User:Pedro Sá Couto/Graduate Research Seminar/Proposal Outline 05: Difference between revisions

From XPUB & Lens-Based wiki
 
(6 intermediate revisions by one other user not shown)
Line 4: Line 4:
=Project Proposal=
=Project Proposal=
<div style='max-width: 70%;'>
<div style='max-width: 70%;'>
Thesis Outline


==What do you want to make?==
==What do you want to make?==


Surveillance, privacy, and anonymous communication tools are not new topics. From movies like 007 where the 5 seconds self-destructing tape is introduced, or Mission Impossible's self-destructing videotape, to new features, that companies like WhatsApp tried to introduce where messages self destruct. There is a fetichism in the strategy of self-destructive mediums. As a media researcher concerned with processes of documentation and archiving, it doesn't feel the right way to approach this problem.
Surveillance, privacy, and anonymous communication tools are not new topics. From movies like 007, where the 5 seconds self-destructing tape is introduced to Mission Impossible's self-destructing videotape. There is a fetichism in the strategy of self-destructive media. As a media researcher concerned with processes of documentation and archiving, aiming to erase all evidence doesn't feel the right way to address anonymous communication.
 
I aim to create a set of experiments in which I can understand how imprints function and delve into their methods of implementation. This will happen while tweaking them to work within my contrasting view. From analog libraries where the main intention was to attribute provenance to a medium until the contemporary overview of imprints as a way to create liability for the users. It is relevant for me to delve into what it takes to publish anonymously. To publish consciously in anonymity demands a place for readers to access published material, without borders and identification needed.  As a publisher, I always had as my biggest concern how archives are documented and how provenance is displayed. Transposing from physical or digital media is a process where information gets lost very often. Physical properties are hard to translate when it comes to its transformation into a digital file and vice-versa.


From my analysis of how are traces left to make the downloader accountable, I will tweak these techniques into an active part adding provenance to different media. While challenging centralized distribution channels, and from my role as a researcher, I will experiment on how the process of adding stains can be twisted and revived. Stains are what I will call user patches or marks that are difficult to remove and that do not play an active role in archives. I will explore the process of adding imprints for aesthetic enhancements, marks of quality, and use them to question on circumstance (condition, size, who, where, why), date of acquisition, on ownership and acquisition.
I aim to create a set of experiments in which I can understand how imprints work and delve into their methods of implementation. This will happen while tweaking them to work within my contrasting view. From analog libraries where the main intention was to attribute provenance to a medium until the contemporary overview of imprints as a way to create liability for the users. It is relevant for me to explore what it takes to publish anonymously. To publish consciously in anonymity demands a place for readers to access published material, without borders and identification needed. As a publisher, I always had as my biggest concern how archives are documented and how provenance is displayed. Transposing from physical or digital media is a process where information gets lost very often. Physical properties are hard to translate when it comes to its transformation into a digital file and vice-versa.


During my project, I will explore with a forensic approach both digital and chemical processes of watermarking while creating a spotlight on documentation. Digitally by providing tools/sketches that will be applied in concrete examples spotted while downloading published material from various sources. Physically by documenting stamps, their intentions, the processes of chemically creating watermarks and removing them.
From an analysis with a forensic approach on how are traces left to make the downloader accountable, I will tweak these techniques into an active part adding provenance to different media. While challenging centralized distribution channels, and from my role as a researcher, I will experiment on how the process of adding stains can be twisted and revived. Stains are what I will call user patches or marks that are difficult to remove and that do not play an active role in archives. I will explore the process of adding imprints for aesthetic enhancements, marks of quality, and use them to question on circumstance (condition, size, who, where, why), date of acquisition, on ownership and acquisition.


Ultimately, I will host a wiki, or a similar platform, where I can dynamically share these experiments and their documentation. I will continue to develop these hackpacts and publish them by either posting code, recipes or/and photos. I aim to spread all these experiments in platforms that already have a big community of users. This will increase their reach, either through settled shadow libraries, .onion libraries or creating a mailing list for example. Personally, it is relevant to explore what types of stable technology may enable us to publish anonymously, from projects like SecureDrop until strategies as Steganoghrapy.
I will host a wiki, or a similar platform, where I can dynamically share these experiments and their documentation. I will continue to develop these hackpacts and publish them by either posting code, recipes or/and photos. I aim to spread all these experiments in platforms that already have a big community of users. This will increase their reach, either through settled shadow libraries, .onion libraries or creating a mailing list for example. Personally, it is relevant to explore what types of stable technology may enable us to publish anonymously, from projects like SecureDrop until strategies as Steganography.




==How do you plan to make it?==
==How do you plan to make it?==


It is relevant to point out that the fact of this being practice-led research already led me to create a more detailed scope for my project. The main focus of my research shifted after developing the hackpacts with Andre and Michael. While developing these prototypes my interest focused on surveillance in the realm of publishing.
It is pertinent to point out that this research being practice-led already led me to create a more detailed scope for my project. The main focus of my research shifted after developing the hackpacts with André and Michael. While developing these prototypes my interest focused on surveillance in the realm of publishing.


From an interest in the normalization of digital surveillance as a starting point, I developed 6 hackpacts that are python and bash code-based experiments focused on processes such as making visible processes to target individuals, either by their location, IP address, mac address or user name. I also prototyped a script able to download papers from JSTOR bypassing the process of leaving imprints added by publishers. Until now, I have created my digital watermarks and a script to append them to pdfs.
From an interest in the normalization of digital surveillance as a starting point, I developed 6 prototypes during the hackpact. These are python and bash code-based experiments focused on processes such as making visible processes to target individuals, either by their location, IP address, mac address or user name. I also prototyped a script to download papers from JSTOR bypassing the process of leaving imprints added by publishers. Until now, I have created my digital watermarks and a script to append them to pdfs.


I will start my research from traces that I can find within my downloaded published material and physical books. This will continue from news that comment on techniques that have been spotted and articles that address data hiding. My interest starts with understanding what kind of tracking techniques have already been used and spotted, test and document them.
I will start my research from traces that I can find within my downloaded published material and physical books. This will continue from news that comment on techniques that have been spotted and articles that address data hiding. My interest starts with understanding what kind of tracking techniques have already been used and spotted, test and document them.
Line 38: Line 34:
9 & 10 December 2019: Trim 4 Assessment<br>
9 & 10 December 2019: Trim 4 Assessment<br>
12 December 2019: Deadline thesis first chapter<br>
12 December 2019: Deadline thesis first chapter<br>
January – February 2020: Write Thesis + Experimenting and documenting different watermarks + Adjust from the December Assessment feedback.<br>
January – February 2020: Write Thesis + Experimenting and documenting different watermarks + Adjust from the December Assessment feedback<br>
March 2020: Fine-tune writing. Turn prototypes into the final project.<br>
March 2020: Fine-tune writing. Turn prototypes into the final project.<br>
April – June 2020: Finish writing, fine-tune project.<br>
April – June 2020: Finish writing, fine-tune project.<br>
June 2020: Finish the project, Prepare a final presentation.<br>
June 2020: Finish the project, Prepare a final presentation.<br>
July 2020: Graduation Show.<br>
July 2020: Graduation Show.<br>


==Why do you want to make it?==
==Why do you want to make it?==


I find it important for my practice to not only engage with the political aspects behind a topic but also how personally connected to them I am. I have always studied in democratic countries, where I had access to news channels. Either being TV channels, decentralized or centralized social media platforms. I had access to journals and centralized academic publishers, but I was not aware of how privileged I am. This raised questions on the issue of censorship and elitism when it comes to free-flow of knowledge.
I find it important for my practice to not only engage with the political aspects behind a topic but also how I am personally connected to them. I have always studied in democratic countries, where I had access to news channels. Either being TV channels, decentralized or centralized social media platforms. I had access to journals and centralized academic publishers, but I was not aware of how privileged I am. This raised questions on the issue of censorship and elitism when it comes to free-flow of knowledge.


We always demand more from the digital world and we compromise our identity because digital surveillance is normalized. We agree with all the protocols that monitor us, almost every day we use personal tracking devices like cellphones and smartwatches, we are so susceptible to accept new tech, either by convenience or peer pressure. We feel the need to be connected. We don't carry an identity card anymore because it is stored on our smartphones. We must register to access libraries with personal cards and we need these cards to photocopy archived material. A chain of power is created where it is almost mandatory to get digital.
We always demand more from the digital world and we compromise our identity because digital surveillance is normalized. We agree with all the protocols that monitor us, almost every day we use personal tracking devices like cellphones and smartwatches. We are susceptible to accept new tech, either by convenience or peer pressure. We feel the need to be connected. We don't carry an identity card anymore because it is stored on our smartphones. We must register to access libraries with personal cards and we need these cards to photocopy archived material. A chain of power is created where it is almost mandatory to get digital.


The creation of strategies to comment, tackle and reuse technologies of suppression when it comes to publishing is motivating.
It's motivating the creation of strategies to comment, tackle and reuse technologies of suppression when it comes to publishing.


It is also relevant to understand how important print is used outside the context of book publishers that are focused on bestsellers. There is a need to point out how small-circulation self-published works like zines can address specific communities allowing them to connect, spread their message and how they became objects for communities to gather around. Print gives us an idea of safe and fast distribution. From the beginning of research on the topic, I find it important that these groups become aware that they can be targeted. What technics exist that can target individuals or groups in publishing? Are we losing agency over who gets to be online published, spread knowledge and produce it?
It is also relevant to understand how important print is used outside the context of book publishers that are focused on bestsellers. There is a need to point out how small-circulation self-published works like zines can address specific communities allowing them to connect, spread their message and how they become objects for communities to gather around. Print gives us an idea of safe and fast distribution. From the beginning of my research, I found it important that these groups become aware that they can be targeted. What technics exist that can spot individuals or groups in publishing? Are we losing agency over who gets to be online published, spread knowledge and produce it?




Line 66: Line 63:
Alessandro Ludovico is a researcher, artist and chief editor of Neural magazine. He is also working with the Neural Archive with more than 1500 publications that have been published by Neural.it. During the last year and a half, I have been working closely with him in the graphic design of Neural and in this last issue releasing at the end of October he is addressing the topic of Surveillance.
Alessandro Ludovico is a researcher, artist and chief editor of Neural magazine. He is also working with the Neural Archive with more than 1500 publications that have been published by Neural.it. During the last year and a half, I have been working closely with him in the graphic design of Neural and in this last issue releasing at the end of October he is addressing the topic of Surveillance.


==Relation to previous practice==
 
==Relation to previous practice==  




During my bachelor's, I was able to experience what is limited access to contemporary books, academic journals, and digital publications. The interest cultivated in the Piet Zwart in the free-flow of information and knowledge makes me more critical of how I used to lead my research and gives me an insight into different examples in "free countries". The interest in digital culture formed during my first year in this context plays a key role in my topic of research. During the SI8 I have researched with data gathered from the decentralized platform, Mastodon.social, and explored as an artistic practice.
During my bachelor's, I was able to experience what is limited access to contemporary books, academic journals, and digital publications. The interest cultivated in the Piet Zwart in the free-flow of information and knowledge makes me more critical of how I used to lead my research and gives me an insight into different examples in "free countries". The interest in digital culture formed during my first year in this context plays a key role in my topic of research. During the SI8 I have researched with data gathered from the decentralized platform, Mastodon.social, and explored as an artistic practice.


During the special issue 09, I started my research in the identification of traces that are left in digital books within Shadow libraries. I was interested in researching what security features can be found on digital files as watermarking, user traces, DRMs, ... . This started by looking at different shadow libraries and theorize on their caution for visibility, anonymity, exposure?
During the special issue 09, I started my research in the identification of traces that are left in digital books within Shadow libraries. I was interested in researching what security features can be found on digital files as watermarking, user traces, DRMs, etc. This started by looking at different shadow libraries and theorize on their caution for visibility, anonymity, exposure?
This had to be put on hold once we decided to divide into groups. Within my group, we developed a workshop called "Blurry boundaries". We asked participants to go through the experience of being librarians while converting books into machine-readable files. A process involving tools, time and choices.  
This had to be put on hold once we decided to divide into groups. Within my group, we developed a workshop called Blurry boundaries. We asked participants to go through the experience of being librarians while converting books into machine-readable files. A process involving tools, time and choices.  


I had also researched on the topic of Surveillance and how can narratives be formed around this. In the past, the experiments that I had developed were more related to face detection but I feel more pertinent to explore this with a different approach.
I had also researched on the topic of Surveillance and how can narratives be formed around this. In the past, the experiments that I had developed were more related to face detection but I feel more pertinent to explore this with a different approach.
Line 79: Line 77:
==Relation to a larger context==
==Relation to a larger context==


Archives compel different formats and different perspectives nowadays. “Most societies place importance on preserving artifacts of their culture and heritage. Without such artifacts, civilization has no memory and no mechanism to learn from its successes and failures. Our culture now produces more and more artifacts in digital form. The Archive’s mission is to help preserve those artifacts and create an Internet library for researchers, historians, and scholars.” Brewster Kahle founder of the Internet Archive in (Ludovico, 2018). Archives commonly focus on physical media but examples as Cryptome which welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance (“Cryptome,” n.d.) understand the importance to open spaces to publications outside legal frameworks.
Archives compel different formats and different perspectives nowadays. “Most societies place importance on preserving artifacts of their culture and heritage. Without such artifacts, civilization has no memory and no mechanism to learn from its successes and failures. Our culture now produces more and more artifacts in digital form. The Archive’s mission is to help preserve those artifacts and create an Internet library for researchers, historians, and scholars.” Brewster Kahle founder of the Internet Archive in (Ludovico, 2018). Archives hold published physical media but examples as Cryptome which welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance (“Cryptome,” n.d.) understand the importance to open spaces to publications outside legal frameworks.


During the SI9, in The Library is Open publication we interviewed Dusan Barok. The Archiv der Avantgarden (https://archiv-der-avantgarden.skd.museum/en/about-us/ ) is taking up the collection’s international and interdisciplinary approach, the AdA in Dresden functions as an open archive: transparent and accessible, it serves as a forum for dialogue and discussion. (“Archiv der Avantgarden: About us,” n.d.) Dusan Barok worked developed some research within this archive. It is interesting how they deal with problems in digital archives such as them disabling the historical memory of the physical item with its time frame within a specific archive. And its spatial position within a collection is different to represent. (Xpub, 2019)
During the SI9, in The Library is Open publication we interviewed Dusan Barok. The Archiv der Avantgarden (https://archiv-der-avantgarden.skd.museum/en/about-us/ ) is taking up the collection’s international and interdisciplinary approach, the AdA in Dresden functions as an open archive: transparent and accessible, it serves as a forum for dialogue and discussion. (“Archiv der Avantgarden: About us,” n.d.) Dusan Barok researched within this archive. He points out how they deal with problems in digital archives such as them disabling the historical memory of the physical item with its time frame within a specific archive. And its spatial position within a collection is different to represent. (Xpub, 2019)




==References==
==References==


Amsterdam, U. van, 2019. dr. B. (Balázs) Bodó - University of Amsterdam [WWW Document]. URL https://www.uva.nl/en/profile/b/o/b.bodo/b.bodo.html (accessed 10.12.19).
Amsterdam, U. van (2019) dr. B. (Balázs) Bodó - University of Amsterdam. Available at: https://www.uva.nl/en/profile/b/o/b.bodo/b.bodo.html (Accessed: 12 October 2019).<br>
Cryptome [WWW Document], n.d. URL https://cryptome.org/ (accessed 11.9.19).
Cryptome (n.d.). Available at: https://cryptome.org/ (Accessed: 9 November 2019).<br>
Fulton, J.M., Kibby, M.D., 2017. Millennials and the normalization of surveillance on Facebook. Continuum 31, 189–199. https://doi.org/10.1080/10304312.2016.1265094
Fulton, J.M. and Kibby, M.D. (2017) Millennials and the normalization of surveillance on Facebook. Continuum, 31 (2): 189–199. doi:10.1080/10304312.2016.1265094.<br>
Kember, J.J. and S., 2019. Whose Book is it Anyway? A View From Elsewhere on Publishing, Copyright and Creativity. Open Book Publishers. https://doi.org/10.11647/OBP.0159
Kember, J.J. and S. (2019) Whose Book is it Anyway? A View From Elsewhere on Publishing, Copyright and Creativity. Open Book Publishers. doi:10.11647/OBP.0159.<br>
Ludovico, Alessandro., 2018. Post-Digital Print, The Mutation of Publishing since 1894. Onomatopee,.
Ludovico, Alessandro. (2018) Post-Digital Print, The Mutation of Publishing since 1894. Onomatopee.<br>
M., C., 1916. EX-LIBRIS. Bulletin of the Detroit Museum of Art 10, 8–12.
M., C. (1916) EX-LIBRIS. Bulletin of the Detroit Museum of Art, 10 (7): 8–12.<br>
McGrath, J.E., 2004. Loving big brother: performance, privacy and surveillance space. Routledge, London ;
McGrath, J.E. (2004) Loving big brother: performance, privacy and surveillance space. 1 online resource (x, 246 pages) vols. London ; Routledge. Available at: http://site.ebrary.com/id/10098736 (Downloaded: 19 September 2019).<br>
Richter, T., Escher, S., Schönfeld, D., Strufe, T., 2018. Forensic Analysis and Anonymisation of Printed Documents. pp. 127–138. https://doi.org/10.1145/3206004.3206019
Richter, T., Escher, S., Schönfeld, D., et al. (2018) Forensic Analysis and Anonymisation of Printed Documents. In 14 June 2018. pp. 127–138. doi:10.1145/3206004.3206019.<br>
Velden, D. van der., Metahaven., Kruk, Vinca., 2015. Black transparency the right to know in the age of mass surveillance. Sternberg Press, Berlin.
Velden, D. van der., Metahaven. and Kruk, Vinca. (2015) Black transparency the right to know in the age of mass surveillance. Berlin: Sternberg Press.<br>
Watkins, S., 1990. Chemical Watermarking of Paper. Journal of the American Institute for Conservation 29, 117–131. https://doi.org/10.2307/3179578
Watkins, S. (1990) Chemical Watermarking of Paper. Journal of the American Institute for Conservation, 29 (2): 117–131. doi:10.2307/3179578.<br>
Wu, A.S., Edwards, C., 2019. A cookbook of invisible writing. Onomatopee, Eindhoven.
Wu, A.S. and Edwards, C. (2019) A cookbook of invisible writing. Eindhoven: Onomatopee.<br>

Latest revision as of 12:17, 14 November 2019

From the XPUB PAD
https://pad.xpub.nl/p/project_proposal_05_pedrosaclout

Project Proposal

What do you want to make?

Surveillance, privacy, and anonymous communication tools are not new topics. From movies like 007, where the 5 seconds self-destructing tape is introduced to Mission Impossible's self-destructing videotape. There is a fetichism in the strategy of self-destructive media. As a media researcher concerned with processes of documentation and archiving, aiming to erase all evidence doesn't feel the right way to address anonymous communication.

I aim to create a set of experiments in which I can understand how imprints work and delve into their methods of implementation. This will happen while tweaking them to work within my contrasting view. From analog libraries where the main intention was to attribute provenance to a medium until the contemporary overview of imprints as a way to create liability for the users. It is relevant for me to explore what it takes to publish anonymously. To publish consciously in anonymity demands a place for readers to access published material, without borders and identification needed. As a publisher, I always had as my biggest concern how archives are documented and how provenance is displayed. Transposing from physical or digital media is a process where information gets lost very often. Physical properties are hard to translate when it comes to its transformation into a digital file and vice-versa.

From an analysis with a forensic approach on how are traces left to make the downloader accountable, I will tweak these techniques into an active part adding provenance to different media. While challenging centralized distribution channels, and from my role as a researcher, I will experiment on how the process of adding stains can be twisted and revived. Stains are what I will call user patches or marks that are difficult to remove and that do not play an active role in archives. I will explore the process of adding imprints for aesthetic enhancements, marks of quality, and use them to question on circumstance (condition, size, who, where, why), date of acquisition, on ownership and acquisition.

I will host a wiki, or a similar platform, where I can dynamically share these experiments and their documentation. I will continue to develop these hackpacts and publish them by either posting code, recipes or/and photos. I aim to spread all these experiments in platforms that already have a big community of users. This will increase their reach, either through settled shadow libraries, .onion libraries or creating a mailing list for example. Personally, it is relevant to explore what types of stable technology may enable us to publish anonymously, from projects like SecureDrop until strategies as Steganography.


How do you plan to make it?

It is pertinent to point out that this research being practice-led already led me to create a more detailed scope for my project. The main focus of my research shifted after developing the hackpacts with André and Michael. While developing these prototypes my interest focused on surveillance in the realm of publishing.

From an interest in the normalization of digital surveillance as a starting point, I developed 6 prototypes during the hackpact. These are python and bash code-based experiments focused on processes such as making visible processes to target individuals, either by their location, IP address, mac address or user name. I also prototyped a script to download papers from JSTOR bypassing the process of leaving imprints added by publishers. Until now, I have created my digital watermarks and a script to append them to pdfs.

I will start my research from traces that I can find within my downloaded published material and physical books. This will continue from news that comment on techniques that have been spotted and articles that address data hiding. My interest starts with understanding what kind of tracking techniques have already been used and spotted, test and document them.


What is your timetable?

September 2019 — July 2020: Testing and documenting the process.
September – October 2019: Framework outline + Research + Prototyping
November 2019: +++ Prototyping
14 November 2019: Deadline project proposal
December 2019: Conceptualize way to turn prototypes into the final project.
9 & 10 December 2019: Trim 4 Assessment
12 December 2019: Deadline thesis first chapter
January – February 2020: Write Thesis + Experimenting and documenting different watermarks + Adjust from the December Assessment feedback
March 2020: Fine-tune writing. Turn prototypes into the final project.
April – June 2020: Finish writing, fine-tune project.
June 2020: Finish the project, Prepare a final presentation.
July 2020: Graduation Show.


Why do you want to make it?

I find it important for my practice to not only engage with the political aspects behind a topic but also how I am personally connected to them. I have always studied in democratic countries, where I had access to news channels. Either being TV channels, decentralized or centralized social media platforms. I had access to journals and centralized academic publishers, but I was not aware of how privileged I am. This raised questions on the issue of censorship and elitism when it comes to free-flow of knowledge.

We always demand more from the digital world and we compromise our identity because digital surveillance is normalized. We agree with all the protocols that monitor us, almost every day we use personal tracking devices like cellphones and smartwatches. We are susceptible to accept new tech, either by convenience or peer pressure. We feel the need to be connected. We don't carry an identity card anymore because it is stored on our smartphones. We must register to access libraries with personal cards and we need these cards to photocopy archived material. A chain of power is created where it is almost mandatory to get digital.

It's motivating the creation of strategies to comment, tackle and reuse technologies of suppression when it comes to publishing.

It is also relevant to understand how important print is used outside the context of book publishers that are focused on bestsellers. There is a need to point out how small-circulation self-published works like zines can address specific communities allowing them to connect, spread their message and how they become objects for communities to gather around. Print gives us an idea of safe and fast distribution. From the beginning of my research, I found it important that these groups become aware that they can be targeted. What technics exist that can spot individuals or groups in publishing? Are we losing agency over who gets to be online published, spread knowledge and produce it?


Who can help you and how?

Prototyping tutors in developing fully working devices to test.
Michael Murtaugh more in specific with previous research in surveillance, more related to computer vision.
XPUB squad.
Amy Suo Wu relating surveillance in publishing with her previous work in Steganography. In her book ‘A Cookbook of Invisible Writing’, she introduces techniques to analog steganography. It has a close relation to surveillance in the realm of publishing, where she publishes her research on secret writing that is hidden in plain sight.
Femke Snelting with her relation to the PZI curriculum. Femke was our guest tutor during the SI9 and is also a member of Constant, a non-profit organization based in Brussels active in the fields of art, media, and technology.
Bodó Balázs is an economist, piracy researcher at the Institute for Information Law (IViR) at the University of Amsterdam, he was invited during our special issue 9 to give a workshop on Shadow Libraries. He is interested in copyrights, piracy and peer-to-peer communities in which I think could give me insight on investigation methods on these topics.
Alessandro Ludovico is a researcher, artist and chief editor of Neural magazine. He is also working with the Neural Archive with more than 1500 publications that have been published by Neural.it. During the last year and a half, I have been working closely with him in the graphic design of Neural and in this last issue releasing at the end of October he is addressing the topic of Surveillance.


Relation to previous practice

During my bachelor's, I was able to experience what is limited access to contemporary books, academic journals, and digital publications. The interest cultivated in the Piet Zwart in the free-flow of information and knowledge makes me more critical of how I used to lead my research and gives me an insight into different examples in "free countries". The interest in digital culture formed during my first year in this context plays a key role in my topic of research. During the SI8 I have researched with data gathered from the decentralized platform, Mastodon.social, and explored as an artistic practice.

During the special issue 09, I started my research in the identification of traces that are left in digital books within Shadow libraries. I was interested in researching what security features can be found on digital files as watermarking, user traces, DRMs, etc. This started by looking at different shadow libraries and theorize on their caution for visibility, anonymity, exposure? This had to be put on hold once we decided to divide into groups. Within my group, we developed a workshop called Blurry boundaries. We asked participants to go through the experience of being librarians while converting books into machine-readable files. A process involving tools, time and choices.

I had also researched on the topic of Surveillance and how can narratives be formed around this. In the past, the experiments that I had developed were more related to face detection but I feel more pertinent to explore this with a different approach.


Relation to a larger context

Archives compel different formats and different perspectives nowadays. “Most societies place importance on preserving artifacts of their culture and heritage. Without such artifacts, civilization has no memory and no mechanism to learn from its successes and failures. Our culture now produces more and more artifacts in digital form. The Archive’s mission is to help preserve those artifacts and create an Internet library for researchers, historians, and scholars.” Brewster Kahle founder of the Internet Archive in (Ludovico, 2018). Archives hold published physical media but examples as Cryptome which welcomes documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance (“Cryptome,” n.d.) understand the importance to open spaces to publications outside legal frameworks.

During the SI9, in The Library is Open publication we interviewed Dusan Barok. The Archiv der Avantgarden (https://archiv-der-avantgarden.skd.museum/en/about-us/ ) is taking up the collection’s international and interdisciplinary approach, the AdA in Dresden functions as an open archive: transparent and accessible, it serves as a forum for dialogue and discussion. (“Archiv der Avantgarden: About us,” n.d.) Dusan Barok researched within this archive. He points out how they deal with problems in digital archives such as them disabling the historical memory of the physical item with its time frame within a specific archive. And its spatial position within a collection is different to represent. (Xpub, 2019)


References

Amsterdam, U. van (2019) dr. B. (Balázs) Bodó - University of Amsterdam. Available at: https://www.uva.nl/en/profile/b/o/b.bodo/b.bodo.html (Accessed: 12 October 2019).
Cryptome (n.d.). Available at: https://cryptome.org/ (Accessed: 9 November 2019).
Fulton, J.M. and Kibby, M.D. (2017) Millennials and the normalization of surveillance on Facebook. Continuum, 31 (2): 189–199. doi:10.1080/10304312.2016.1265094.
Kember, J.J. and S. (2019) Whose Book is it Anyway? A View From Elsewhere on Publishing, Copyright and Creativity. Open Book Publishers. doi:10.11647/OBP.0159.
Ludovico, Alessandro. (2018) Post-Digital Print, The Mutation of Publishing since 1894. Onomatopee.
M., C. (1916) EX-LIBRIS. Bulletin of the Detroit Museum of Art, 10 (7): 8–12.
McGrath, J.E. (2004) Loving big brother: performance, privacy and surveillance space. 1 online resource (x, 246 pages) vols. London ; Routledge. Available at: http://site.ebrary.com/id/10098736 (Downloaded: 19 September 2019).
Richter, T., Escher, S., Schönfeld, D., et al. (2018) Forensic Analysis and Anonymisation of Printed Documents. In 14 June 2018. pp. 127–138. doi:10.1145/3206004.3206019.
Velden, D. van der., Metahaven. and Kruk, Vinca. (2015) Black transparency the right to know in the age of mass surveillance. Berlin: Sternberg Press.
Watkins, S. (1990) Chemical Watermarking of Paper. Journal of the American Institute for Conservation, 29 (2): 117–131. doi:10.2307/3179578.
Wu, A.S. and Edwards, C. (2019) A cookbook of invisible writing. Eindhoven: Onomatopee.