Archive Search

  • ... of sexual arousal, since her body, unlike a man's, does not give her away. [... we are also trying to formulate a simple hack that everybody can potentially use. Everybody...
  • ... behaviors. The characters become like marionettes with unpredictable reactions... and imagined. Zilith is an encryption hacker searching for invisible enemies and...
  • ... with the help of modern technology and hacked electoronics. Ideal location of this...
  • Family Portrait -
    ... capturing and rendering not only physical likeness but also fragments of behavior. These...
  • Dust
    ... presents a fragment of this collection of likeness-pairs, scanned sequentially into the...
  • Crack it !
    ... of insecure data networks, paranoia about hackers, privacy, electronic . The project foresaw...
  • ... of Concern" groups, movements, or NGOs like Oxfam, the Freedom from Debt Coalition and... the targeted server is secure or open to hacker attacks. The results of these scans, the...
  • Poetrica -
    ... in some ways a community of poetic hackers of the telecommunication system who acts...
  • Tristero -
    ... to each other. The Tristero is a kind of hacker underworld before the fact, a secret...
  • ... the ingenuity and resourcefulness of the hacked bicycles that are roughly converted for use...