Difference between revisions of "User:Jeanine Verloop/minor q14 research"
Line 132: | Line 132: | ||
===Experiments=== | ===Experiments=== | ||
<span style='width:50em;display:block;'> | <span style='width:50em;display:block;'> | ||
− | As we informed you in the research approach, we can divide our process in three parts/subjects. The voice and lying to yourself, the echo chamber and data farming. The experiments we did in each field, even though not visible in the physical result, contributed to the development of our collection of weapons. <br> | + | '''As we informed you in the research approach, we can divide our process in three parts/subjects. The voice and lying to yourself, the echo chamber and data farming. The experiments we did in each field, even though not visible in the physical result, contributed to the development of our collection of weapons.''' <br> |
<br> | <br> | ||
'''LYING TO SELF''' | '''LYING TO SELF''' |
Revision as of 14:35, 10 January 2018
>>> research <<<
weapons of data destruction
QUARTER 14
paper
references
PICTURES
Collaborators
THARIM CORNELISSE
Major // illustration
PAGE THARIM
JEANINE VERLOOP
Major // illustration
PAGE JEANINE
Contents
Forward/Introduction
Tharim is the digital, Jeanine is the craft.
Where Jeanine is running in material stations, Tharim likes to stare at his screen for hours.
We teamed up because we complement each others flaws and because of our shared view on art, aesthetics and technology.
We don't consider ourselves classic illustrators and feel a strong urge to work with interesting techniques and materials.
Before we started this project we found out we had a lot of shared artistic interests, ways of working and design preferences. Based on these shared ideals we worked as a team on this project.
Abstract
Social media is getting more and more accurate in showing you what it thinks you want and believe. It creeps us out because the algorithm used is under the surface, we see no physical explanation. Because of this people are feeling watched and not safe. And so we gather around the campfire, telling stories of the modern boogieman lurking in the shadows of our devices, spying and gathering information.
Within this conflict we fought a small battle. Our weapons of choice: tactile and understandable devices, which create dirty data.
Central Question
How does the individual cope with data farming [1]?
Relevance of the Topic
Data farming is a very present-day subject. We are on a critical point of learning how to deal with it. People are afraid of it just like every other time in the past when technology makes a jump [2].
Data is the new opportunity and businesses are in a race to be on top of it. As JoAnn Stonier says in her article, Data is the new currency: “We’re running out of time. What we decide today will create the future.” [3].
This affect both, the individual and society. Data is a new currency with a lot of people unknowingly providing it.
Hypothesis
Our collection will not have a real effect, in the sense that it does not help to blur the data on a scale that makes it unusable. Our weapons will send a positive message, positive in the sense that we are in control and not the technique. That there is a face behind the technology that we can disrupt through minimal adjustments.
We hope that our weapons radiate reliability through operation, design and material choices. We want to achieve this by working with solid, recognizable and natural materials.
Last but not least, we hope our work is going to make people think, reflect and laugh.
Research Approach
During the project we have shifted between different themes, because the research was asking for this or because our interests were leading us into new directions. The project could be divided in three different parts. The voice, the echo chamber and data farming. Within these subjects we have performed different forms of research. We read articles, looked up other works, did material experiments, discussed the subject with fellow students and built different kinds of objects and machines. The research we did for the first two subjects, the voice and the echo chamber, were a big part of the framework that we have built around our final work.
Key References
Some of the things we found out while doing our research were always in the back of our heads. They connected themes or acted as inspiration for our final work.
Acoustic Location and Sound Mirrors, The Museum of Retro Technology[4]'
'Before the advent of the aeroplane, acoustic location was applied to determining the presence and position of ships in fog. However little faith was placed in this because the apparent direction of sounds in fog at sea was known to be sometimes deceptive. …the technology was rendered obsolete before and during WW2 by the introduction of radar, which was far more effective.'
Acoustic locators were a big inspiration for us because of two reasons. The other worldly aesthetic of the objects we found interesting and were throughout the project an inspiration for our design choices. The other reason is that just like our final objects the acoustic locator was an analog devious solution to a, then, new problem. The technique used wasn’t very trustworthy, but it was the only thing they could rely on at that time.
Instagram is listening to you, Damián Le Nouaille [5]
Please Instagram, explain to me how you’re doing this. I’m a developer, I know how iOS and networks work, and I’m still very curious about the technology you’re using.
Damián Le Nouaille’s blogposts on Instagram spying on him were a catalyst for our project. His blogposts made hundreds of people come forward with similar stories. To hear from an actual web developer that a company as instagram is probably monitoring your conversations via your phone really amplifies this feeling of “the individual” versus “the faceless big companies”. His story is in a way very emotional, he experiences something that he doesn’t understand and makes up a plausible sounding reason for the event. Which is very human way of reacting.
Thero Privacy control, Roman Torre and Angeles Angulo[6]
'Privacy and security on the Internet is a hotly debated topic. On the one hand, there’s a possible need to be able to track and find people that would like to to others harm. On the other, there’s the idea that it’s no one else’s business what you search for, or what websites you visit. Still another faction would simply like to sell and use this data for profit in exchange for the use of their services. All of these issues come together to make security choices complicated for computer-savvy individuals, and likely nearly impossible for those that aren’t.'
'To address this issue, Roman Torre and Angeles Angulo have come up with a Raspberry Pi 3-based physical device called THERO that lets you manage security settings with the turn of a dial.'
Thero is addressing the exact same themes as we are. Roman Torre and Angeles Angulo have come up with a physical solution for a digital problem. The only problem we had with the Thero is that it is still very unclear, for someone who doesn’t know how computers work, what it does.
Literature
“I produce my voice, but my voice also produces me.”
RESONANT BODIES VOICES MEMORIES - Johanna Biľak
“And what is voice if it is not simply an instrument for self-expression and self-realisation we can
command?”
Steven Connor, Dumbstruck: A Cultural History of Ventriloquism. pp. 3 - 5 and pp. 342 - 346
Jean-Peul Sartre - Being and Nothingness [7]
Experiments
As we informed you in the research approach, we can divide our process in three parts/subjects. The voice and lying to yourself, the echo chamber and data farming. The experiments we did in each field, even though not visible in the physical result, contributed to the development of our collection of weapons.
LYING TO SELF
At the start of our project we did a few experiments on lying to yourself. We made up small experiments in which we lied to ourselves via different kinds of media.
Lyrebird.ai
Lyrebird.ai is a website were you can teach an ai to speak with your voice. You train the machine by recording certain sentences. We recorded our voices in the sound station at the WDKA and used the machine to tell lies about ourselves in our own voice. The experiment had some nice results, but the fact that the machine worked only via the site made it not very usable later on in the project.[8]
Stickers
We made food information stickers with information on it for the perfect kind of food. You could put the stickers on your food packaging when you were hesitating whether you should eat something.
Autocorrect
MATERIALS AND TECHNIQUES
During our project we experimented with different techniques and materials to find out which worked the best for us.
We did a lot of experimentation with the arduino. We worked with servomotors, mp3 boards, sound processing and touch sensors. The experiments were mainly altering the code of the arduino and testing out different settings and placements. We used the arduino because of its easy way of using and because we worked with it before.
We worked with two different main materials.
Because we wanted to work with rough materials and because the both of us always have wanted to work with this material we chose to work with concrete. The other material was wood, which we cut up in the lasercutter, this was a nice way of making quick prototypes and make small adjustments to things that we already had.
We made positive molds out of clay and used the vacuum press in the ceramics workplace to make negative molds from plastic. Within the molds we put wooden skeletons to give the structures extra strength and to make room for an arduino (if necessary). After this we filled the molds with concrete and let them dry for one or two days. We had to redo this process a few times, because we had to learn a lot about the material. The concrete would get stuck in the mold, would have too much water in the mixture or would be too thin.
Chladni figures
A side experiment we did was using a speaker and a laser to show certain sound characteristics. We added a piece of mirror to a speaker and pointed a laser at it. The reflection of the laser created patterns on the wall where the speaker pointed towards.[9] We played with the frequency, panning and resonance of the sound and created a lot of different patterns. We thought we might use this technique later on in the project, but we ended up using other techniques.
SHAPES
Insights from Experimentation
(what have you pulled from your hands on practice based research?)
Artistic/Design Principles
The objects that we want to make have to be raw. They have to be the opposite of the smart and futuristic algorithms and computers. The tools should have one function and this function should be clear when you see the tool. We want to work with sturdy and natural materials that amplify the primitive touch of the tools.
The objects that we want to make will present devious solutions. By doing so we hope to bring a positive side to a heavy problem. We want to put a grin on people their face while they use our tools.
Our weapons will have specific targets. We want to bring the battle to a personal level. The faceless machine that we encounter on the internet is so much easier too fight when we attach a face to it.
From the start we had some shared basic principles. The objects had to work smoothly, look like finished objects and we should be able to put it in our portfolio.
Artistic/Design Proposal
We are going to make 5 analog weapons to fight a digital battle.
These weapons are objects which dirty up the trail of data which you leave behind on the internet.
Keyboard
This object is supposed to be used while writing mails. When the object is put over the keyboard you won’t be able to use certain symbols while typing your mail. The data that previously was interesting is now useless because the typed words are now unreadable.
Target: Daniel Yehdego, senior data & applied scientist at Microsoft.
Mouse
To randomise your behaviour on Facebook you put your mouse in this device. A disk underneath the mouse will start rotating which will make the mouse hover across the screen. After the disk has stopped turning a little motor will press the left button on the mouse. These actions repeat itself with different degrees of rotation from the disk every time the loop starts again. The movements of the two motors are being controlled by a hidden Arduino board.
Target: Timur Sumer, data scientist analytics at Facebook.
Kaleidoscope
The kaleidoscope can be put over the webcam while making a Skype call. The transferred data shows a lot less details than it normally would. Your face, surroundings and other information is being covered.
Target: Gorm Kroeger, data analyst at Microsoft / Skype.
Speaker
This device contains a speaker which starts to talk to your phone when you lay it on top of it. It says words that will trigger instagram algorithms to show other advertisements.
Target: Ting Pan, data scientist at Instagram.
Tank
The final object will be targeted at google. An aquarium under which you can put your phone. When you run an electric current through the water in the tank the signal from and to your phone will be blocked. Your location can’t be tracked this way.
Target: Vanessa Schneider, geo media program manager at Google.
Realised work
(what did you actually make)
Final Conclusions
(what was the point? what do you take away?)
Bibliography
- ↑ reference, data farming, wiki reference page
- ↑ Peter-Paul Verbeek, Wij hebben geen klauwen en dus hebben we ’n iPhone, website
- ↑ JoAnn Stonier, Data is the new currency, article
- ↑ Acoustic Location and Sound Mirrors, The Museum of Retro Technology website
- ↑ Damián Le Nouaille, Instagram is listening to you blogpost
- ↑ Jeremy S. Cook, THERO : A Physical Device for Internet Privacy Control website
- ↑ Jean-Paul Sartre, Being and Nothingness book
- ↑ Lyrebird.ai website
- ↑ Wikipedia, Chladni figures website