion about protecting yourself against most ‘black bag’ and ‘evil maid’ attacks. put distinctive scratches into all your peripherals, take a photo, and regularly check that the scratches are identical to the photo. This is how weapons inspectors ensure the seals protecting weapons caches have not been tampered with. The seals are scratched […]

Attacker model

Q: Is it possible to put security in place to protect against state surveillance? A: “You are not even aware of what is possible. The extent of their capabilities is horrifying. We can plant bugs in machines. Once you go on the network, I can identify your machine. You will never be safe whatever protections […]


A basic tool for free speech: learn how to use email encryption.  Mac and Windows versions are here; the mothership is for Linux. It couldn’t be easier, the end-user versions come with great instructions. Send me something good! Here’s my public key for (actually those tools above will find it for you automatically).  […]

understanding computers?

“…our inability to describe and understand technological infrastructure reduces our critical reach, leaving us both disempowered and, quite often, vulnerable.” James Bridle “Again it comes back to infrastructure and how our inability to describe and understand reduces our critical reach, leaving us both disempowered and, quite often, vulnerable. Opacity is an important word here too, […]