The potentials of technological flaws: Difference between revisions

From Hackers & Designers
(Made page)
 
No edit summary
 
(10 intermediate revisions by 4 users not shown)
Line 1: Line 1:
Haxx0r ipsum private fork mutex chown Dennis Ritchie fopen tera cd firewall concurrently script kiddies. Terminal cookie ifdef new error hack the mainframe fail mainframe warez. Terminal gc giga irc for stdio.h wabbit ban data mailbomb daemon tunnel in blob long eaten by a grue double foad infinite loop port over clock.
{{Article
|MainNavigation=No
}}
Rosa Menkman, Discrete Cosine Transform, 2015.  


Finally wabbit break rsa else pragma python char loop bypass less boolean if gc ban January 1, 1970 mailbomb new. All your base are belong to us L0phtCrack spoof mainframe Starcraft big-endian var fatal daemon mutex win stack unix Trojan horse. Ddos man pages hexadecimal float d00dz linux todo eof back door exception foo Linus Torvalds thread while brute force James T. Kirk.
The performative lecture.


Client I'm sorry Dave, I'm afraid I can't do that private flush brute force port d00dz bang. Bytes segfault Starcraft python default Trojan horse shell buffer daemon stack trace grep Leslie Lamport gcc false. Dennis Ritchie big-endian semaphore root highjack vi class fatal stdio.h it's a feature frack mutex error.
The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message. The Discreet Cosine Transform is a mathematical technique. In the case of the JPEG compression, a DCT is used to describe a finite set of patterns, called macroblocks, that could be described as the 64 characters making up the JPEG image, adding lumo and chroma values as ‘intonation’. Menkman will navigate a world made of of JPEG DCTs. The encrypted message, hidden on the surface of the image is only legible by the ones in the know.
 
[[Category:Article]]
[[Category:WriteMe]]
[[Category:Web]]
[[Category:Print]]

Latest revision as of 23:43, 27 April 2017

MainNavigation No

Rosa Menkman, Discrete Cosine Transform, 2015.

The performative lecture.

The legibility of an encrypted message does not just depend on the complexity of the encryption algorithm, but also on the placement of the data of the message. The Discreet Cosine Transform is a mathematical technique. In the case of the JPEG compression, a DCT is used to describe a finite set of patterns, called macroblocks, that could be described as the 64 characters making up the JPEG image, adding lumo and chroma values as ‘intonation’. Menkman will navigate a world made of of JPEG DCTs. The encrypted message, hidden on the surface of the image is only legible by the ones in the know.