0

1

2

3

4

5

6

7

8

9

10

11

12

re-coding everyday technology VOL. 1 contains 12 positions by artists, researchers and designers on questioning the default conditions and circumstances of everyday technology.

Introduction

working group for unusual input and output media

0

1

2

3

4

5

6

7

8

9

10

11

12

Introduction to the contributions of the publication


Dear Anonymous Reader,

Digital technologies are now part of our daily lives. Digital maps, smart appliances, email, digital cars, websites, printers, and other black boxes. For many of us, these technologies have become so mundane that we hardly see them anymore. We just take them for granted. In this way, we simply accept their terms and conditions and ignore the effects and biases they entail. While digital technologies are specifically designed to fade into the background, there is a growing need to examine not only their technical but also for their cultural and social implications. What power structures, cultural circumstances, embodied knowledge, social conditions, colonialial histories, and capitalist logics are built into digital infrastructure?

With the invitation to “re-code everyday technology,” we invited 12 artists and researchers to rethink, redo, reinvent, reshape, respond, and reveal different aspects of the digital technologies that have become so commonplace in our society. Among the different perspectives included in the resulting publication are artistic, design-oriented, and scientific reflections or interventions. Our hope is to make you stop, think and reconsider – it is therefore not our goal to create a unified, seamless experience, but rather to make room for non-functional, bumpy, subversive, and sometimes ambiguous perspectives. What unites all the contributions is the shared understanding that technology, society, politics, and culture exist in complex interrelations and interdependencies

Extending beyond the scope of a classical glossary, this contribution deals with basic concepts in publishing and everyday technologies. It uses the format of the “glossary” as a starting point for the everyday transfer of knowledge.

Most of the technologies we interact with in our everyday lives are “black boxes.” The inability to peer into these technologies and the difficulty of understanding them frequently lead to calls to “open up the black boxes.” In his essay Do not open that trojan horse, Yifeng Wei examines this basic approach and asks whether keeping black boxes closed can be a strategy for marginalized groups.

Anyone who sends an email to info@mariosantamaria.net will always receive the same reply – that Mario is asleep. At a time when constant availability via email or Zoom is all but expected, when productivity is the new measure of success, when information is available 24/7 – Mario is happy to be asleep. This conceptual work Auto-Sleep by Mario Santamaría is just an email address with an automatic reply.

Navigation apps such as Google Maps promise frictionless navigation. The essay Mischief Managed discusses the underlying complexity, as well as the limitations, glitches, and disruptions that come with mapping technologies. Guilherme Maggessi shows that map apps are more than mere representations of physical space and how they are being used subversively in different communities.

Cars are such a common ordinary technology that they are now an integral part of society. Few technologies have such an impact on us, the city we live in, or our lifestyles. Almost unnoticed, cars have turned into computers. In his project Cars Driving Cars, Diego Trujillo Pisanty documents how the data from his car is collected and repurposed.

Jian Haake challenges designers' tools with a speculative modular synthesizer for generating print files. How do our digital tools operate, and who has the power to decide? In her contribution, she illustrates the potential inherent in playful and self-empowering tools.

Choreographing You is an interactive website that explores online tracking algorithms and their impact on our daily lives. Through a series of choreographed prompts, users are encouraged to reflect on their online behavior, with each click serving as a physical enactment of their digital actions.

How can obsolete technologies be made useful again and what stories are hidden in their pasts? By deconstructing the fax, Lars Hembacher and Paul Eßer explore it as a medium and a social phenomenon.

RFID (radio-frequency identification) chips can be found concealed in many devices: bank cards, smartphones, key cards... In his contribution Attaching as active practice, Benno Brucksch explores the relationship between digital information and physical objects. The essay highlights the power to shape human behavior and relationships with such technologies. A call to playfully explore technology and unlock its possibilities and implications.

With autobiographical playing cards Heartbreak cards, Naoto Hieda juxtaposes the fast world of social-media overload with a slow, personal response. An experimental website shows how the cards can be made and changed again and again.

HTML and CSS are among some of the basics when it comes to designing web pages. Nami Kim asks important questions about teaching students these basics. In a series of interviews with students, which appear as radically handmade websites, she asks questions about power relationships and self-empowerment in digital media.

Cutting the Cloud is an artistic research and hacking project that uses low-cost, battery-powered temperature sensors to explore the various social and societal implications of smart-home technology. A website designed as a diary documents the process of opening the devices, thereby disclosing the circumstances of their production.

This publication is an ongoing research project of the working group for unusual input and output media at the University of Applied Sciences Mainz and the NODE Forum for Digital Arts. In that spirit, we want you to see this publication as an invitation to respond to: unusualmedia@nodeforum.org

Re-coding Everyday Technology: A Glossary

Verena Kuni

0

1

2

3

4

5

6

7

8

9

10

11

12

Access Alternative Analogital Black box ​Code ​Data Disruption Door ​Habit ​Hack ​Re- ​Standard (I) ​Standard (II) System Tool ​User ​ ​


This glossary comes as a companion to the project. It does so without claiming to be complete or comprehensive. On the contrary, not only is it deliberately incomplete but it also aims to re-code everyday technology, namely by re-coding the very idea of a glossary itself, which is, after all, a traditional tool for the processes of knowledge building and canon construction that are closely and systematically linked to this subject. This is why the glossary has evolved into a questionnaire. However, in homage to the original format the alphabetical order has been kept.

ACCESS

Remember the programmatic claim from the 1990s: “ACCESS4ALL”? Has the task been accomplished since then? And if so, on what terms?

ALTERNATIVE

Alternatives are crucial, and a lack of alternatives can be calamitous. On the other hand, it may at times appear to make life easier. If there is only one DOOR with a handle, I will probably be inclined to use it to enter the building. And yet, the noble task of helping and supporting USERs can also fail, for example, when it leads to STANDARDization, which often comes with an unfortunate lack of alternatives that exclude diversity. This is why the question of how to foster alternatives is crucial in design.

The same may also be true in many other areas, from politics to knowledge building – areas where we can find both potentials and potential problems of open ACCESS and participation. After all, there may be alternative standpoints and even alternative STANDARDS, but there is no such thing as “alternative facts.”

What are your favorite alternatives?

ANALOGITAL

The term points to the considerably wide and rich, manifold and multifaceted, ever-growing field of relations between the analog and the digital – including objects of all kinds, processes, and structures, even whole SYSTEMs. Both the relations and their articulations are significant, ranging from appropriations to rejections, from transfers to transformations, from materializations to medializations, from embodiments to disembodiments, from concretizations to dissolutions, from simulations to symbioses. Exploring them and experimenting with them can not only help to better understand the everyday technologies on which whole SYSTEMs are built, but also inspire critical HACKs of existing designs.

Can you name a few analogital objects you come across in your everyday life, in your personal and professional practice?

BLACK BOX

Presumably derived from the military jargon used for found or captured enemy objects that were considered too risky to open because of their unknown contents, black boxes have become a fetish in both theory and practice. While the concept of a known unknown that allows its USERs to focus on input and output is embraced in some fields, such as in systems theory or in design solutions for everyday technology, in others we find people who insist that black boxes should be dismantled and that blackboxing – the problematic mechanism behind their construction – must be abolished. In contrast to a soldier who finds a strange, sealed object behind enemy lines, it should be easier for us to decide whether to open the box or not.

How many black boxes are part of your personal and/or professional environment? Have you ever opened one? If so, what happened?

CODE

Code originally comes from Latin, “codex” or “caudex,” meaning “tree trunk” or “book.” However, it probably came to us through Middle English, where “code” meant a “system of law.” Today it is a general term for a sequence of signals or signs composed in a chosen language in order to be interpreted by a human being or a machine. For code that is used for writing algorithms, there must be a common set of rules, and there must be strict discipline among its USERs. Unfortunately, the latter is not always the case. This can lead to nuisances, errors, sometimes even catastrophes. And sometimes it offers new opportunities or even requires RE-CODING.

Do you understand all the codes and rules that are important to and have a major impact on your daily life?

DATA

In Latin, “datum” means “given.” Although its etymology may already point to its fundamental meaning, it is indeed data's direct link to INFORMATION that makes it one of today's most powerful and valuable resources. INFORMATION is not given, but the result of a process – the ways data are gathered, stored, presented and retrieved do matter. Thus we should always ask: What exactly is “given,” by whom and to whom, and to what ends? Is it really “given,” or rather made? How has this datum been generated?

DISRUPTION

It is our very own fault. We may never have been modern, but we have successfully created the myth of modernity and still live by it. Part of this myth is the notion of an “avant-garde” (one would love to cry out, “beware of military jargon” – but, alas, it is all too late), and with it comes the myth of disruption: a radical break in everyday HABITs, structures, and/or technologies that leads to a creative outburst of productivity, a fundamental change within a SYSTEM, and a better future. The dominant narratives of “modern art” may indeed be a model for this, which suggests that disruption was a better kind of revolution. The most prominent one, however, found expression in the continuation of “Californian Ideology,” linking the latter to the market. Indeed, the main function of so-called “disruptive technologies” seems to be to distract and disconnect USERs from their habitual everyday technologies, so that they actually need, or at least think they need, to buy something new.

Have you ever experienced disruption? How did it feel? What were the substantial differences before and after?

DOOR

For good reason, doors mean ACCESS. As a small book from the late 16th century tells us, the citizens of Schilda – not the East German village you may find on the map, but a fictional one – were famous for their tomfoolery. As when they built a guildhall but forgot to add windows, so they had to collect sunlight in bags and carry it into the building. Now, what if they forgot the front door as well? Or, even worse, what if they built an entire palace with windows, a main entrance, and of course, fantastically furnished rooms and a large treasury, but then only guarded it in the front and not in the rear – where thieves happily built their own back door to enter the building?

Have you ever counted the doors in your everyday environment? How many are open to you? How many are closed? How many do you leave open for others?

HABIT

Daily practice forms the foundation of habit. Only then does habit become a tool that is not merely at hand, but feels like a hand –. all natural. However, there is no such thing as a “natural habit:” Habits are usually adaptions to some SYSTEM. Thus, analyzing and deconstructing everyday habits tells us a lot about the SYSTEM(s) within which they have evolved. By the way, the same goes for everyday technologies.

Can you list all the everyday technologies that you would consider essential to your habits? How many of them do you have full access to or control over?

HACK

Hacking means breaking (into) an existing SYSTEM and/or structure – e.g., a log of wood, a DOOR, a server – in order to use it for some desired end, such as making it available to USERs who are not given STANDARD ACCESS. Indeed, this is all about the ACCESSibility of SYSTEMs or rather about the attempt to overcome the lack thereof.

RE-

Inherited from Latin, the prefix “re-” originally means back or backwards, for example, “retro:” You look back, as you review or reconsider something. You got something, so you give something back, as in a reply. You gave something, so you get something back, as in a remuneration. However, many of these actions (and reactions) are not actually directed to the past, but to the future. Among the more prominent examples are “reengineering" – a process of reviewing and debugging something, such as SYSTEMs and processes – and “reverse engineering,” a promising strategy to gain ACCESS to sealed technology such as a BLACK BOX; in other words, to HACK.

Now, when it comes to software and to re-coding, would you consider the latter closer to reengineering or to reverse engineering? Perhaps this is different from case to case. So what would be your criteria for each?

STANDARD (I)

Some time ago, I was looking up the etymology of “standard.” When I typed the term into Wikisource’s search window, the result was “1. (science fiction, fantasy) Denoting the name of a universal language in various works.” I had entered “Standard” with a capital “S” instead of “standard.” For a second, this seemed really attractive to me, until I realized that we already have these kind of standards (more than one, at least), resulting from linguistic colonialism, which poses a real threat to the poetic diversity and precision of our “pluriverse” of languages and dialects. Have you ever had a similar experience?

STANDARD (II)

The etymology of “standard” refers to a shared standpoint, both literally and figuratively. But what does this mean exactly? We can assume that such a standpoint would have features and qualities that are considered agreeable, so it would be something people can get behind. However, do we have a choice? If the standpoint does not match with our needs and/or opinions, we might look for alternatives. But what if we do not conform to the standard? Thus, the most important question is: Who defines the standard? Are there possibilities to participate in this process, to reject its results, and/or to develop ALTERNATIVE standards?

SYSTEM

A system consists of interrelated – and often (but not necessarily) interacting – elements. Relations and/or interactions can be stable or unstable. They are usually defined and governed by rules. Many systems also interact with their environment, although this is not always transparent, and there are also opaque systems that appear to be, or are, BLACK BOXES. Any attempt to change a system by changing its parts requires insight into the system and knowledge about its elements, their relations and/or interactions, and the rules behind them. If the system or its parts are neither ACCESSible nor transparent, then it may be necessary to use both invasive, sometimes experimental or playful strategies and TOOLs. In some cases, collecting information about the HABITs of its USERs may be the best HACK to open a DOOR.

What kind of strategies and tools have you tried to change a system and/or to install an ALTERNATIVE one?

TOOL

A tool is made to be used. The output and results of a tool are determined by its qualities as well as by the skills of its USERs. However, poor tools are not the only nuisance. Bad design can be a hindrance as well. Moreover, there are also pseudo-tools – gadgets and devices that look like tools, are marketed and sold as tools, but are actually more or less useless, serving as decoration, playthings, or the like. At least the alternative uses of (pseudo-)tools can point us to the more general capability of everyday technology. In other words, it can trigger powers of suggestion and suggestibility, of aesthetics, and of play.

Have you ever toyed around with (pseudo-)tools? And what are your favorite tools to use in your everyday life?

USER

A person or entity – often imagined as a human, but not necessarily one – who or that uses something is called a user. This is, of course, a tautology, idem per idem. The term has been the subject of critical debates because it can be associated with passivity and a heteronomous and/or otherwise pejorative position. However, there are many kinds of design – such as social design, interaction design, and interface design – that emphasize the activity, (inter-)activity, and creativity of users, pointing to the powerful influence users can have on design. Moreover, it seems obvious that usability, along with functionality, should be one of the basic STANDARDs and one of the most fundamental criteria for the design of everyday things and of everyday technology. Unfortunately, the latter remains difficult, as so many everyday design solutions, from DOOR handles and teapots to forms and websites may show. At the same time, this annoying and persistent problem is also one of the catalysts for creative HACKs.

We are all users, aren’t we? If so, what does it take to become HACKers as well?

Do Not Open That Trojan Horse

Yifeng Wei

0

1

2

3

4

5

6

7

8

9

10

11

12

image

In early September of 1940, a special unit of six senior British military officers and researchers met at London Euston Station with a highly guarded secret. They were transporting a black metal box that was later brought to Liverpool and then handed over to the US. Inside was a cavity magnetron, the latest British military technology that promised to be the end of World War II. After the fall of France, the British government had became increasingly alarmed about a possible Nazi occupation. In such an event, the Nazis might seize any inventions that had not yet been produced due to the lack of adequate resources and unfavorable conditions in the UK and use them to immediately strengthen their military position. Hence, after early preparations by Henry Tizard, who was the main advocate of the mission, and with the approval of Prime Minister Churchill, who hoped to support the Alliance, the Tizard Mission was approved to further increase military technology cooperation among the Allies.

Years later, that little box inspired a metaphor used in cybernetics, a field concerned with control and feedback that emerged in the 1960s. To paraphrase the founder of cybernetics, Norbert Wiener, a black box is an apparatus that operates with visible inputs and outputs, but without revealing anything about the inner structure that makes such operations possible.[1] Cybernetics has had a profound effect on today's technologies, especially artificial intelligence, in which the concept of the black box is especially evident. In contrast to its successful debut in the Tizard Mission, the black box is rather the subject of considerable criticism in relation to AI.

Media theorist Alexander Galloway defines two types of black boxes. The first type, the black box cypher, reminiscent of the black box in the Tizard Mission, is a cloaked node with no external connectivity. The second type, which Galloway calls the black box function, grants access, but only selectively and according to specific grammars of action and expression.[2] The black box function is a better expression of our cybernetic digital age. It seems to be open in a sense, offering an inviting interface to interact with. This interaction, however, obscures the fact that what has been granted is only the functioning of the black box, not its decoding. It appears to reveal its inner structure but only leaves us with a more detailed, interactive, and yet impermeable surface. We modulate Photoshop using GUI (graphical user interface), and we operate Microsoft Windows using a keyboard and mouse. The more we seem to learn about their complex inner workings, the more we are restrained by the human-machine interaction.

The black box was invented to divert attention with an ordinary exterior, to obscure with limited inputs and outputs, and to encrypt secrets with overly complex inner structures. That is why, ever since the birth of the metal box, there have been calls to open it. Or perhaps much earlier, since the demand for transparency and the disdain for hidden agendas permeating life in every sector of society. We become frustrated when we lack the ability or the right tools to understand something built with our own knowledge, and we become even more worried when we realize that it may someday have the potential to be somehow out of our control. Opening the formidable black box seems to be the only choice left.

The urge to “open the black box” has peaked in recent years with the widespread use of AI. In Europe, for example, the General Data Protection Regulation (GDPR) mandates the right to explanation. It states, “(the data subject should have) the right ... to obtain an explanation of the decision reached.”[3] The reason why there is so much concern about AI functioning as a black box is that the complexity of a neural network will impede any attempt to investigate and correct the flaws from which ethical issues and false decisions might emerge. Despite its military origin and its strong connection to cybernetics and machine learning, the term “black box” is by no means technical jargon. It is no less important in disciplines such as philosophy. In “Opening Pandora's Black Box,” the introduction in his book Science in Action, Bruno Latour gives an example of how a scientific concept can be a kind of black box. Revisiting the story of the DNA helix, he suggests that this concept is so widely accepted as an axiom that it is the default for all biological research, and scientists will never attempt to open this socially constructed black box.[4] Hence, once a black box is established and the critical voices recede, we lose interest in opening it.

Unfortunately, all attempts to open the black box, whether in machine learning or in deconstructing knowledge production, remain at best a noble wish. This is why the corresponding regulation in the GDPR has been the subject of so much debate, because the overly broad scope of so-called automated decisions could neutralize the right to explanation.[5] Moreover, fully understanding a neural network is nearly impossible. In a similar vein, Langdon Winner argues in his essay “Upon Opening the Black Box and Finding It Empty” that the effort to unpack technology and look inside the black box is superficial.[6] Although such a reading seeks to think of technology as a social construction, this method, for instance, lose sight of marginalized groups who have no voice in technology and yet are profoundly affected by it. When Winner says that the black box is empty, he is warning us that understanding technology alone does yield sufficient social benefits. On the contrary, what we should do is reconstruct technology.

Following Winner, is there any other way to make use of the black box other than opening it as we instinctively would like to do? Can we reconstruct the black box? A timely reminder comes from Kavita Philip. In her so-called postcolonial computing, Philip offers several ways to contemplate current technology through a postcolonial lens. One of the tactics Philip proposes is to “investigate its (technoscientific object's) contingency not only locally but in the infrastructures, assemblages, and political economies that are the conditions of its possibility.”[7] In other words, instead of taking technology and the culture surrounding it for granted, we should ask what milieu it comes from and what makes us accept it as natural.

Now, if we temporarily shift our attention from the black box to the call to open the black box, some questions arise. Who, or which social class, most strongly supports opening the black box? In which countries is this ethos most widely accepted? What is the social, cultural, and historical background? Is it merely a coincidence that opening the black box corresponds to surveillance capitalism’s drive for information totality?[8] What if the discourse of opening the black box is based on Western and even imperialist values? Moreover, if we consider the impulse to open the black box to be the ideological expression of the dominant class that possesses the resources and technology, should we question the issue from the perspective of the weak? If we are going to be rebellious, how about considering alternative ways to use it, for instance, by keeping it closed?

In human history, there have been other metaphors for keeping secrets other than the black box. There has been Pandora's box and the Trojan Horse, both vessels of subversive and rebellious power. It is worth asking why Latour chose Pandora's box rather than the Trojan Horse as a metaphor to illustrate his reflections on the DNA helix. We haven't yet considered what we can encode into a black box and when the appropriate time to open it might be. What distinguishes the Trojan Horse from Pandora's box is the nature of the power within – the potential for evil that could destroy human civilization, or the resolve needed to overcome tyranny. While Pandora's box reminds us of the danger of opening a secret carelessly, the Trojan Horse is an example of the kind of secret one keeps until the right time. In her notorious essay “Trojan Horses: Activist Art and Power,” published in 1984 in Art After Modernism, Lucy Lippard associates the Trojan Horse with activist art. [9] In her account, activist art unpacks itself within the art institution, masquerading as an aesthetic object or event. For Lippard, the crucial point of the Trojan Horse metaphor is that art and aesthetic production, as well as the activist movement, originates outside of a community or institution and moves inside. It acts under the enemy's skin, right in front of those who need to be subverted. Hence, staying inside the black box is not the choice of a coward, but a tactical method – a way to challenge the existing regime.

Recently, the theft scandal at the British Museum was the perfect opportunity to revisit Nora Al-Badri's work “Babylonian Vision” (2020). For a long time, museum collections have been in the spotlight for their relationship to colonialism and imperialism. Often these cultural artifacts are relegated to glass cages in the name of preservation, and the fact that they were torn from their homeland and original contexts is not given sufficient attention. But in the meanwhile, calls for the return of these artifacts continue.[10] Aside from the physical artifacts, another tough issue to resolve involves the copyrights of digitized materials and documents. To address the contentious ownership rights of digital cultural heritage, Nora trained a neural network on more than 10,000 images of Mesopotamian, Neo-Sumerian, and Assyrian artifacts, which she acquired legally and illegally from five different museums. Though she asked for permission from these museums in advance, only two of them provided access to their open API.

The advantage of using deep learning is that, because AI functions like a black box, these newly generated deepfake artifact images are now unrecognizable from their original “parents.” Ironically, the black box in GAN (generative adversarial network) poses a challenge to institutions that serve as a continuity of imperialism and colonial exploitation. It is because of the black box in AI that those institutions can no longer claim their controversial ownership. Ownership thus leads to the current predicament whereby the ownership of one's own culture cannot be decided by one's own people, but by historically dominant countries and individuals. Nora's black box isn't meant to hide, or at least not entirely, but to open, to liberate one's culture from the prison of disciplined, institutionalized cultural institutions. In the same way that what we put in a black box can make it either into Pandora's box or a Trojan Horse, to cite Al-Badri's own words “what is at issue is the meaning that we give to data.”[11] In this case, Robin Hood’s digital black box is more emancipatory than simply a problem of ethics.

Today, a black box can do more than simply conceal secrets. It is not limited to the class that controls the latest technology or that hoard the most cultural resources. On the contrary, it is a weapon, the Trojan Horse of the digital age, allowing the weak the chance to confound the powerful, to taunt them with an opaque joke until the day when the subversive power can finally be unleashed within. Just like the words inscribed on the Golden Snitch in Harry Potter, “I open at the close.” Before the dawn arrives, well, let's keep the black box closed.


  1. Wiener, N., Hill, D. and Mitter, S.K. (2019) Cybernetics: or control and communication in the animal and the machine. Reissue of the 1961 second edition. Cambridge, Massachusetts London, England: The MIT Press, p.285. ↩︎

  2. Galloway, A.R. (2021) Uncomputable: play and politics in the long digital age. Brooklyn, NY: Verso, p.226. ↩︎

  3. Vollmer, N. (2023) Recital 71 EU general Data Protection Regulation (EU-GDPR), Recital 71 EU General Data Protection Regulation (EU-GDPR). Privacy/Privazy according to plan. Available at: https://www.privacy-regulation.eu/en/r71.htm (Accessed: 20 September 2023). ↩︎

  4. Latour, B. (2015) Science in action: how to follow scientists and engineers through society. Nachdr. Cambridge, Mass: Harvard Univ. Press, p.16. ↩︎

  5. See Edwards, L. and Veale, M. (2017) ‘Slave to the Algorithm? Why a Right to Explanationn is Probably Not the Remedy You are Looking for’, SSRN Electronic Journal [Preprint]. Available at: https://doi.org/10.2139/ssrn.2972855. ↩︎

  6. Winner, L. (1993) ‘Upon Opening the Black Box and Finding It Empty: Social Constructivism and the Philosophy of Technology’, Science, Technology, & Human Values, 18(3), pp. 362–378. ↩︎

  7. Philip, K., Irani, L. and Dourish, P. (2012) ‘Postcolonial Computing: A Tactical Survey’, Science, Technology, & Human Values, 37(1), pp. 3–29. Available at: https://doi.org/10.1177/0162243910389594. ↩︎

  8. Zuboff, S. (2019) The age of surveillance capitalism: the fight for a human future at the new frontier of power. Paperback edition. London: Profile Books, p. 375 ↩︎

  9. Lippard, L.R., 1984. Trojan horses: Activist art and power. na. ↩︎

  10. For the British Musem missing items and the call of returning, see Hundreds of items ‘missing’ from British Museum since 2013 (2023) The Guardian. Available at: https://www.theguardian.com/culture/2023/aug/24/hundreds-of-items-missing-from-british-museum-since-2013 (Accessed: 20 September 2023) and Wang, F. (2023) China state media calls on British Museum to return artefacts, BBC News. Available at: https://www.bbc.com/news/world-asia-china-66636705 (Accessed: 20 September 2023). ↩︎

  11. All-Badri, N. (no date) The post-truth museum, Open Secret. Available at: https://opensecret.kw-berlin.de/essays/the-post-truth-museum/ (Accessed: 20 September 2023). ↩︎

Auto-Sleep

Mario Santamaría

0

1

2

3

4

5

6

7

8

9

10

11

12

info @ mariosantamaria.net


For many years I had a sleep disorder, going to bed after dawn and spending the middle of the day sleeping. Even as a child, I remember that from time to time I would go to school without sleeping, preferring to stay awake all night alone in my room. Over the years, this has led to a lot of professional problems, and I have had to look for excuses to justify my unavailability.

So, as an experiment, I decided to use autoreply to manage my emails, my anxiety about responding, and my guilt about not responding or responding too late. The business logic of these technologies has merged our lives and our professions, but for artists the practice of art has always been inseparable from the life of the artist. Why not play with that? I had already done other experiments that conflicted with machine temporalities. I had programmed my website hosting service to be available only 23 hours a day, without specifying at what hour or during what minutes the website would block all the IPs trying to communicate with the server. I like the idea of a temporality that includes failure and setback. In opposition to the idea of 24/7, I set out to create a 23/7 time that is just as rational but that contains its own contradiction.

Email Window

It’s not something I’m aware of. I don't receive a copy of the email. It’s just sent out automatically. Sometimes I think about it when I’m writing to people who aren’t part of the art world, and I speculate about their reactions. Many people, when they receive my “sleeping” email for the first time, write back thinking there was a mistake. Others write to me just to say that they laughed when they read it and that they would also like to be sleeping, but they can't, they have to work. When some people who haven't written to me in a long time receive the message, they tell me that they missed it, as if it were already a gesture of their personality that refers to a personal treatment, like a tic or those little phrases we use when we speak. I do understand my autoreply as an example to be followed, but as an absurd distortion of the temporality of communication, which makes other options possible. I have also felt bad because I have the privilege to say that I am sleeping, even though often I am not. But sooner or later I do have to respond. It’s something that many people simply don't dare to say or can't. I am not aware of how this affects me. I justify it as part of my artistic practice, and I am aware that some people don't like it.

Email Window

In the last year the project has appeared in some exhibitions, and I have received many emails from people I don't know writing to me to wish me “good night” or “sweet dreams.” I had never thought about this shift in the project. I find it wonderful to receive emails of this kind. Sometimes I respond with a selfie from bed and a “thank you” to prove that I was indeed still in bed and that a stranger can send me an inspirational message without it having to be a work proposal.

Mischief Managed

Notes on the queer use of maps, maps that are queer, and other technologies of way-finding-and-making.

Guilherme Maggessi

0

1

2

3

4

5

6

7

8

9

10

11

12

“The map never lies,” says Professor Remus Lupin to Harry Potter, after Harry informs him that the Marauder’s Map pointed to the presence of a known-to-be-dead wizard in the Hogwarts castle.[1] The map in question, an invention of four adolescent wizard friends, allows its users to see anyone in the vicinity of the castle’s grounds in real time, as long as they promise to be “up to no good.” As a fan of the Harry Potter universe, its books, films, and fanfiction, I find the idea of the Marauder’s Map fascinating. There is something satisfying and subversive about this idea of a cartographic technology that can only be used as long as its users – in this case, a band of unruly students – commit to doing no productive good. It seems to me, however, that there is something flawed about the idea that a map made by teenagers could never make mistakes or lie.

title

Collage of the Mercator projection, the Winkel tripel projection, the Gall-Peters projection, and the Dymaxion projection.

As Ruben Pater states in The Politics of Design (2016), the “notion that maps provide an objective or scientific depiction of the world is a common myth.”[2] In his critical examination of modern cartography, Pater ties its colonial origins to the difficult task of translating something spherical – like planet Earth – into a flat surface. A possible result is the “Mercator map,” which has been the standard map projection since it was drawn by Gerardus Mercator in 1569. The cartographer used “compass directions as straight lines” and depicted the world from a sixteenth-century Western European point of view. His drawing depicts the countries in the Northern Hemisphere as bigger than the ones in the Southern Hemisphere, thus demonstrating graphically the political and economic sovereignty of the West. Although many have pointed out that the Mercator map misrepresents the world, it is still used in geography classes, schoolbooks, and our phones – with apps like Google Maps and Apple Maps.[3]

Like the technology of cartography itself, the use of maps has evolved far beyond its original nautical purposes. This development, however, does not guarantee that a map, as a technology for finding one’s position(s) and way(s) in the world, is foolproof. This is a realization that came to me from the palm of my hand and motivated me to write this essay. During my last holiday, some friends and I wanted to travel from a small town in Italy’s southern coast to a slightly bigger town, where we would take a train to another town. Google Maps showed us several routes. We chose one, turned on our GPSs and, as good users do, walked to the departure point and waited for the bus to arrive. But it never did. We wandered around and found what looked like a memory of a bus stop: a precarious, rusting steel structure with broken glass, covered with band stickers and posters from the recent past. Puzzled, we rummaged through the website of the Italian Railway and managed to find out where the bus actually departs from. One hour later, we took it. Actually we should have noticed from the start that something was wrong. The route of the bus, as visualized by the app, was the main giveaway. The red line traveled over the ocean and crossed multiple roads before somehow arriving at its destination. It was nonsense, and yet Google Maps, with its supposedly seamless, all-knowing interface, clouded our judgment. This made me think about how the app’s database works much like my memory, with its average human unreliability at remembering information and its ineffectiveness at retaining it. Maps, especially ones like Google Maps, are dressed in the digital gloss of seamlessness and are good at making us believe that what they tell us is true, while many times it is not. What I would like to think through in this text is how such moments of informational glitch in Google Maps – a technology that is allegedly always up to date – may help us critically investigate our relationships to these way-making technologies, while at the same time inspiring the creation of alternative maps.

I use Google Maps almost every day, primarily to estimate how much time it will take me to go from place A to place B. Having lived in Vienna for over four years now, I would say that I know my way around. Nevertheless, I continue using Google Maps as a means of self-assurance. While most of the time I do not follow Google Maps’ directions, it does gives me extra confidence that if I happen to lose my way, I know it will guide me back because generally it is right. It is easier to make mistakes if you know the correct answer isn’t far away. Often, when I happen to veer off the recommended path, I come across something new – a park, a shop, a place to eat. In such situations, I navigate public space by simultaneously forgetting and keeping Google Maps in mind. This allows me to pin things that are of interest and/or important: where I work, where my friends live, where most of my social interactions take place. Using Google Maps is not just about finding my way around but also about keeping track of my way(s) in the world. While I could tackle this subject from the point of view of privacy and the ways in which Google Maps learns from my habits, I would rather examine the moments when it fails to meet my expectations.[4]

While technology renders itself invisible through its smoothness, glitches and failures serve as reminders of its presence. It is in the moments that Google Maps does not work that I notice it. As Sara Ahmed suggests, “[w]hen something stops working or cannot be used, it intrudes into consciousness.”[5] There is a lot to be learned about tools by examining how they are used. In her book What’s the Use? On the Uses of Use (2019), Ahmed traces the process by which the word “use” acquired its symbolic status and how it is used in language. She wants to understand how “use” gives form to things, bodies, and spaces, and how “use” can change depending on where and when something or someone is “put to use.” Ahmed’s vast project tackles the term “use” through various analytical lenses from literature, philosophy, biology, gender studies, and institutional critique. These multiple threads are brought together by the idea of “queer use,” which has informed the way I think about the projects discussed below.

The combination of the words “queer” and “use” might suggest that there is also something we can call “straight use” that represents the intended functionality of the object. Designers, myself included, usually design things with their “straight use” in mind. When I design a poster for an event, I want to convey information in such a way that as many people as possible are interested enough to show up. What I do not think about when I design a poster is how it will be used to decorate the venue of the event, how it will hang in people’s homes like a painting, or how it will eventually be used as Christmas wrapping paper.[6] While some things are shaped by how they are used, use itself is shaped by what can be done with those things, both materially and technologically. To use something in a queer way means using it “for purposes other than … intended.”[7] “Queer use” highlights the individual qualities of things, “rendering them all the more lively.”[8] To make use of something in a queer way means unleashing the potential of a thing by paying attention to what else it can do. While I myself, as a queer person, would like to read “queer use” in a strictly positive way, it must also be pointed out that uses can also be discriminatory, such as using the collaborative features of Google’s Local Guides platform, which allows users to change the names of buildings as a way to keep local information up to date, to incite racism.[9]

title

Photoshopped screenshot of Queering the Map.

On account of the Google Maps’ failure during my holiday and Ahmed’s description of “queer use,” I started looking differently at way-finding and way-making technologies. The ghostly bus stop may have a remnant of some path that was once useful to someone else. The fact that an “out of use” bus stop appears on a map is a glitch. This glitch is a witness to the map’s memory. This bus stop is a memory, although maps are not supposed to have memories. It is a leftover, the removal of which has been delayed. In an attempt to gather such leftovers, spaces that were once “put to use,” even if only for a fleeting moment, designer Luca LaRochelle created Queering the Map, a platform that engages with the question of what "futures might emerge from this kind of embodied knowledge.”[10] This “community-generated, counter-mapping project" allows its users to record their experiences as text and place them in the physical space of a map, therefore exploring the tension between physical reality and affective memory.[11]

As a frequent visitor to the website since its first iteration in 2017, I have been surprised by its current size: the pink world map, sourced from Google’s API, is flooded with black pins representing individual contributions to the platform. While reflecting on the platform’s development, LaRochelle has pointed to the difference between understanding Queering the Map as a map of queer stories (which it is) and as a map that is “queer."[12] While the former points to the platform’s content, the latter grasps its form. To design a map that is queer or a map that is meant for “queer use” can point to two different desires. One aligns with Ahmed’s concept of “queer use,” meaning a map that is used in a way other than how it was intended, while the other points to its intended usership. In the case of Queering the Map, this distinction is irrelevant since the platform performs both.[13] It is a digital map that creates a space for a worldwide community of queers that is outside of “algorithmic control” and the “endless north/south (straight) scroll,”[14] thereby using of a map not to find one’s way, but to lose one’s way.[15]

title

GIF made out of scans of the Queeraspora publication

Queering the Map conceived of a map that is queer because it helps its users lose rather than find their way. The publication Queeraspora Collective Mapping is as much about collecting single points to be found or lost as it is about the lines that can be drawn between them. The publication, which stems from a collaboration between Queeraspora,[16] Queer narratives, mapped,[17] and city/data/explosion,[18] is “the self-documentation of the daily lives of its contributors and their personal geographies as queer (post-)migrants, refugees, BIPoCs in the city of Bremen.”[19] Slightly bigger than a horizontal DIN A4, the book is held together by only two Chicago screws, suggesting that this project is a work in progress.

The publication contains the “self-documentation” and “personal geographies” of its contributors, not in the form of traditional maps, but as hand-drawn lines that are printed on transparent paper. These colorful lines form crisscrossing paths; sometimes they form shapes akin to a city map or to a scene in a comic book. Some lines are straight and sharp, while others are made up of smaller lines or dots. Similar to LaRochelle’s Queering the Map, these personal maps do not designate specific spaces, streets, or buildings, but instead document individual queer and diasporic experiences and relationships to the city. While some of these maps are concerned with city spaces, for instance bus stops, squats, and public buildings where queer demonstrations or Queeraspora meetings have taken place, others are memory and narrative driven, drawing lines through time, not space. They recall moments of joy and/or struggle upon arriving to a new city, excitement about new opportunities, frustration about being misunderstood, and curiosity upon discovering a queer BIPoC scene where they feel welcomed. What is generative about the publication is that its design allows contributors and readers to place individual maps onto the collective stack of queer diasporic memories in order to discover overlapping moments. In the very way in which the publication is bound, the maps not only represent individual experiences, but also reveal affinities and differences within this community. The publication features inlays with pixelated images of meetings and happenings by and for Bremen’s queer diaspora community. It is only on the last page of the publication that we find a satellite image of the city of Bremen, which situates these “personal geographies” in space.

Projects like Queering the Map and Queeraspora Collective Mapping are able to create room for experiences and memories that are at once polyphonic and singular, harmonious and dissonant. These projects make “all the more lively”[20] the potential of mapping tools to serve as archives of human memory and experience.

Going back to Google Maps, the Mercator projection, and Ruben Pater’s discussion in The Politics of Design, it would be interesting to ask a different design question: What if the problem of and about maps is not necessarily about form but rather about practice? If the function of a map is to help find one’s way, from whose perspective do “we”[21] look at public space? In the spirit of Queeraspora Collective Mapping, and in light of current technological possibilities, especially platforms like Google Maps, we may ask: How many maps fit into one

As I come to the end of this text, I notice how I have prioritized the information that maps give me over what takes place in public space. I often forget that streets, parks, and buildings are memories in and of themselves, holding traces within the pavement, walls, and ground. In Vienna, the city I reside in, the city's administrators are quite preoccupied with preserving monuments, buildings, and other urban infrastructure. There is also a community of researchers, artists, and architects, who reflect critically on the urban landscape and its ties to Austria’s fascist and colonial past(s).[22] One such individual is Andreas Brunner, a co-founder of QWIEN – Zentrum für queere Geschichte Wien, who offers regular queer walking tours (Queere Stadtspaziergänge).[23] QWIEN offers tours about the her*histories of queer people in Vienna as a way to communicate to residents and tourists alike the heavily researched and theory-based work that they do as an archive, a library, and a research institution. By making these her*histories visible and accessible, Brunner anchors them in the city’s history and, like Queering the Map and Queeraspora Collective Mappings, makes well-traveled paths and queered spaces from the past accessible again to younger generations who might still feel lost in Vienna’s straight ways. One focal point of these tours is the persecution of queer people during the Austrofascist period.[24] Oftentimes, reflecting on these stories of persecution is a difficult but necessary task. There were few records of queer people at the turn of the 19th and 20th century, and many of them come from criminal files and police reports.[25] By reading these documents in ways other than intended, researchers are able to piece together traces of queer existence. By using the format of the guided tour to disseminate this information, Brunner makes “queer use” of it, not only by providing information about the places and people, but also by reconstructing and reactivating relationships that History[26] was unwilling or unable to sustain.

title

Photoshopped screenshot of Google Street View of the Hotel Regina in Vienna.

In this text, I wanted to take the first step toward exploring how designers, technologists, researchers, and activists make use of tools and technologies for “way-finding and making” that can be considered queer. Here “queer” means, as Sara Ahmed suggests, making use of something in ways other than it was intended and using something with a queer user or audience in mind. In compiling this collection of projects and practices, I wanted to identify a number of projects that use mapping technologies in different media and that are engaged in grassroots practices of activating public space with and for queer people. The tools with which we, queer designers and technologists, map our world, our relationships, and our lives in public and private spaces will only be adequate to those for whom and by whom they were created. This essay is an attempt to encourage reflection on practices that address public space in both its real and virtual manifestations through the lenses of memory, affect, and embodied knowledge.

Until we see each other again, “Mischief managed!”[27]


  1. J.K. Rowling, Harry Potter and the Prisoner of Azkaban (London: Pottermore Publishing, 2015), 334, https://books.apple.com/at/book/harry-potter-and-the-prisoner-of-azkaban-enhanced-edition/id1037196784. ↩︎

  2. Ruben Pater, The Politics of Design (Amsterdam: BIS Publishers, 2016), 152. ↩︎

  3. For a comprehensive critique of the use of the Mercator Map in education, see: Delon Alain Omrow, “A map of the World: Cognitive injustice and the Other,” Journal of Philosophy and Culture Vol.8 (2), pp. 22-32, July-December 2020, https://doi.org/10.5897/JPC2020.0057. Also, in 2018, Google Maps enabled in its Desktop Version the “3D Globe Mode” as its standard view, allowing the map to represent the world in a more accurate manner. see: Andrew Liptak, “Google Earth now depicts the Earth as a globe,” The Verge, August 5, 2018. https://www.theverge.com/2018/8/5/17653122/google-maps-update-mercator-projection-earth-isnt-flat. ↩︎

  4. The issue of privacy within Google Maps' reviews feature has been extensively analysed in: Kevin De Boeck, Jenny Verdonck, Michiel Willocx, John Lapin, and Vincent Naessens, “Reviewing review platforms: a privacy perspective,” ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and Security, Association for Computing Machinery, New York, NY, USA, Article 8, 1--10, https://doi.org/10.1145/3538969.3538974. ↩︎

  5. Sara Ahmed, What's the Use? On the Uses of Use (Durham: Duke University Press, 2019), p. 21. ↩︎

  6. Interestingly, in What's the Use?, Ahmed makes reference to the way the word “queer” used to be employed meaning “reused.” In her Conclusion, Ahmed quotes a newspaper article from 1899 titled “Queer Use for Cloisters.” See, Ahmed, p. 199. ↩︎

  7. Ahmed, p. 26. ↩︎

  8. ibid. ↩︎

  9. Here I reference the digital vandalism case that resulted in searches for the “N-word\” to indicate “The White House.” For more information see: Brian Fung, “The Internet has unearthed more racist Google Maps resulst,” The Washington Post, May 21, 2015. https://www.washingtonpost.com/news/the-switch/wp/2015/05/21/the-internet-has-unearthed-more-racist-google-maps-results/. ↩︎

  10. Luca LaRochelle, “Queering the Map: on designing digital queer space,” in: Queer Sites in Globals Contexts. Technologies, Spaces, and Otherness ed. Regner Ramos and Sharif Mowlabocus (London and New York: Routledge), p. 133. ↩︎

  11. ibid. ↩︎

  12. LaRochelle, p. 142. ↩︎

  13. In the context of this contribution, it is a distinction that is irrelevant since the examples I share here both encompass the use of technologies in queer ways and for a/the queer community. Nevertheless, I find it important to make this distinction, since the term “queer” is increasingly used outside of a strictly identity politics context to signify a deconstruction of binaries. ↩︎

  14. LaRochelle, p.42. ↩︎

  15. As LaRochelle states in their article: “To be lost is a feature not a bug.” ↩︎

  16. Queeraspora is an association based in Bremen working toward the organisation of safe-spaces for queer BIPoCs in Bremen, community empowerment and network, as well as anti-discriminatory and anti-racist work and policy making. For more information about the association and their activists, see: https://migrantenorganisationen-bremen.de/organisationen/queeraspora-bremen/, and https://www.instagram.com/queeraspora/?hl=en. ↩︎

  17. Queer narratives, mapped? is a working group that was born out of two workshops, one in 2019 and another in 2020, both of which dealt with the record of queer spaces, traces, and memories in the form of a digital map, as well as the reflections generated through the project's visual outcomes and documentation. ↩︎

  18. city/data/explosion examines the overlapping of digital communication and physical spaces, the evaluation and negotiation of digital and social media in the public sphere between control society and self-empowerment, the perception of public spaces and social public sphere through the filters of these very media. For more information, see: https://citydataexplosion.tumblr.com/about. ↩︎

  19. Queeraspora Collective Mappings, ed. Queeraspora and “Queer narratives, mapped” working group (Bremen: kunst- und Kulturverein spedition e.V.). ↩︎

  20. Ahmed, p. 26. ↩︎

  21. When I say “we,” I mean designers and technologists that identify as “queer” and with practices that are “queer” and make “queer use” of existing technologies. ↩︎

  22. I would like to take a moment to name a few of these individuals and collectives: the artist group Schandwache (Anna Witt, Simon Nagy, Gin Müller, Mischa Guttmann, Eduard Freudmann), the collective Decolonizing in Vienna!, Lisa Bolyos und Tomash Schoiswohl's project “Immo Grief,\” as well as architect and activist Gabu Heindl. ↩︎

  23. For more information about the different tours offered by QWIEN, see: https://www.qwien.at/guide/. ↩︎

  24. For a comprehensive overview of QWIEN's multiple research foci, see: https://www.qwien.at/forschung-projekte/. ↩︎

  25. The records of a community and its individuals is contingent on the technology of the time as well as to an individual's social standing and context. There are, of course, a number of queer personalities, specially members of the Austria-Hungary monarchy, actors, and writers, all of which have been immortalised in written biographies, films, etc. The point that I try to make here is more about the social history of a queer community rather than of a selected few. ↩︎

  26. I use here the word “history” with a capital “H” to refer to hegemonic history, told in history books from a perspective that is often white, male, cis-straight, middle-class, and stemming from Global North countries. ↩︎

  27. By placing one's wand on the Marauder's Map and saying the words “Mischief managed,” its user makes sure that others trying to see the contents of the map will only find an empty parchment. ↩︎

Cars driving cars

Diego Trujillo Pisanty

0

1

2

3

4

5

6

7

8

9

10

11

12

A machine that combusts liquefied biological remains to deliver torque and speed to the human body beyond its natural capabilities should not be considered normal. Yet, the motorized vehicle is one of the most common objects in the world today. It is almost impossible to go an entire day without encountering a car of some kind. They are so commonplace that we barely notice them anymore. We’ve learned to ignore their presence and even filter out the noise from their engines. Yet they have had a massive impact on our society, from literally shaping our cities to enabling same-day delivery. Perhaps it is the ubiquity of the car that hides all its strangeness in plain sight.

The integration of microcontrollers and processors into vehicles has endowed them with decision-making capabilities. The engine has become a computing device driven by data from various sensors. The pedals have been turned into human interface devices that can be controlled beyond their mechanical functions. In the project Cars driving cars, vehicles are abstracted into a minimal ontology based on the data that is extracted from their onboard computers. In this way, the car is reduced to the distance it has traveled, the time that the engine has been running, its speed, and the position of the accelerator pedal. This project consists of a series of experiments that explore how car data can be used to drive generative graphics and electronic devices.

Most recent cars have an on-board diagnostics (OBD) port that allows data to be read from the car’s computer using standardized serial commands. The main purpose of the OBD is to use a scanner to determine the source of a failure. However, there are also low-cost USB and Bluetooth interfaces that can provide access to real-time data while driving. In this project, one of these scanners is connected to a Raspberry Pi Zero computer. It runs a script that sends data (rpm, trip duration, distance, speed, and accelerator pedal position) every second while the car is being driven. Internet access is provided by a mobile hotspot.

title

Data extraction is a process of defamiliarizing. It involves separating meaningful information from the noise and chaos of the tangible world in order to see it with fresh eyes. The mere act of measuring converts reality into a caricature that begs to be visualized. Cars driving cars assumes that form must follow data, and thus creates images of cars with simple geometry that has been parametrically defined by the information gathered while driving. The resulting childlike illustrations prompt reflection on everyday car use and the time spent in traffic. These graphics are created by a computer program every time the car is turned off. The program processes the data it receives and uses it in the following manner:

  • Duration determines the height of the drawing.
  • Distance determines the width of the middle section.
  • Top speed determines the vertical angle.
  • And the percentage of time that the car was stationary modifies the color of the drawing (where red is a car that was turned on but never moved).

title

It can be difficult to interpret a single image because the trip data and resulting shape are greatly simplified. However, when viewed as a collection, it becomes possible to identify driving habits, recurring trips, and even the driving conditions in the city. The car thus ceases to be a functional object and becomes a reflection of routines ranging from labor to social life and leisure.

title

The desire to compare how the graphics change over consecutive trips inspired the create of an interactive visualization. By interpolating the shape and color of each car with the next one, the subtle differences between the trips becomes visible, especially when one of the trips is interrupted by a stop in between. This browser-based application can be seen at: http://cars.trujillodiego.com

title

The accelerator pedal in a car can be thought of as one of the most popular and powerful interfaces in the world. Buses, ambulances, couriers, and even warfare are moved by a foot on a pedal. But by treating the pedal as a computational interface and transmitting its position, it can also drive electronic objects, including other (toy) cars.

title

The data being sent by the car can be received by a microcontroller in almost real time. An ESP32 development board connected via Wi-Fi converts the position of the real car’s accelerator pedal into pulse-width modulated (PWM) electrical signals. These can replace the controllers on an electrical toy racetrack. The throttle of the real car thus controls the speed of the toy car, allowing both cars to be driven at once. For a race, two separate vehicles can be connected to a transmitter, allowing those overwhelmed by work and responsibilities to automate their playtime and play as they commute.

title

The experiments presented here were only possible by thinking of the motor vehicle as a computational object, freeing it from its historical mechanical identity. Imagining the car in this way opens it up to the malleability characteristic of digital systems. The car as software allows it to be re-coded as an interface that represents more than just motion and encourages reflection on how driving fits into personal, social, and urban routines.

For the project's full code and how-to instructions visit https://github.com/dtpisanty/carsDrivingCars.

Modular Matter — Rewire your prints!

Jian Haake

0

1

2

3

4

5

6

7

8

9

10

11

12

title

Modular Matter is a tool that has been developed to playfully rethink and reimagine print design using modular synthesis. It is addressed to graphic designers and other creatives who are used to working with traditional desktop publishing software and other proprietary tools. The tool’s experimental and modular approach can help to challenge long-established ways of working and provide new impulses for graphic designers and creatives alike. By critically reflecting on the context and practice associated with the tool, Modular Matter invites users to think with the tool and hopefully find some inspiration and encouragement for their own future projects.
Modular Matter was developed in the context of graphic design and printing and was heavily influenced by critical observations about the fields’ conditions, mechanisms, and sociotechnical habits.

How proprietary tools shape graphic design

Looking at the field of graphic design, it is hard to deny that certain hardware and software are used universally. Graphic designers in large companies, creative studios, institutions, and the academy all use the same commercial toolkits that are now considered the industry standard. Owned by very a few, large companies that answer only to shareholders, these products set the norms. Rather than providing a wide variety of options and niche products, the large corporate players set standards for infrastructure, protocols, interfaces, and design options.
Everyone knows how to use these tools, but no one understands how they operate. This dependency causes a lack of agency that is not questioned enough in the creative field. Instead, many creatives prefer to feel confident in their practice, switching nonchalantly from one application to the next, comforted by the fact that they know how to navigate these familiar environments. Although many graphic designers feel very much at home in these proprietary toolkits, they tend to underestimate the implicit effects that the economic conditions and ethical issues have on their creative independence and practice as a whole.
The lack of diversity in tools not only produces a common aesthetic, often resulting in “sleek” and homogeneous visual output, but it also has an influence on the perception, experience, and imagination of creatives. The tool determines what is considered possible, and the tool’s limitations likewise define the boundaries of what can be imagined.
With these conditions and implications in mind, the need for a more independent design practice becomes apparent. If tools shape practice, the natural question to ask is: How can practice shape tools?

Counter Strategies: Make your own tools!

Tools are made and shaped by human beings. They don’t exist a priori, but instead are subject to specific cultural developments and conscious design choices. The most radical way to change your tool ecologies is to start making your own tools. Developing a tool from scratch, one situated and embedded in a concrete environment and shaped according to particular premises and needs, can help to address specific peculiarities and lead to better results. While a universal tool is developed to be one-size-fits-all, a DIY tool need not be compared in the first place. This can be relevant for tasks that are considered niche, but more importantly, it takes into account marginalized perspectives and urgencies.
The DIY tool can be unconventional, playful, and fun because it answers only to personal needs. Here, poetic and vernacular qualities outweigh practical and economic interests. A small, intimate gesture may prevail over a grand universal solution. With less pressure to design securely and efficiently, DIY setups often spark happy accidents and unexpected surprises, which should be welcome in any creative process.

Making Modular Matter

The basic idea for Modular Matter is simple. It uses the well-known concept of modular synthesis, but instead of staying in its original context of sound, the operating modes are translated and applied to the realm of print publishing.
A modular synthesizer is an electronic instrument that generates electronic sounds. It consists of many different and independent physical modules that can be connected in many ways to create and manipulate sound output.
Most graphic designers are used to desktop publishing, a computer-based technology that uses a combination of hardware and software components to produce some printable outcome. The whole operation involves input devices (keyboard, camera), control devices (mouse), and output devices (printer). It relies on a graphical user interface (GUI) and WYSIWYG (what you see is what you get) software. These tools and processes are so common that it is hard to even imagine a different setup.

Modular Matter is an attempt to rethink this print design workflow. Just like a modular synthesizer, the tool can be played like an instrument in order to create print layouts. This experimental and modular setup offers an unconventional, tangible approach to performing operations on text and graphics. The tool consists of several combinable hardware modules, each of which performs a specific operation with an operation-specific physical interface. The modules can be controlled by rotary knobs, slides, and switches. Patch cables can be used to connect the modules. For example, the output of one module becomes the input for another module, and so on. This is how the user creates a custom workflow for their printing project.
The physical interfaces of the hardware modules, especially in direct comparison to traditional desktop publishing, create a very unique design experience. Gestures, such as patching cables, turning knobs, and pushing (physical) buttons, are unusual with print design. This unfamiliar and at times clumsy interaction leads to a more conscious and intuitive control of the device.
In an otherwise disconnected human-computer-interaction, this hands-on approach offers an embodied experience of the underlying processes at work. The modular workflow inspires various new combinations and helps to provide a better understanding of the operations taking place. By rewiring the modules in all possible variations, the user has direct control over the infrastructure, workflow, and outcome.
This freedom to reconfigure has a profound effect. With Modular Matter, the user is basically building their own tools on the go. How the setup is configured shapes the outcome, which in turn leads to the reconfiguration of the tool, and so on. In other words, the practice feeds directly back into the shaping of the tool.

Choreographing You

Joana Chicau

0

1

2

3

4

5

6

7

8

9

10

11

12

Dear User, are you ready to move?


Algorithmic systems are often designed to be opaque, leaving users unaware of how much of their data is being gathered[1] and for what purposes. There have been a number of reported cases in which algorithmic systems have been responsible for harm and inequality[2] in vulnerable and marginalized communities. One example of this is online tracking algorithms that are present in most web services we access today,[3] though hidden behind user interfaces.

There are various, ever-evolving techniques that enable online tracking. A common one is browser cookies, small pieces of data in plain text format with no executable code that are created by a web server when a user visits a website. Another example is fingerprinting, a tracking technique that collects the settings of users’ web browsers in order to uniquely identify them. Both cookies and fingerprinting are ubiquitous in the ecosystem of the web and usually operate without users' knowledge. Information about users’ online behavior is collected and aggregated to be sold to the ad tech industry, which then provides users with personalized content. This endless feedback loop that has fueled the technological development of the web is driven by corporate interests and surveillance capitalism.

“Choreographing You” takes its title from the book Move. Choreographing You: Art and Dance Since the 1960s, published by MIT Press, which features works from dancers and choreographers who were inspirational to some of the work presented here.

In this context, “Choreographing You” consists of a series of choreographic prompts that combines common metrics from online tracking algorithms with physical enactments. Central to this artwork is the understanding of embodiment as physical engagement grounded in and emerging out of everyday experience.[4] It uses with body-centered approaches to develop an understanding of the actions we perform and the computational systems we interact with.[5]

What would happen if we were paused and breathed deeply every time we clicked? How would that affect our online behavior? Can we retrain our muscle memory to counteract the tracking of our habitual, day-to-day, mundane movements that are linked with tracking?

Twenty-three prompts are presented here as an interactive online display written in HTML, CSS, and JavaScript. These prompts include references to daily movements such as clicking, scrolling, moving the cursor, or idle time. In the interface created, users are invited to click on the “Choreographing You” button, which displays a random prompt while counting and accumulating the clicks made. The aim of the prompts is to draw the user’s attention to the movements they make online and how they are often traced, extracted, and quantified. Finally, the metadata under “this.performance” displays a list of fingerprints, information collected from the user’s browser and device with which the choreographies took place.

This work is an invitation for users to reflect on how different aspects of online presence relate to online tracking. With a touch of humor and absurdity, the choreographic prompts involve the user’s body in an active performance—which, if followed rigorously, may cause a lot of sweat and exhaustion. But aren’t we users already exhausted?

title

Animated gif of the choreographic prompts on a pink background with a blue button saying “Choreographing You”.

“Choreographing You” draws on a body of work [6][7] and ongoing research into embodied methods and tools for developing and analyzing web-based user interfaces to improve algorithmic awareness, legibility, and user empowerment.

Peers, projects and more:


  1. Søren Bro Pold, “New ways of hiding: towards metainterface realism,” Artnodes, no. 24 (July 2019): 72–82. https://doi.org/10.7238/a.v0i24.3283 ↩︎

  2. Goda Klumbyte, Phillip Lücking, and Claude Draude, 2020. “Reframing AX with Critical Design: The Potentials and Limits of Algorithmic Experience as a Critical Design Concept,” In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, (October 2020): 1–12. https://doi.org/10.1145/3419249.3420120 ↩︎

  3. Michael Kretschmer, Jan Pennekamp, and Klaus Wehrle, “Cookie Banners and Privacy Policies: Measuring the Impact of the GDPR on the Web,” ACM Transactions on the Web 15, no. 4 (July 2021): 1–42. https://doi.org/10.1145/3466722 ↩︎

  4. Paul Dourish, Where the Action Is: The Foundations of Embodied Interaction, Cambridge, MA: The MIT Press, 2001. https://doi.org/10.7551/mitpress/7221.001.0001 ↩︎

  5. Scott R. Klemmer, Björn Hartmann, and Leila Takayama. “How bodies matter: five themes for interaction design,” In Proceedings of the 6th ACM conference on Designing Interactive systems (June 2006): 140. https://doi.org/10.1145/1142405.1142429 ↩︎

  6. Joana Chicau. “Choreo-Graphic-Thinking,” Retrieved from https://joanachicau.com/backstage.html (Accessed: August 11, 2023) ↩︎

  7. Joana Chicau and Renick Bell, “Choreographies of the circle & other geometries,” Critical Coding Cookbook, 2022, https://criticalcode.recipes/contributions/choreographies-of-the-circle-other-geometries ↩︎

The fax machine revisited

Lars Hembacher, Paul Eßer

0

1

2

3

4

5

6

7

8

9

10

11

12

title

The fax machine should have become obsolete years ago, having been overtaken by the Internet, PDF files, Google Docs, and email,[1] but a recent study has demonstrated its resilience: 82% of German companies still use fax machines, and 33% use them often or very often.[2] In the U.S., the fax is still widely used in the healthcare and legal sectors.[3]
The invention of the fax was sandwiched between two other major communications inventions, the telegraph and digital technology. For most of its history, the fax was too expensive for office or home use. When it became affordable and available in the early 1980s, digital technology was just around the corner.[4] Fax usage exploded in the 80s and 90s. In the United States, the number of fax machines grew from 250,000 in 1980 to 5 million in 1990[5]. In Germany, there were 4,367 fax lines in 1981 and 1,100,000 in 1993.[6]
Though it is often derided today, the fax machine was the engine that led to today's globalized, on-demand economy. "Faxing accelerated the work cycle from weeks or days to hours or minutes. The need-for-speed mindset wholeheartedly embraced facsimile, whose immediacy gave a 'hot off the wire' urgency lacking in a letter or telex … Faxing blurred if not destroyed the distinction between work and everything else. For workaholics, fax machines enabled them to take their work anywhere. For everyone, deadlines never ended."[7]

Today, thermal printers are only used for fast, low-volume jobs like shipping labels or receipts.[8] In fax machines, they were the transitional technology between electrostatic paper and plain paper models. Starting in the late 90s, only very inexpensive models used thermal printers as laser and inkjet printers became available at affordable prices.[9]
As soon as fax machines arrived in offices, employees began to subvert their intended use. Instead of faxing documents between workers or offices, people started sending jokes, cartoons, or other non-work-related content to their coworkers. The fax machine became a canvas for collective creativity, blurring the lines between the mundane and the artistic.

This repurposing laid the groundwork for early networked communities, foreshadowing the meme culture that defines the Internet today.[10] Faxlore, a fax-based form of folklore, heralded a shift in content formatting due to the predominately visual medium of the fax. In his essay “Traditional Humor from the Fax Machine: ‘All of a Kind’”, Michael J. Preston writes: "What is striking when browsing through FAXES [a collection of faxlore] is the percentage of largely visual items; of fifty-eight, just five are faxed or photocopied typescripts or typeset items, unlike the practice before the general availability of the photocopier … .”[11] This transformation attests to the fax machine's role in shaping a more visually oriented culture.

title

Example of faxlore images.[12]

title

Example of faxlore images.[12:1]

Fax technology contributed to visual culture as early as the 1930s. Photographs of events from around the globe were sent via fax at a speed unmatched by earlier methods like plane or train. This allowed newspapers to print articles the next day featuring real pictures of disasters far away. Photojournalism was thus able to grow as a profession thanks to the speed of the fax.[13]

Nowadays, the transfer of documents and user-generated content has more or less moved to the digital sphere. The fax enabled an increase in the scale and the speed of communication, while the Internet has multiplied it exponentially. As computers have gotten faster, so have expectations. User interfaces are expected to respond in less than 400 milliseconds or they are perceived as non-functional,[14] and TikTok users get stressed when videos are longer than 60 seconds.[15]

In our project, we use the fax machine as a mere printing device equipped with a thermal printer. By bottlenecking the fast thermal printer with the fax machine’s 9.6 kb/s modem, the printing process is decelerated and the fax is deprived of its purpose. It's neither practical nor fast, transforming it into a purely aesthetic tool.
Interacting with a 30-year-old device makes the impact of technology on humans quite tangible. Why do we find slowness so unbearable? The fax machine represents not only a change in technology but also shows how technology influences humans. This is also evident in our preference for visual content, which can be seen as a result of the immediacy of image transmission that began with fax technology. However, the speed of the fax can no longer meet the expectations set by today's social media images.

Process

To get the fax machine to print images, we first tried to connect it directly to the thermal print head. Using the service manual, we located the pins for the SPI connection and our plan was to analyze the data sent in order to emulate it with an ESP32. Since we're total amateurs in the field of device hacking, we ran into a lot of problems trying to read the data sent by the fax.

title

Through discussions with Denis and Alex, we came to the conclusion that it might not be necessary to connect the devices in this way, and that the slow internal fax modem might be an interesting addition to the printing process. Thus, the next step was to try to simulate a phone line from a computer to the fax machine via an external modem. This was much easier, since only a resistor and a battery had to be soldered to the telephone cable.[16] However, there were problems sending data to the fax machine, although receiving faxes from it worked fine. In the end, we decided to let a Fritz!Box do the magic for us and just call the fax machine using the Fritz!Box. We used an USRobotics USR5637 modem, plugged the PC into jack 1 on the Fritz!Box and plugged the fax machine into jack 2. To send data to the fax machine, we used the Windows Fax and Scan App and dialed the number **2, which is the internal number to the second phone line. We used the Windows default driver for a 9600 bit/s modem, not the driver from USRobotics, which did not seem to work. When the fax modem was connected, it was also possible to select Fax from Window’s print menu, which allows users to send files to the fax as attachments that can be used on our local line.

Method

The installation consists of a Sharp UX-40 fax machine that is connected to a PC through a Fritz!Box and a modem. Via the terminal, a message can be sent to the fax machine to print. The script uses PowerShell to control the Windows and selects the necessary settings, such as Printing with Fax and the phone number **2.
The LED panel shows faxlore images that have been digitized and converted to video to fit the format.

The Script

The script used for the exhibition can be found here: https://github.com/paulesser/fax-script


  1. Kaleigh Rogers, “Why are fax machines still a thing?” Vice, January 30, 2015, https://www.vice.com/en/article/mgbkq4/why-are-fax-machines-still-a-thing ↩︎

  2. Merle Wiez, “82 Prozent der deutschen Unternehmen faxen noch,” bitkom, May 11, 2023, https://www.bitkom.org/Presse/Presseinformation/Digital-Office-Faxen-Unternehmen ↩︎

  3. Sophie Haigney, “The fax is not yet obsolete,” The Atlantic, November 18, 2018, https://www.theatlantic.com/technology/archive/2018/11/why-people-still-use-fax-machines/576070/ ↩︎

  4. Jonathan Coppermith, Faxed: The Rise and Fall of the Fax Machine (Johns Hopkins University Press: Baltimore, 2015), 2 ↩︎

  5. Jonathan Coppermith, Faxed: The Rise and Fall of the Fax Machine (Johns Hopkins University Press: Baltimore, 2015), 146 ↩︎

  6. Christian Henrich-Franke und Cornelius Neutsch, “Vom Brief zum digitalen Netz: Aus dem Siegerland in die Welt,” Universität Siegen, October 1, 2018, https://www.uni-siegen.de/start/news/forschungsnews/837740.html ↩︎

  7. Jonathan Coppermith, Faxed: The Rise and Fall of the Fax Machine (Johns Hopkins University Press: Baltimore, 2015), 161 ↩︎

  8. “Thermal printing,” Wikipedia Foundation, September 8, 2023, https://en.wikipedia.org/wiki/Thermal_printing ↩︎

  9. Jonathan Coppermith, Faxed: The Rise and Fall of the Fax Machine (Johns Hopkins University Press: Baltimore, 2015), 150 ↩︎

  10. Hannah Barton, “Faxlore: Memes down the line,” Cyborgology, April 13, 2015, https://thesocietypages.org/cyborgology/2015/04/13/faxlore-memes-down-the-line/ ↩︎

  11. Michael J. Preston, “Traditional Humor from the Fax Machine: ‘All of a Kind’”, Western Folklore 53, no. 2 (April 1994): 155-156. ↩︎

  12. Reverend, “Xerolore: Folklore in the age of mechanical reproduction,” bavatuesdays, November 29, 2007, https://bavatuesdays.com/xeroxlore-folklore-in-the-age-of-mechanical-reproduction/ ↩︎ ↩︎

  13. Jonathan Coppermith, Faxed: The Rise and Fall of the Fax Machine (Johns Hopkins University Press: Baltimore, 2015), 54 ↩︎

  14. “Doherty Threshold,” lawsofux, https://lawsofux.com/Doherty-threshold/ ↩︎

  15. Chris Stokel-Walker, “TikTok wants longer videos – whether you lit it or not,” WIRED, Feburary 21, 2022, https://www.wired.co.uk/article/tiktok-wants-longer-videos-like-no ↩︎

  16. DIY Hacks and How Tos, “Simple intercom from a pair of old corded phones,” Autodesk Instructables, https://www.instructables.com/Simple-Intercom-From-a-Pair-of-Old-Corded-Phones/ ↩︎

Attaching as Active Practice

Benno Brucksch

0

1

2

3

4

5

6

7

8

9

10

11

12

An Invitation to Recontextualize RFID Technology in Your Home

When I feel at home, I feel connected. Connected to the space, to the objects filling it, to the people sharing it with me, and, of course, to specific memories. As one changes over time, so does one's perception of what constitutes home. Magdalena Rozenberg describes home as something that is constantly becoming and constantly transforming (Rozenberg 2022). Something that significantly influences our perception of home is the increasing presence of technology.

In this essay, I want to focus on one of these technologies and I invite you, dear reader, to actively engage with this technology and critically question its status quo. The technology I am referring to is probably something you use on a daily basis. It is called RFID, or Radio-Frequency Identification. It belongs to a group of technologies used to attach digital information to our physical surroundings, just as we attach memories to physical things. You probably know it mainly from places outside of what I would consider home. You know it from paying at the supermarket with your phone or your bank card. You use it when a key card gives you access to a specific door. It is embedded in your passport and is hidden in every book that you borrow from the library.

RFID tags are tiny microchips, some no larger than a grain of rice, that blend seamlessly into your everyday environment. (See fig. 1) When a tag comes close to a corresponding device, a current is generated and the read or write operation can be executed. During a read operation, the tag transmits stored information, such as a unique identification number, product details, personal data, or access privileges (Rosol 2017), which have been stored previously via the write operation. In this essay, I will primarily focus on a subtype of RFID known as NFC, or Near Field Communication, which is used in the latest smartphones. Hence, it's highly probable that your smartphone can not only read NFC tags, but can also write to them.

title

Figure 1: RFID tags in various sizes and shapes © Benno Brucksch 2022

RFID and NFC are also used in what I consider the home, such as home security, home automation, smart appliances, and pet tracking. These uses all share certain principles and goals. Some of them are quite obvious, like the desire for safety and control, and some are rather hidden, like the interests of that companies that sell these products (Fantini van Ditmar 2019). But other principles and goals are also possible. When I explained what NFC and RFID are, I said that they are technologies used to attach digital information to physical surroundings. Let us take a closer look at what is meant here by “attachment.”

“As a thing, ‘attachment’ refers to matters that we add on to something else. Something we connect something else with. … Attachments hold links, connections, details. … Attachments hold a stickiness because they can stick with what they are attached to” (Fjalland 2020, p. 64).

Attaching something to something else is a delicate practice. It can connect what was previously unconnected. As a result, these things are attached. The agents involved in these complex processes can be both human and non-human. Just as a note can be attached to a wall, or a person can be attached to another person or to an object. In her contribution to the book Connectedness - An Incomplete Encyclopedia of the Anthropocene, Emmy Laura Perez Fjalland, a researcher in the field of landscaping practices, points out that, “attachments might then be material, biological, social, cultural [or] organic (to mention just a few)” (2020, p. 64).

I began this essay by explaining what makes me feel at home, namely the attachments I hold. I feel attached to a variety of things, such as certain materials or shapes, as well as intangible things like specific memories. This includes the chair I am sitting on now, which was a gift from my mother, and the postcard I have on my mirror, which reminds me of someone very important. Given the complexity of relationships and the tendency to become attached to things, I propose we conduct an experiment: Attaching NFC tags within the home environment. I invite you to actively participate in this experiment. While the scope of this essay is too limited for a comprehensive technical exploration of NFC, I want to concentrate on enabling you to actively engage with NFC technology:

  • As I said, it is very likely that your smartphone is already equipped with NFC. This feature is always enabled on an iPhone, but on phones with a different operating system, like Android, you will need to enable it in the system settings.
  • Now, get some NFC tags. I recommend self-adhesive tags from the NTAG family of chips, known for their compatibility and affordability (as low as 15 cents each).
  • To get started, download and install one of the many NFC apps available. For example, the free version of NFC Tools is ideal for our purposes.
  • Open the app. You will be presented with two options: “read” and “write.”
  • If you simply want to add a text record, select “write,” then “add record,” and finally “add text.”
  • At this point, enter your desired text and use the “write” option to save it on the tag. Keep in mind that the storage capacity of these tags is quite limited.
  • The app will tell you to bring the tag close to the antenna, which, in the case of my iPhone 12, is located at the back upper left corner. On other devices, it may be in the middle of the back.
  • To read the text record of the tag, choose the “read” option and again bring the tag close to the antenna.
  • You can also store a URL on the tag, which opens up numerous possibilities beyond just a text record. You can use URLs that link to YouTube videos, Spotify songs, or files you stored in the Cloud. If you now choose “add URL,” you can type in the URL and write it on the tag. (See fig 2)
  • To read this URL, you now do not need to use the app anymore. Just bring the tag close to the antenna of your phone or any other phone and a notification will automatically pop up. By clicking on this notification, you will be directed to the URL.

Now it is your turn. What are the first things you want to attach together? How about distributing your digital photo or music collection throughout your home? Do you want to reinforce a memory associated with a photo by linking it to a specific song? What kind of connections do you discover through the act of attaching digital content? Does this change anything about your connection to the information or to the objects? And what does all of this do to your perception of home?

Figure 2: An audio tape from my childhood linked to the digital audiobook © Benno Brucksch 2022

Fjalland explains that attachments 'hold a stickiness' and in the case of RFID tags, they conveniently come with a layer of adhesive to facilitate the attachment. When I started using these tags, I began to attach them to various objects around me. I linked digital holiday photos to holiday souvenirs, research papers to my favorite science fiction books, the instruction manual of my synthesizer to the synthesizer itself, music to printed photos, and small web-based games to decorative objects. (See fig. 3-7) I began to link my whole flat with digital content. In my kitchen, I placed tags on the tiles that were linked to different radio stations, and in the hallway, I attached private photos to the walls via tags. Certain connections just made the already existing attachment feel stronger, while other connections established an attachment to a simple object, such as a lighter, that was not there before. As a result, the way I moved around my home and interacted with the objects in it was transformed and became more dynamic. Many things became more exciting to interact with. The act of attaching something digital to a physical object felt like a very strong way of establishing or building something new. The digital and the physical things became part of a new story that was very quickly inscribing itself into my memory.

Figure 3: A handmade fox carved out of wood connected with a self-produced DJ set © Benno Brucksch 2022

Figure 4: The digital version of my master's thesis linked to my personal notebook © Benno Brucksch 2022

Figure 5: More digital photographs of the festival linked to a photograph of the festival gang © Benno Brucksch 2022

Figure 6: The song “Nails, Hair, Hips, Heels” by Todrick Hall attached to my favorite nail polish © Benno Brucksch 2022

Figure 7: Different songs with a length of 3 min each attached to my toothbrush mug © Benno Brucksch 2022

Technologies have a significant influence on our behavior and on our social relationships – the smartphone is perhaps one of the best examples. The design of new technologies and applications is therefore always an act of (re)shaping these dynamics. RFID is usually embedded so that it is invisible to the user. With this invisibility also comes a position of power, for only a few individuals are able to understand and shape the technology (Hjelm 2005). With the increasing integration of NFC into smartphones, the active engagement of those who carry them in their pockets can serve as an important area for research and the development of alternative ways of uses. To develop such alternatives, there needs to be a democratization of knowledge, skills, and software related to RFID.

The experiments I invited you to take part in do not aim to offer practical, everyday solutions. Instead, they serve as a point of departure for engaging with this technology and exploring the intriguing issues it raises – an approach rooted in my design perspective and my research methods. It is the playful and joyful hands-on engagement that holds the greatest potential for developing one’s own understanding and feeling for RFID and the topic of attachment. My objective in this essay has been to engage you, to encourage you to playfully interact with this technology, to explore its potential uses, and contemplate the implications it holds. The context of the home represents a space where this technology is already being used, but in a very different way. It is a place that already holds many attachments, is very personal to you, and probably also quite different to what I might consider home. Given that RFID technology is already being integrated into many homes and is an important part of future technologies, this essay might be a first step to enable you to actively take part in shaping where this leads us.

References

  • Fantini van Ditmar, Delfina. 2019. “The IdIoT in the Smart Home.” In Architecture and the Smart City, ed. Sergio M. Figueiredo, Sukanya Krishnamurthy, and Torsten Schroeder, 1st ed., 157–64. New York: Routledge.
  • Fjalland, Emmy Laura Perez. 2020. “Attachment.” In Connectedness: An Incomplete Encyclopedia of the Anthropocene, ed. Marianne Krogh, 64–65. København: Strandberg Publishing.
  • Hjelm, Sara Ilstedt. 2005 “Visualizing the Vague: Invisible Computers in Contemporary Design.” In Design Issues 21, no. 2: 71–78.
  • Rosol, Christoph. 2017. RFID: Vom Ursprung einer (all)gegenwärtigen Kulturtechnologie. 2., Unveränderte Auflage. Berliner (Programm) einer Medienwissenschaft 7.0, Band 4. Berlin: Kulturverlag Kadmos.
  • Rozenberg, Magdalena. 2023. “The Moving (Rhizomatic) Home.” In Royal Chambers: Home as Host, Host as Home, by Anny Wang and Tim Söderström, 111–17. Stockholm: Arvinius+Orfeus.

Bio

Benno Brucksch (he/him) is a designer, researcher, and lecturer with a focus on digital technologies and their socio-political implications. He studied Industrial Design at Burg Giebichenstein Kunsthochschule Halle (BA.) and COOP Design Research at the Bauhaus Dessau Foundation (MSc.). His master’s thesis “Attaching and being Attached,” explores the modalities of RFID technology in the context of personal use by taking a participatory approach. He is part of the Fabmobil team and a founding member of the collective Druckwerk.xyz. Since 2017, he has been a regular lecturer at universities like the Berlin University of the Arts, HyperWerk in Basel, and the University of Art and Design Linz.

Heartbreak Cards

Naoto Hieda

0

1

2

3

4

5

6

7

8

9

10

11

12

24-Hour Heartbreak Cards emerged from a practice of sharing personal memories on printed, collectible cards and is accompanied by a tutorial about the process of making them. We have become used to uploading personal stories and photos on social media that become a byte stream on the database of some tech giants. In contrast, this project takes a slow approach by transforming such moments from life into a one-of-a-kind print to be shared in real life.

Naoto Hieda is a Japanese artist living in Germany with an engineering background. Naoto is currently studying at the Academy of Media Arts in Cologne, Germany and works internationally for theater productions and in the visual arts. In their artistic work, they question the productive qualities of coding and speculate on new forms, post-coding through neuro-queerness, decolonization, and live coding.

cards in a square

autism emotions exhaustion recognition reconstruction stimulus texture work

HTML Zine Club

Nami Kim

0

1

2

3

4

5

6

7

8

9

10

11

12

HTML Zine Club Spinner is a collection of interviews with students who took part in artist Nami Kim’s experimental two-week class HTML Zine Club at the Willem de Kooning Academy. In it, she showed how to make a webzine by teaching the basics of HTML & CSS and experimenting with the artistic potential of the two basic coding languages. Like print zines, the webzine is a personal, story-based publication, which can also be made interactive and nonlinear with code. Although the process of learning the two languages may require a lot of patience for people with little to no coding experience, coding by hand does offer a far more in-depth experience. In addition, the two languages also allow for many different aesthetic experiments, helping designers and artists to break free from the common visual constraints of dominant web culture.

“I want to be able to build it by myself so that I know what and how I want it to be.” — Aggie Chang

After the courses in January and June 2023, Kim was curious about what the students thought of the class, their experience with identifying issues and possible solutions on their own, and what they thought of her teaching skills. Through conversations with the students, she was able to reflect on how digital media is taught in the context of art school, how students develop their own visual languages within the creative industry, as well as what they thought of the course in general.

“It's about expanding my memories and feelings." — Garam Park

Zine by Aggie Chang

Zine by Aggie Chang

Zine by Alexandra Leon

Zine by Alexandra Leon

Zine by Garam Park

Zine by Garam Park

Zine by Enrique Krahe Fernandez

Zine by Enrique Krahe

Cutting the Cloud

Francesco Scheffczyk

0

1

2

3

4

5

6

7

8

9

10

11

12

As our homes become smarter, new technological infrastructure is becoming an integral part of our homes. It is changing the way we behave and interact in one of our most private and sensitive spaces.

Cutting the Cloud is an artistic research and hacking project that explores the multiple dimensions of smart home technology, using a cheap, battery-powered temperature sensor as an example. The project attempts to shed light on the origins and purposes of the sensor. It asks who it is connected to, and how it can ultimately become free.

The insights gained by looking at the temperature sensor from different perspectives have been collected in an interactive website. Through freeing the temperature sensor from the cloud, it became part of the website, influencing how much of the research will be visible in the end.

Alt text

The ☁️ around temperature sensors

In a course I took at the Hochschule für Künste Bremen called Aliexpress Archaeology, our task was to delve into the depths of Aliexpress and find objects that gained our interest. Aliexpress is the consumer shopping platform of the Alibaba Group Holding Limited. It provides a direct link to production facilities, cutting out various middlemen in the supply chain and offering products at low prices.

As I explored the site, my attention was quickly drawn to very affordable smart home products. I was particularly intrigued by a battery-powered temperature sensor advertised as Tuya WIFI Temperature Humidity Sensor Indoor Hygrometer Thermometer Detector Smart Life Remote Control Support Alexa Google Home.[1]

Frontal view of the temperature sensor

The price of the TH08 temperature sensor was €7.62, which seems rather low for such a technical device. This led me to the following questions:

How can a smart home device, which has quite a few technical features, be offered at such a low price?.

In addition,

What is the purpose of such a cheap device? Who benefits from it?.

Beyond these questions, I was also intrigued by the device itself. I wanted to see if I could somehow acquire or hack the technical inner workings of it. My original idea was to gain control of the screen and use it to project a visual narrative. Despite my attempts, I was unsuccessful, which you can read more about in the second part of the documentation.

The following chapters are broad areas of research that I stumbled upon while trying to hack the temperature sensors. The research is divided chapters that together try to provide answers to the questions above.

Value of labour

In our current capitalist society, the value of labour is most often expressed in terms of money. To better understand the value of the labour in the TH08 temperature sensor, I tried to backwards engineer the price of the device. I started by looking at the PCB and calculating the price of each component.

Top view of the PCB with annotated components. | component overview

I looked up the component prices on the Assembly Parts Lib of JLCPCB. [2] JLCPCB is a commonly used website for making your own PCB designs. As many sellers on Aliexpress and JLCPCB are based in Shenzhen, I thought this would be a good reference point. Two of the chips had the label erased, so the price could not be determined. However, they are probably a TuyaMCU chip and an RTC chip. Some other components have labels, but none could be identified. [3] [4]

Prices from JLCPCB Assembly Parts Lib

Component Amount $ Price € Price € Total
CBU(edzu) 1 $3.2121 3,05€ 3,05€
BL55070 1 $0.4865 0,46€ 0,46€
AHT20-F 1 $0.6566 0,62€ 0,62€
NP2302FVR-J-G 1 $0.0109 0,01€ 0,01€
32.768 JSK ENM (similar) 1 $0.0739 0,07€ 0,07€
LED (similar) 2 $0.0101 0,01€ 0,02€
TuyaMCU (unknown) 1 ? ? ?
RTC (unknown) 1 ? ? ?
FDAR voltage regulator (2,8 volts) (unknown) 1 ? ? ?
FEAQ voltage regulator (3,3 volts) (unknown) 1 ? ? ?
6BRO resistor (unknown) 1 ? ? ?
Button (unknown) 1 ? ? ?
Battery Contacts (unknown) 2 ? ? ?
Price in total 4,23€

Note that this is the price of just some of the components. It does not include the plastic casing, the LCD screen, all the small resistors and capacitors, or the material for the PCB itself. Although this is a very rough estimate, it still gives a good idea of the cost of the materials. Subtracted from the original price of the unit, we are left with:

7,62€ – 4,23€ = 3,39€

From this remaining amount, there are still costs to cover, such as

  • Manufacturing costs other than the bill of materials
  • Financing costs
  • Fulfillment costs
  • Fixed costs
  • Internal costs
  • Packaging costs
  • etc.

These are just the so-called COGS (cost of goods). It does not even include the mark-up. [5] [6] Although this is a rough calculation, it is a good starting point for estimating the value of the work that went into making this device.

Aliexpress and Shenzhen

To understand why the device is available at such a price, there are two key aspects to consider. The first is the Aliexpress platform itself, and the second is the production facilities in Shenzhen.

As mentioned above, Aliexpress is Alibaba's consumer shopping portal, known for offering products at low prices. In addition to the fact that manufacturers sell directly on Aliexpress without intermediaries, several other factors contribute to the lower prices. Shipping is subsidised by the Chinese government when using China Post, the national postal service. This encourages sellers to offer free shipping to customers on the platform. In addition, the cost of raw materials and consumables is low for manufacturers, as Chinese government policy ensures that manufacturers can purchase and source their materials at competitive prices. Finally, low labour costs must also be taken into account to keep prices low. [7] [8]

shenzen skyline

Another important factor is the location of the production facilities in Shenzhen. Shenzhen is a Special Economic Zone (SEZ) designated by the Chinese government to promote economic growth and innovation. As an SEZ, Shenzhen enjoys various tax incentives and relaxed regulatory policies. This has attracted a large number of manufacturers and technology companies to set up operations in the city, resulting in a highly competitive market. The concentration of companies in Shenzhen fosters intense competition among suppliers, which drives down production costs. Aliexpress sellers in Shenzhen can tap into this ecosystem of low-cost manufacturing and use the city's logistics infrastructure for efficient global shipping, ultimately contributing to the platform's ability to deliver low-cost products to consumers around the world. [9] [10]

Dropshipping

Another interesting thing I noticed was that the TH08 temperature sensor and others I bought (you can find a full list in the second part of the documentation) were available outside of Aliexpress. I was able to find several units I bought on Aliexpress on Amazon as well. The pictures, names and descriptions were slightly different, but the real difference was the price. Depending on the device, the price on Amazon was up to 2.8 times higher than on Aliexpress.

Aliexpress Amazon
TH08 TH08
TH01 TH01
KBZ-FR KBZ-FR

This calculation only makes sense if you work with the sales prices of Aliexpress, but since my observation the devices have never been out of sale and I have never paid more than the sales price. The high price difference as well as the mismatch in the seller led me to the thesis that the products are sold through dropshipping.

Dropshipping is a business practice where the seller does not keep the products in stock, but instead transmits the customer's orders and shipping details to either the manufacturer, another retailer or a wholesaler who then ships the goods directly to the customer. As a result, the seller does not have to handle the product directly. This practice is very common with products from Aliexpress and explains the price difference between Aliexpress and Amazon, as otherwise the seller would not make a profit. [11] [12]

Another indicator for the dropshipping thesis is the Expo website from Tuya. That platform enables sellers to buy Tuya products in high volumne from certified suppliers. This platform allows sellers to buy Tuya products in bulk from certified suppliers. On this website, it is also possible to buy the TH08 Temperature Sensor that I bought from Aliexpress, even with the ability to customise it.

Proprietary Technology -
TuyaMCU and Tuya Cloud

Finally, I would like to draw attention to the use of proprietary technology in these smart home devices. All the devices are equipped with WiFi modules and MCU chips from Tuya. Tuya is a Chinese smart home company that provides technologies to others to facilitate the development of smart home products. This ranges from cloud services, to development tools such as SDKs, to WiFi chips and MCU chips that make it easy to build compatible circuit boards. [13] [14] By offering all these services, it becomes very easy for a third party to develop and distribute smart home products. While this sounds good at first glance, it is a smart move by Tuya to integrate the devices into their ecosystem. This means that all devices are only compatible with the Tuya apps and the Tuya cloud. Therefore, all data collected by the devices is also stored in the Tuya cloud. As the services offered by Tuya are proprietary and not open source in any way, it is not possible to use their service without relying on their cloud.

This is problematic on several levels. On the one hand, companies using their services have to constantly react to changes that Tuya makes to their services without having a say in them. As a customer, this is even more problematic because sensitive data is stored in a cloud that is not under your personal control. As most customers use these devices in a very private space, most likely their homes, this becomes a major risk. Especially since it has already been proven that Tuya stores a lot of information about the devices and their use, such as network status, IP addresses, locations, and even images or videos if the device is equipped with a camera. [14:1] [15]

The second part of this project, is about the attempts to free the devices from the Tuya cloud ecosystem, to gain more control over data usage and to use the devices more freely.

If you have questions, ideas or feedback about this project, I would love to here from you! Feel free to reach out.


  1. In the following the temperature sensors will be referred to with their model number. ↩︎

  2. https://jlcpcb.com/about ↩︎

  3. This forum post was very helpful to identify the components. ↩︎

  4. Prices are from 2023-09-27. ↩︎

  5. https://community.frame.work/t/calculating-the-full-cost-of-a-hardware-product/163 ↩︎

  6. https://www.raypcb.com/manufacture-electronics-cost/ ↩︎

  7. https://www.lifewire.com/what-is-aliexpress-4174570 ↩︎

  8. https://www.nextsmartship.com/blog/why-is-aliexpress-so-cheap/ ↩︎

  9. https://www.weforum.org/agenda/2022/02/special-economic-zones-how-one-city-helped-propel-its-country-s-economic-development/ ↩︎

  10. https://www.china-briefing.com/news/tax-incentives-region-wise-china-comprehensive-summary/ ↩︎

  11. https://www.wired.co.uk/article/dropshipping-instagram-ads ↩︎

  12. https://gupea.ub.gu.se/bitstream/handle/2077/52792/gupea_2077_52792_1.pdf;jsessionid=EFF0B3B7B198CE6BED8439FB1559AF6A?sequence=1 ↩︎

  13. https://www.tuya.com/about ↩︎

  14. https://www.voanews.com/a/east-asia-pacific_voa-news-china_cybersecurity-experts-worried-chinese-firms-control-smart-devices/6209815.html ↩︎ ↩︎

  15. https://images.tuyacn.com/app/pAs/tuyaen0930.html ↩︎

Exhibition

Under the theme ‘Re-Coding Everyday Technology’, the working group for unusual input and output media invited artists, researchers and designers to create contributions and perspectives for the publication of the same name. Parallel to the online publication, various interdisciplinary works that reflect, question and reinterpret digital technologies in everyday use were presented in the LUX Pavilion from 11 to 31 October 2023.

Everyday technologies such as Google Maps, printers, RFID chips, emails, websites, fax machines and other black boxes were thus examined from new angles, raising questions and offering perspectives for further thought. The aim is not to create a uniform, seamless impression, but to create space for non-functional, subversive and multi-layered approaches. All contributions are based on the common understanding that technology, society, politics and culture exist in a complex interrelationship and mutual dependence.

The online publication will remain online after the exhibition and invites you to read the contributions at https://re-coding.technology/.

Colophon

This publication is the result of the ungoing research into digital media by the working group for unusual input and output media at NODE Forum for Digital Arts and the University of Applied Sciences Mainz.

Contributions

Verena Kuni, Yifeng Wei, Mario Santamaría, Guilherme Maggessi, Diego Trujillo Pisanty, Jian Haake, Joana Chicau, Lars Hembacher, Paul Eßer, Benno Brucksch, Naoto Hieda, Nami Kim and Francesco Scheffczyk

Concept

Alexander Roidl & Denis Klein

Design & Development

Alexander Roidl, Denis Klein & Lars Hembacher

Cover

Sangbong Lee

Software

Vitepress, pagedjs

Print

Druck & Papier Hochschule Mainz
Marco Moll

Paper

joly colors 160g/m² hellgrau

Novatech Digital Gloss 135g/m²

Fonts

Times New Roman, Authentic Sans

Supported by

NODE Forum for Digital Arts, Hochschule Mainz, Innovationsfond der Präsidentin, Förderung des Fachbereichs Gestaltung