On Hijacking LED Walls
نویسندگان
چکیده
In recent years, the LED walls originally used in outdoor spaces by advertising companies to extend consumption of images our daily life have been appropriated artists and installed gallery spaces. When viewed nearby or when walking around them, become some way dysfunctional: The fade, points color distortions appear, spectacle machine interruputs habitual viewing patterns. This article focuses on three works which disrupt immersive regimes through what I call “hijacking” advanced technology. Lucy Raven (Tucson, AZ, USA), Demolition a Wall (Album 2), 2022. Eija-Liisa Ahtila (Helsinki, Finland), Potentiality for Love, 2018. Marco Fusinato (Sidney, Australia), Desastres, Australian Pavilion, Venice Biennale, These use sculptural spectacular effect freestanding attention capitalist relation Through performative narrative pieces, these deploy poetic artistic effects explore politics technological immersion societies.
منابع مشابه
Hijacking AFS
We have identified several techniques that allow uncontrolled access to files managed by AFS 3.0. One method relies on administrative (or root) access to a user’s workstation. Defending against this sort of attack is very difficult. Another class of attacks comes from promiscuous access to the physical network. Stronger cryptographic protocols, such as those employed by AFS 3.1, obviate this pr...
متن کاملProcess Hijacking
Process checkpointing is a basic mechanism required for providing High Throughput Computing service on distributively owned resources. We present a new process checkpoint and migration technique, called process hijacking, that uses dynamic program re-writing techniques to add checkpointing capability to a running program. Process hijacking makes it possible to checkpoint and migrate proprietary...
متن کاملA Forensic Case Study on AS Hijacking
The Border Gateway Protocol (BGP) was designed without security in mind. Until today, this fact makes the Internet vulnerable to hijacking attacks that intercept or blackhole Internet traffic. So far, significant effort has been put into the detection of IP prefix hijacking, while AS hijacking has received little attention. AS hijacking is more sophisticated than IP prefix hijacking, and is aim...
متن کاملHijacking the Linux Kernel
In this paper, a new method of hijacking the Linux kernel is presented. It is based on analysing the Linux system call handler, where a proper set of instructions is subsequently replaced by a jump to a different function. The ability to change the execution flow in the middle of an existing function represents a unique approach in Linux kernel hacking. The attack is applicable to all kernels f...
متن کاملHijacking translation in addiction
Two studies suggest that the reduced activity of a translation initiation factor called eIF2α might be partly responsible for the increased risk of drug addiction seen in adolescents.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Arts
سال: 2023
ISSN: ['2076-0752']
DOI: https://doi.org/10.3390/arts12030108