Filter posts by:
Signal – Speaking with no one listening

Signal – Speaking with no one listening

Signal is a messaging app that has been around since 2013. It is said to be one of the most secure messaging apps on the market. Whistleblower Edward Snowden uses it daily and describes Signal as the safest messaging...
Digital resistance: A brief introduction to decentralized data-right movements

Digital resistance: A brief introduction to decentralized data-right movements

This post provides a brief introduction to collective organization as a form of resistance, whose ambition is overcoming technological determinism and creating new paths to re-define our relationship with “new” technologies, connecting the labor and knowledge of so many...
Facebook Gaming: Live Streaming the Perils of Data Privacy

Facebook Gaming: Live Streaming the Perils of Data Privacy

The ability to record and live stream video games has completely reformed the gaming industry as it became the birthplace of popular online live streaming communities. Why do younger people today spend more time watching gaming content than playing...
Amazon-Go stores – A critical analysis of the cashless stores of the future

Amazon-Go stores – A critical analysis of the cashless stores of the future

Recently, Amazon opened its second cashier-free Go store in the United States and announced the planning  3000 new ones by the year of 2021. Other companies, such as Tesco and Ikea are planning on testing such cashless systems as...
A Foucauldian Genealogy of Cybernetic Subjectivity

A Foucauldian Genealogy of Cybernetic Subjectivity

An overview of cybernetics, its production of subjects and key players and ideas that formed the cybernetic paradigm.
Weeping Angel: The latest surveillance tool, that can turn your smart TV into a bug TV

Weeping Angel: The latest surveillance tool, that can turn your smart TV into a bug TV

  Earlier this year, a revelation by Wikileaks called Vault7 refueled the privacy debate concerning intrusive media (Hacker News; The Verge, 2017). The series released documents on CIA activity between 2013 and 2016, showing how the intelligence agency gained access...
Winter is coming for Uber

Winter is coming for Uber

Knockout or next round? All eyes towards the battle between Uber and London’s transport regulation system ‘TfL’. Employee conditions and security affairs are the big issues in this public discussion. Is there a bright new future for digital labor...
Using Personal Data to buy Art: The Data Dollar Store

Using Personal Data to buy Art: The Data Dollar Store

Recently, Kaspersky Lab has been in the news due to so-called suspicious activity within their security software system and a supposed link with the Russian government. Both TechCrunch and Wired state that the Department of Homeland Security has “banned...
A click away from giving up our autonomy? – A critical view on Amazon’s new Dash button

A click away from giving up our autonomy? – A critical view on Amazon’s new Dash button

The alarm clock rings, you slowly make your way to the coffee machine since there is no other way of functioning at a time like that, but then realize you ran out of coffee yesterday. What a disaster! But...
Facial ID scanning: An advertisers’ dream, or a consumers’ nightmare?

Facial ID scanning: An advertisers’ dream, or a consumers’ nightmare?

A couple of weeks ago, a traveler noticed a camera in one of the digital advertising screens at a train station in the Netherlands. A photo of this ‘hidden’ camera was then posted on Twitter, questioning the purpose of these...
Safety Net – Play With Privacy or It Will Play You

Safety Net – Play With Privacy or It Will Play You

  Have you ever used a website that uses cookies? “Liked” a photo on Facebook? Geo-tagged your location in a post or used Google Maps?   Of course you have. But were you aware of how the information you...
Spy me, please!

Spy me, please!

A project, brought to you by Afra Suci Ramadhon, Alina Niemann, Kimberly Leerkes, Kyra Teklu and Radina Teodosieva The exhibitionist beginning Several weeks ago we were presented with an assignment ­- to create a new media project, intervening an...
Spotify the Data Sage.

Spotify the Data Sage.

Is Discover Weekly a step forward or a step back? In the good ol’ days people discovered music by listening to the radio and recording the music on audio tapes. The disk jockeys were the opinion leaders that could...

A new enemy in our control society

  From an army of sabotage to a slippery enemy Ouroboros, the famous snake virus, crawled into the digital systems of Ukraine in 2013 and until today it has attacked large parts of the country’s infrastructure. There are many allegations that Russia is responsible for...
Facebook in the Spotlight of the Dark Web

Facebook in the Spotlight of the Dark Web

“Facebook is blocking logins with Tor browser. This is crazy. Please help us to share!“ (Facebook, 2013) published Tor Project on Facebook on June 18th 2013. This is not the case anymore. Facebook opened a service for all users...
The posthuman cyborg: Technological telepathy

The posthuman cyborg: Technological telepathy

Researches have recently published an article where they have done an experiment with some kind of technological telepathy. A man in India wearing a BCI (Brain-Computer Interface), has successfully transmitted different kind of words through thoughts to a man’s...
Your taxi 2.0 has arrived?

Your taxi 2.0 has arrived?

Amsterdam. Capitol of the Netherlands, known for cultural highlights as the Rijksmuseum, the Anne Frank House, the canals, fleamarket on Waterloosquare and an infinite number of bikes. The last twenty years the number of bikes has grown so much...

Alba: Improving or Controlling your Life?

During TechCrunch Disrupt in San Francisco the start-up Stack Lighting announced a new way to light your house: Alba. Alba is described as the world’s first responsive LED lightbulb, that is equipped with sensors that will know when you...
Invading Sonic Warfare: Sound, Affect and the Ecology of Fear

Invading Sonic Warfare: Sound, Affect and the Ecology of Fear

Sonic Warfare: Sound. Affect and the Ecology of Fear is a book written by Dr. Steve Goodman, who has a PhD in Philosophy, but to a whole group of people he might be  better known under his alias: Kode9,...
Global Internet Censorship – ACTA

Global Internet Censorship – ACTA

The internet as we know is a place with limitless accessibility and constant access to all shareable online information within an open exchange where media exist and co-exist in the way of informing and entertaining. It also means to...
Internet Imperialized

Internet Imperialized

In 2010, Google.cn redirected users to Google.com.hk. Google released an official blog post announcing that it would no longer censor search results for Chinese users. The decision proceeded an allegation that U.S. companies (Google included) had been attacked by...

Xbox One the E3 fall

Many gamers have most likely watched or been to the E3 this year. The E3 was special this year, because of the next-gen consoles of Microsoft and Sony.  Microsoft showed their Xbox One and Sony showed their PlayStation 4....
The Internet is now built on mass surveillance

The Internet is now built on mass surveillance

Brought to light in recent months, the Edward Snowden-powered NSA leaks have publicized the wholesale spying efforts by US and UK intelligence agencies that undermine the very fabric of the Internet – turning it into a vast surveillance program...
[Wild Card Symposium] The Control Revolution

[Wild Card Symposium] The Control Revolution

— Alain Otjens, Daan Smith, Richard Zimmerman and Seah Kim   For the Wild Card Symposium of 2012 New Media Theories, we created the interactive timeline website, The Control Revolution. To create exposure for this hidden classic of Beniger, we also created...